a4696.ursa.ngqm2.net
Open in
urlscan Pro
13.57.162.169
Public Scan
Submission: On December 07 via api from DE
Summary
This is the only time a4696.ursa.ngqm2.net was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 13.57.162.169 13.57.162.169 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:3b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
2 | 2 |
ASN16509 (AMAZON-02, US)
PTR: ec2-13-57-162-169.us-west-1.compute.amazonaws.com
a4696.ursa.ngqm2.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
21 KB |
1 |
ngqm2.net
a4696.ursa.ngqm2.net |
3 KB |
2 | 2 |
Domain | Requested by | |
---|---|---|
1 | stackpath.bootstrapcdn.com |
a4696.ursa.ngqm2.net
|
1 | a4696.ursa.ngqm2.net | |
2 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2020-09-22 - 2021-10-12 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://a4696.ursa.ngqm2.net/
Frame ID: 3FD194E8BB22E676DC27DD158B24B1E6
Requests: 2 HTTP requests in this frame
Screenshot
Detected technologies
Erlang (Programming Languages) ExpandDetected patterns
- headers server /^Cowboy$/i
Ruby (Programming Languages) Expand
Detected patterns
- meta csrf-param /^authenticity_token$/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Cowboy (Web Frameworks) Expand
Detected patterns
- headers server /^Cowboy$/i
Ruby on Rails (Web Frameworks) Expand
Detected patterns
- meta csrf-param /^authenticity_token$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
a4696.ursa.ngqm2.net/ |
2 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.1.3/css/ |
138 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
a4696.ursa.ngqm2.net/ | Name: _quick_mail_session Value: cyt4RDhDbUxtMmFyb3VnWEczRThVYXY3dVNwK1Rra2xicGJNZ0JhSlRZQmtPQXhCc2xKVTdXRWprbFkwTkMvdDRiWDNZQWxXaERadXdIb3UrQkV4YmdEeERiU3IzUlM5cXJYbHhqcFJIUVR2VUdhdkM3WUlBRy9TeDd0VmJYWGpCY1lrWVlBaXd2YmJMd1liYWdaYjBnPT0tLU9iSFY4WXRmRHBuR2dZemgxa1Q5ekE9PQ%3D%3D--61c2007729567400f21769e36a0b082d1b480638 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
a4696.ursa.ngqm2.net
stackpath.bootstrapcdn.com
13.57.162.169
2001:4de0:ac19::1:b:3b
03ebc7cf9f9fb7751c998817240e61f6418a49db36680ec3a33442364b3b177b
7928b5ab63c6e89ee0ee26f5ef201a58c72baf91abb688580a1aa26eb57b3c11