juniverse.securitybreak.io
Open in
urlscan Pro
20.119.8.25
Public Scan
Submission: On July 02 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by GeoTrust Global TLS RSA4096 SHA256 20... on July 2nd 2024. Valid for: 6 months.
This is the only time juniverse.securitybreak.io was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
19 | 20.119.8.25 20.119.8.25 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
4 | 99.86.8.175 99.86.8.175 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a04:4e42::485 2a04:4e42::485 | 54113 (FASTLY) (FASTLY) | |
3 | 35.166.226.67 35.166.226.67 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2606:4700:303... 2606:4700:3037::6815:501b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
28 | 6 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
juniverse.securitybreak.io |
ASN16509 (AMAZON-02, US)
PTR: server-99-86-8-175.fra6.r.cloudfront.net
cdn.segment.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-35-166-226-67.us-west-2.compute.amazonaws.com
api.segment.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
securitybreak.io
juniverse.securitybreak.io |
2 MB |
4 |
segment.com
cdn.segment.com — Cisco Umbrella Rank: 1789 |
33 KB |
3 |
segment.io
api.segment.io — Cisco Umbrella Rank: 1325 |
544 B |
1 |
shields.io
img.shields.io — Cisco Umbrella Rank: 45060 |
2 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 381 |
1 KB |
28 | 5 |
Domain | Requested by | |
---|---|---|
19 | juniverse.securitybreak.io |
juniverse.securitybreak.io
|
4 | cdn.segment.com |
juniverse.securitybreak.io
cdn.segment.com |
3 | api.segment.io |
cdn.segment.com
|
1 | img.shields.io | |
1 | cdn.jsdelivr.net | |
28 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
infosecjupyterbook.com |
infosecjupyterthon.com |
github.com |
twitter.com |
securitybreak.io |
plotly.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
juniverse.securitybreak.io GeoTrust Global TLS RSA4096 SHA256 2022 CA1 |
2024-07-02 - 2025-01-02 |
6 months | crt.sh |
*.segment.com Amazon RSA 2048 M03 |
2023-11-14 - 2024-12-13 |
a year | crt.sh |
jsdelivr.net GlobalSign Atlas R3 DV TLS CA 2023 Q3 |
2023-09-27 - 2024-10-28 |
a year | crt.sh |
*.segment.io Amazon RSA 2048 M03 |
2023-12-13 - 2025-01-11 |
a year | crt.sh |
shields.io WE1 |
2024-06-25 - 2024-09-23 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://juniverse.securitybreak.io/
Frame ID: 64E7E0573EACED9138C7ED33857C42E2
Requests: 30 HTTP requests in this frame
Screenshot
Page Title
Jupyter UniverseDetected technologies
Segment (Analytics) ExpandDetected patterns
- cdn\.segment\.com/analytics\.js
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
43 Outgoing links
These are links going to different origins than the main page.
Title: Infosec JupyterBook
Search URL Search Domain Scan URL
Title: Infosec JupyterThon
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: @fr0gger_
Search URL Search Domain Scan URL
Title: SecurityBreak.io
Search URL Search Domain Scan URL
Title: .cls-0{fill:#000;} .cls-1{fill:#FFF;} .cls-2{fill:#F26;} .cls-3{fill:#D69;} .cls-4{fill:#BAC;} .cls-5{fill:#9EF;} plotly-logomark
Search URL Search Domain Scan URL
Title: 📄 Threat Report Summarization 👤 Thomas Roccia LLMs Threat Intel
Search URL Search Domain Scan URL
Title: 📄 IOC Extractor 👤 Thomas Roccia IOC MSTICpy Threat Intel
Search URL Search Domain Scan URL
Title: 📄 MSTICpy VirusTotal Lookup 👤 Ian Helen, Pete Bryan MSTICpy VirusTotal Enrichment IOC
Search URL Search Domain Scan URL
Title: 📄 BloodHound Explore Kerberoastable Users 👤 Roberto Rodriguez Bloodhound Data Analysis Kerberoast
Search URL Search Domain Scan URL
Title: 📄 Kusto Analysis with MSTICpy 👤 Ian Helen Kusto MSTICpy Data Analysis Threat Hunting
Search URL Search Domain Scan URL
Title: 📄 Pivot function with MSTICpy 👤 Ian Helen, Pete Bryan Pivot MSTICpy Enrichment Threat Hunting
Search URL Search Domain Scan URL
Title: 📄 Guardians of Identity: OKTA's Underworld 👤 Kai Iyer OKTA IAM Threat Hunting Jupyterthon
Search URL Search Domain Scan URL
Title: 📄 I-SooN Data Leak Analysis using OCR and GenAI 👤 Thomas Roccia LLMs Threat Intel OCR I-Soon
Search URL Search Domain Scan URL
Title: 📄 Ransomware Report Usecases1 👤 Google Ransomware Threat Intel VirusTotal
Search URL Search Domain Scan URL
Title: 📄 Create a custom MISP warninglist 👤 Koen Van Impe misp playbook Threat Intel IOC warninglist hunting
Search URL Search Domain Scan URL
Title: 📄 Using timestamps in MISP 👤 Koen Van Impe misp playbook Threat Intel IOC timestamp export
Search URL Search Domain Scan URL
Title: 📄 Curation: disable decayed indicators 👤 Koen Van Impe misp playbook Threat Intel IOC curation workflow todo qa quality audit decaying indicators lifecycle
Search URL Search Domain Scan URL
Title: 📄 Retroscan with a MISP warninglist 👤 Koen Van Impe misp playbook Threat Intel IOC warninglist hunting false-positives indicator-quality curation
Search URL Search Domain Scan URL
Title: 📄 Query CVE information 👤 Koen Van Impe misp playbook Threat Intel IOC cve vulnerability exploits
Search URL Search Domain Scan URL
Title: 📄 Malware triage with MISP 👤 Koen Van Impe misp playbook Threat Intel IOC malware triage incidentresponse ir dfir
Search URL Search Domain Scan URL
Title: 📄 Query hash information 👤 Koen Van Impe misp playbook Threat Intel IOC hash reputation abuse sample file malware
Search URL Search Domain Scan URL
Title: 📄 Query IP reputation 👤 Koen Van Impe misp playbook Threat Intel IOC ip reputation abuse whois
Search URL Search Domain Scan URL
Title: 📄 Malware triage with MISP - Dynamic malware analysis 👤 Koen Van Impe misp playbook Threat Intel IOC malware triage sandbox incidentresponse ir dfir
Search URL Search Domain Scan URL
Title: 📄 Query for inconsistencies in MISP events 👤 Koen Van Impe misp playbook Threat Intel IOC distribution data protection curation inconsistencies qa quality audit
Search URL Search Domain Scan URL
Title: 📄 Threat Actor profiling 👤 Koen Van Impe misp playbook Threat Intel IOC mitre actor intrusion-set galaxies clusters contextualisation
Search URL Search Domain Scan URL
Title: 📄 Curate MISP events 👤 Koen Van Impe misp playbook Threat Intel IOC curation workflow todo qa quality audit
Search URL Search Domain Scan URL
Title: 📄 Provision users and organisations 👤 Koen Van Impe misp playbook Threat Intel IOC users organisations training provisioning
Search URL Search Domain Scan URL
Title: 📄 Create MISP objects and relationships 👤 Koen Van Impe misp playbook Threat Intel IOC objects context
Search URL Search Domain Scan URL
Title: 📄 Bulk delete MISP events 👤 Koen Van Impe misp playbook Threat Intel IOC delete clean curation
Search URL Search Domain Scan URL
Title: 📄 Query domain reputation 👤 Koen Van Impe misp playbook Threat Intel IOC domain reputation
Search URL Search Domain Scan URL
Title: 📄 Playbook Skeleton 👤 Koen Van Impe misp playbook Threat Intel IOC tags
Search URL Search Domain Scan URL
Title: 📄 Create or update a MISP event with information from a phishing incident with a link 👤 Koen Van Impe misp playbook Threat Intel IOC phishing
Search URL Search Domain Scan URL
Title: 📄 RAG ATT&CK 👤 Thomas Roccia rag llm threat intel ATT&CK
Search URL Search Domain Scan URL
Title: 📄 ELK Threat Hunting 👤 Thomas Roccia ELK threat hunting malware IOC
Search URL Search Domain Scan URL
Title: 📄 Conti Leaks Analysis 👤 Thomas Roccia conti leaks threat intel leaks ransomware
Search URL Search Domain Scan URL
Title: 📄 Malware String Similarity 👤 Thomas Roccia malware threat intel jaccard iocs
Search URL Search Domain Scan URL
Title: 📄 10 Python Lib for Malware Analysis and Reverse Engineering 👤 Thomas Roccia malware reverse Engineering yara iocs
Search URL Search Domain Scan URL
Title: 📄 Pulsedive Lookup using MSTICpy 👤 Thomas Roccia malware pulsedive Threat Intel iocs
Search URL Search Domain Scan URL
Title: 📄 Malware Bazaar Lookup using MSTICpy 👤 Thomas Roccia malware malware bazaar Threat Intel iocs
Search URL Search Domain Scan URL
Title: 📄 VirusTotal Domain Hunting 👤 Thomas Roccia malware virustotal Threat Intel iocs domain
Search URL Search Domain Scan URL
Title: OpenThreat Research Community Repository
Search URL Search Domain Scan URL
Title: JupyterUniverse GitHub repository
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
28 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
juniverse.securitybreak.io/ |
891 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SourceSansPro-Regular.0d69e5ff5e92ac64a0c9.woff2
juniverse.securitybreak.io/static/media/ |
76 KB 76 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SourceSansPro-SemiBold.abed79cd0df1827e18cf.woff2
juniverse.securitybreak.io/static/media/ |
76 KB 76 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SourceSansPro-Bold.118dea98980e20a81ced.woff2
juniverse.securitybreak.io/static/media/ |
75 KB 75 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.cc5b8325.js
juniverse.securitybreak.io/static/js/ |
4 MB 978 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.77d1c464.css
juniverse.securitybreak.io/static/css/ |
28 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
health
juniverse.securitybreak.io/_stcore/ |
2 B 189 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
host-config
juniverse.securitybreak.io/_stcore/ |
602 B 747 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.png
juniverse.securitybreak.io/ |
1019 B 1 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analytics.min.js
cdn.segment.com/analytics.js/v1/iCkMy7ymtJ9qYzQRXkQpnAJEq7D4NyMU/ |
103 KB 28 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1f680.png
cdn.jsdelivr.net/gh/twitter/twemoji@14.0.2/assets/72x72/ |
1 KB 1 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
settings
cdn.segment.com/v1/projects/iCkMy7ymtJ9qYzQRXkQpnAJEq7D4NyMU/ |
1 KB 1 KB |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ajs-destination.bundle.ed53a26b6edc80c65d73.js
cdn.segment.com/analytics-next/bundles/ |
9 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
schemaFilter.bundle.5c2661f67b4b71a6d9bd.js
cdn.segment.com/analytics-next/bundles/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
t
api.segment.io/v1/ |
21 B 181 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
t
api.segment.io/v1/ |
21 B 182 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1307.8ea033f1.chunk.js
juniverse.securitybreak.io/static/js/ |
1 KB 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SourceSansPro-Italic.8a9bfea74d43927d6eec.woff2
juniverse.securitybreak.io/static/media/ |
44 KB 44 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
JupyterUniverse.svg
img.shields.io/github/stars/fr0gger/ |
3 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
f43caf95428ee78a1890803278d9f079fbbbe7c93ff1772a3dcbe246.png
juniverse.securitybreak.io/media/ |
58 KB 58 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2736.1e0f688c.chunk.js
juniverse.securitybreak.io/static/js/ |
3 MB 1 MB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1168.d5c307a0.chunk.js
juniverse.securitybreak.io/static/js/ |
6 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7673.0828a05e.chunk.js
juniverse.securitybreak.io/static/js/ |
365 KB 116 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6692.bb444a79.chunk.css
juniverse.securitybreak.io/static/css/ |
11 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6692.e932205b.chunk.js
juniverse.securitybreak.io/static/js/ |
44 KB 15 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9656.8c935274.chunk.js
juniverse.securitybreak.io/static/js/ |
22 KB 6 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8691.ee84f70b.chunk.js
juniverse.securitybreak.io/static/js/ |
10 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
t
api.segment.io/v1/ |
21 B 181 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
38 B 0 |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage boolean| prerenderReady object| webpackChunk_streamlit_app object| __core-js_shared__ object| streamlitDebug function| Mousetrap object| analytics object| webpackChunk_segment_analytics_next string| analyticsWriteKey object| __SEGMENT_INSPECTOR__ object| AnalyticsNext object| PolyBool function| sprintf function| vsprintf object| __TYPEDARRAY_POOL object| __TEXT_CACHE object| PlotlyGeoAssets4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.juniverse.securitybreak.io/ | Name: ARRAffinity Value: df256fff2bc97cf1136c4fe3e43a00b6a331e70682a375c98ebe7486ac606671 |
|
.juniverse.securitybreak.io/ | Name: ARRAffinitySameSite Value: df256fff2bc97cf1136c4fe3e43a00b6a331e70682a375c98ebe7486ac606671 |
|
juniverse.securitybreak.io/ | Name: _streamlit_xsrf Value: 2|50b97f8d|b1ecb4ceea5340431b69e912dc8546ec|1719923139 |
|
.securitybreak.io/ | Name: ajs_anonymous_id Value: eb818ce3-a2f1-4f1c-9302-293786164449 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
api.segment.io
cdn.jsdelivr.net
cdn.segment.com
img.shields.io
juniverse.securitybreak.io
20.119.8.25
2606:4700:3037::6815:501b
2a04:4e42::485
35.166.226.67
99.86.8.175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