![](/screenshots/ee4fe08a-a2ab-48ac-b343-c37c9e91770a.png)
cyber.identitycomputing.com.au
Open in
urlscan Pro
2406:da1c:671:4f02:8d0f:5e2d:8a9:56b4
Public Scan
Effective URL: https://cyber.identitycomputing.com.au/login
Submission: On March 20 via api from US — Scanned from US
Summary
TLS certificate: Issued by R3 on March 17th 2024. Valid for: 3 months.
This is the only time cyber.identitycomputing.com.au was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 10 | 2406:da1c:671... 2406:da1c:671:4f02:8d0f:5e2d:8a9:56b4 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 52.95.132.186 52.95.132.186 | 16509 (AMAZON-02) (AMAZON-02) | |
9 | 3 |
ASN16509 (AMAZON-02, US)
cyber.identitycomputing.com.au |
ASN16509 (AMAZON-02, US)
PTR: s3-r-w.ap-southeast-2.amazonaws.com
cc09589d-1366-4842-a935-62299b984100.s3.ap-southeast-2.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
identitycomputing.com.au
2 redirects
cyber.identitycomputing.com.au |
2 MB |
1 |
amazonaws.com
cc09589d-1366-4842-a935-62299b984100.s3.ap-southeast-2.amazonaws.com |
17 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
10 | cyber.identitycomputing.com.au |
2 redirects
cyber.identitycomputing.com.au
|
1 | cc09589d-1366-4842-a935-62299b984100.s3.ap-southeast-2.amazonaws.com |
cyber.identitycomputing.com.au
|
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cyber.identitycomputing.com.au R3 |
2024-03-17 - 2024-06-15 |
3 months | crt.sh |
*.s3-ap-southeast-2.amazonaws.com Amazon RSA 2048 M01 |
2024-02-01 - 2025-01-07 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://cyber.identitycomputing.com.au/login
Frame ID: D6E5C1587A0DA690CA9FCE4874EC83FC
Requests: 15 HTTP requests in this frame
Screenshot
![](/screenshots/ee4fe08a-a2ab-48ac-b343-c37c9e91770a.png)
Page Title
Identity Computing | Log inPage URL History Show full URLs
-
https://cyber.identitycomputing.com.au/
HTTP 301
https://cyber.identitycomputing.com.au/awareness-posters HTTP 302
https://cyber.identitycomputing.com.au/login Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://cyber.identitycomputing.com.au/
HTTP 301
https://cyber.identitycomputing.com.au/awareness-posters HTTP 302
https://cyber.identitycomputing.com.au/login Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login
cyber.identitycomputing.com.au/ Redirect Chain
|
48 KB 49 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
google-fonts.woff.css
cyber.identitycomputing.com.au/assets/ |
485 KB 485 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
google-fonts.woff2.css
cyber.identitycomputing.com.au/assets/ |
388 KB 389 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layout.js
cyber.identitycomputing.com.au/assets/layout/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layout.css
cyber.identitycomputing.com.au/assets/layout/ |
795 KB 796 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
colors.css
cyber.identitycomputing.com.au/ |
18 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header_logo.jpg
cc09589d-1366-4842-a935-62299b984100.s3.ap-southeast-2.amazonaws.com/identitycomputing/ |
17 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.js
cyber.identitycomputing.com.au/assets/login/ |
264 KB 265 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login-form.js
cyber.identitycomputing.com.au/assets/login/inc/ |
212 KB 212 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 8 KB |
Font
application/x-font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 8 KB |
Font
application/x-font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 8 KB |
Font
application/x-font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
10 KB 10 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
10 KB 10 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
10 KB 10 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| regeneratorRuntime1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cyber.identitycomputing.com.au/ | Name: webapp Value: fevfjpk23mt7g3dts3e4tcou5s |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | upgrade-insecure-requests; script-src 'self' blob: https://www.gstatic.com https://*.landbot.io https://code.jquery.com https://fast.wistia.com https://altersec.matomo.cloud https://cdn.jsdelivr.net https://cdnjs.cloudflare.com https://widget.frill.co https://js.stripe.com 'nonce-09663b94-9aaa-4346-aee7-407124149b91'; |
Strict-Transport-Security | max-age=31536000; includeSubDomains |
X-Content-Type-Options | nosniff |
X-Frame-Options | DENY |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cc09589d-1366-4842-a935-62299b984100.s3.ap-southeast-2.amazonaws.com
cyber.identitycomputing.com.au
2406:da1c:671:4f02:8d0f:5e2d:8a9:56b4
52.95.132.186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