![](/screenshots/eb0539c8-189b-41ef-9ab4-ad09da8c5a4b.png)
ipv4.simulator.uz
Open in
urlscan Pro
80.80.218.230
Public Scan
Submission: On January 06 via api from US — Scanned from US
Summary
TLS certificate: Issued by R3 on January 3rd 2024. Valid for: 3 months.
This is the only time ipv4.simulator.uz was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 80.80.218.230 80.80.218.230 | 34718 (TPSUZ-AS ...) (TPSUZ-AS EAST TELECOM ISP ET) | |
7 | 1 |
ASN34718 (TPSUZ-AS EAST TELECOM ISP ET,TPS,EVO, UZ)
PTR: vcsh.vclouds.uz
ipv4.simulator.uz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
simulator.uz
ipv4.simulator.uz |
231 KB |
7 | 1 |
Domain | Requested by | |
---|---|---|
7 | ipv4.simulator.uz |
ipv4.simulator.uz
|
7 | 1 |
Subject Issuer | Validity | Valid | |
---|---|---|---|
simulator.uz R3 |
2024-01-03 - 2024-04-02 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ipv4.simulator.uz/
Frame ID: 6D1E0A8C2141EBCFE93F9571D41166F9
Requests: 7 HTTP requests in this frame
2 Outgoing links
These are links going to different origins than the main page.
Title: Онлайн курсы
Search URL Search Domain Scan URL
Title: Написать в телеграм
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
ipv4.simulator.uz/ |
56 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
client
ipv4.simulator.uz/DLab_files/ |
84 KB 26 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.jpg
ipv4.simulator.uz/DLab_files/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.jpg
ipv4.simulator.uz/DLab_files/ |
79 KB 80 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.jpg
ipv4.simulator.uz/DLab_files/ |
112 KB 112 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.tsx
ipv4.simulator.uz/DLab_files/ |
2 KB 1 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
@react-refresh
ipv4.simulator.uz/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ipv4.simulator.uz
80.80.218.230
43c91c1b0aa4c1963c366e4f5414c854c7558ea954c55eed233d3cd124c816e8
608bab56011302822ec2d4e3c94fdda8d5b441a3f890f43034449a0d8a449e24
bddb34eb451b6eca0d3d85b497801faa050f9024962928c5e30edbefb9343cfd
d4c5aa8f0e1a0a7479201e63fb68603e5444a0065fb8310fb784074d11201aa1
e374e31de55e6bba1f53c81909b78e0f8c214ba5f3e1a29d41ba65fa260f4a04
f5f916dee38b62e7c30f2da16380b2fccb3f81895bc871cd8e992a66ec336651