![](/screenshots/d96580f4-a1eb-44b6-9d97-04b042668fc3.png)
www.invoice.aqualeafitsol.com
Open in
urlscan Pro
103.154.184.15
Public Scan
Submission: On February 12 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by R3 on December 14th 2022. Valid for: 3 months.
This is the only time www.invoice.aqualeafitsol.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 103.154.184.15 103.154.184.15 | 141004 (QTIME-AS-...) (QTIME-AS-AP QTIME BUSINESSES PRIVATE LIMITED) | |
1 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 2 |
ASN141004 (QTIME-AS-AP QTIME BUSINESSES PRIVATE LIMITED, IN)
PTR: dedi.aqualeafitsol.com
www.invoice.aqualeafitsol.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
aqualeafitsol.com
www.invoice.aqualeafitsol.com |
202 KB |
1 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 752 |
7 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
7 | www.invoice.aqualeafitsol.com |
www.invoice.aqualeafitsol.com
|
1 | maxcdn.bootstrapcdn.com |
www.invoice.aqualeafitsol.com
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
invoice.aqualeafitsol.com R3 |
2022-12-14 - 2023-03-14 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-12-30 - 2023-12-30 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.invoice.aqualeafitsol.com/
Frame ID: 427A69921F99A24EAD3944CCDBD1E24B
Requests: 8 HTTP requests in this frame
Screenshot
![](/screenshots/d96580f4-a1eb-44b6-9d97-04b042668fc3.png)
Page Title
Tax InvoiceDetected technologies
![](/vendor/wappa/icons/Bootstrap.png)
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
![](/vendor/wappa/icons/Font Awesome.png)
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Detected patterns
- jquery-ui.*\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.invoice.aqualeafitsol.com/ |
54 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui.css
www.invoice.aqualeafitsol.com/css/ |
34 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-2.1.4.min.js
www.invoice.aqualeafitsol.com/js/ |
82 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui.js
www.invoice.aqualeafitsol.com/js/ |
460 KB 112 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
www.invoice.aqualeafitsol.com/images/ |
18 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signature.JPG
www.invoice.aqualeafitsol.com/images/ |
23 KB 24 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
add_more_feld.js
www.invoice.aqualeafitsol.com/custom_script/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| oncontentvisibilityautostatechange function| $ function| jQuery function| add_more function| remove_more function| NumAndTwoDecimals function| findTotal function| getCaret function| validatePhone object| inputEl string| goodKey object| key function| checkInputTel function| filterInput function| res1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.invoice.aqualeafitsol.com/ | Name: frontent_ci_session Value: f5190521ea0b73cb84f8dca91f4c2554a252d64d |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
maxcdn.bootstrapcdn.com
www.invoice.aqualeafitsol.com
103.154.184.15
2606:4700::6812:acf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