pgadmin.cluster.qx.work
Open in
urlscan Pro
8.137.82.17
Public Scan
Effective URL: https://pgadmin.cluster.qx.work/login?next=/
Submission: On August 02 via api from US — Scanned from DE
Summary
TLS certificate: Issued by R10 on July 30th 2024. Valid for: 3 months.
This is the only time pgadmin.cluster.qx.work was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 15 | 8.137.82.17 8.137.82.17 | 37963 (ALIBABA-C...) (ALIBABA-CN-NET Hangzhou Alibaba Advertising Co.) | |
13 | 2 |
ASN37963 (ALIBABA-CN-NET Hangzhou Alibaba Advertising Co.,Ltd., CN)
pgadmin.cluster.qx.work |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
qx.work
2 redirects
pgadmin.cluster.qx.work |
2 MB |
13 | 1 |
Domain | Requested by | |
---|---|---|
15 | pgadmin.cluster.qx.work |
2 redirects
pgadmin.cluster.qx.work
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
pgadmin.cluster.qx.work R10 |
2024-07-30 - 2024-10-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://pgadmin.cluster.qx.work/login?next=/
Frame ID: BCB8D9E675DA80067B3DB61F9816712D
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
pgAdmin 4Page URL History Show full URLs
-
https://pgadmin.cluster.qx.work/
HTTP 302
https://pgadmin.cluster.qx.work/login?next=/ Page URL
Detected technologies
RequireJS (JavaScript Frameworks) ExpandDetected patterns
- require.*\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://pgadmin.cluster.qx.work/
HTTP 302
https://pgadmin.cluster.qx.work/login?next=/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 9- https://pgadmin.cluster.qx.work/favicon.ico?ver=81000 HTTP 302
- https://pgadmin.cluster.qx.work/static/favicon.ico?ver=81000
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login
pgadmin.cluster.qx.work/ Redirect Chain
|
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
pgadmin.cluster.qx.work/static/js/generated/ |
380 KB 94 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
require.min.js
pgadmin.cluster.qx.work/static/vendor/require/ |
18 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.react.js
pgadmin.cluster.qx.work/static/js/generated/ |
337 KB 100 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.main.js
pgadmin.cluster.qx.work/static/js/generated/ |
477 KB 157 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.others.js
pgadmin.cluster.qx.work/static/js/generated/ |
3 MB 985 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.sqleditor.js
pgadmin.cluster.qx.work/static/js/generated/ |
1 MB 325 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pgadmin_commons.js
pgadmin.cluster.qx.work/static/js/generated/ |
15 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
748 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
security.pages.js
pgadmin.cluster.qx.work/static/js/generated/ |
397 KB 122 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
pgadmin.cluster.qx.work/static/ Redirect Chain
|
77 KB 78 KB |
Other
image/vnd.microsoft.icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
endpoints.js
pgadmin.cluster.qx.work/browser/js/ |
19 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
translations.js
pgadmin.cluster.qx.work/tools/ |
321 B 610 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto-Regular..ttf
pgadmin.cluster.qx.work/static/js/generated/fonts/ |
168 KB 168 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
string| resourceBasePath function| requirejs function| require function| define object| webpackChunk function| _ object| pgAdmin function| renderSecurityPage1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
pgadmin.cluster.qx.work/ | Name: pga4_session Value: 60ab0566-70b0-440b-91bd-251128062444!/YPoVRgm7Gk4wfbh3LHVh3DTUlB7AI8UDfkUbYv6prE= |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | default-src ws: http: data: blob: 'unsafe-inline' 'unsafe-eval'; |
Strict-Transport-Security | max-age=31536000; includeSubDomains |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
pgadmin.cluster.qx.work
8.137.82.17
11d3ad9626a6bd769e6d232d130e5bcad216b2a399d855137de018f1d8f0b60a
40c13a95ccb1c8494ecaa9ee68dfb2e62d3cf201b2fb4dfc28a771cf3b46bc56
4685aaf38c48a991fd432e6f4e21b30255778014a1d8e99b39323ace4d4e2334
4a66c4852a47178ac98589804b7ca01b7fb97c19c93751f297a042f8dbc8f77e
6afa287fc6721817d9931bd8d7a796646ea535596f8bb038ff048666e19cfd17
79e851404657dac2106b3d22ad256d47824a9a5765458edb72c9102a45816d95
88777924f01593212dc54d9e185c2364be9cadd37307a63b37bc48027f4dc396
8df5e3137d52c04b2add5ae06db271f42d32346b465420ef68171d9beb97bda5
909642bf12a67357c27f5b544472428eaaedacaaa516f0cc096f0cd31f940109
a5ed2c94f0c9235761be119347603855a8266cbdbc8642d07c376f8315414e93
aa39858b7c2dbc718756dcb14a492d4b9dcbe622c118ad5e221ccf3a3f363bb4
b9b2c06519733d3b91fde63093cec19c4500083f075fba39092e49145d5fe099
da17ebab7ba391d909c4ce329bb32c058c1e8b819c49991f07db2b2cadae1f8e
dd1f3dca0ff17ecd2c7d1efd6be6d3f6f651a7b9517fd105ab2bcf6120301e1d
ee2d5fd0dda2e1fbb4661b921eaff63e4f05999413cf5437a23cef45607dac35