sftphyd.pega.com
Open in
urlscan Pro
103.38.88.115
Public Scan
Effective URL: https://sftphyd.pega.com/login
Submission: On March 04 via manual from GB
Summary
TLS certificate: Issued by Go Daddy Secure Certificate Authority... on October 1st 2020. Valid for: a year.
This is the only time sftphyd.pega.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 14 | 103.38.88.115 103.38.88.115 | 133006 (PEGABLR-A...) (PEGABLR-AS Pega Systems Worldwide India Pvt Ltd) | |
13 | 1 |
ASN133006 (PEGABLR-AS Pega Systems Worldwide India Pvt Ltd, IN)
sftphyd.pega.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
pega.com
1 redirects
sftphyd.pega.com |
162 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
14 | sftphyd.pega.com |
1 redirects
sftphyd.pega.com
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sftphyd.pega.com Go Daddy Secure Certificate Authority - G2 |
2020-10-01 - 2021-10-03 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://sftphyd.pega.com/login
Frame ID: 1CF25D785C07D99E1BF65D511E47D7DA
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://sftphyd.pega.com/
HTTP 302
https://sftphyd.pega.com/login Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://sftphyd.pega.com/
HTTP 302
https://sftphyd.pega.com/login Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.0 |
Primary Request
Cookie set
login
sftphyd.pega.com/ Redirect Chain
|
9 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
sftphyd.pega.com/css/ |
119 KB 28 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
default-theme.css
sftphyd.pega.com/custom/css/ |
3 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.min.css
sftphyd.pega.com/css/ |
7 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.5.1.min.js
sftphyd.pega.com/js/ |
87 KB 40 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
sftphyd.pega.com/js/ |
39 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.0 |
i18.js
sftphyd.pega.com/lang/ |
26 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cftp.functions.js
sftphyd.pega.com/js/ |
11 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.jpg
sftphyd.pega.com/images/logo/ |
3 KB 4 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
user_avatar.png
sftphyd.pega.com/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-icon.png
sftphyd.pega.com/images/ |
11 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.jpg
sftphyd.pega.com/images/ |
13 KB 14 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glyphicons-halflings-regular.woff2
sftphyd.pega.com/fonts/ |
18 KB 19 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
38 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery object| cftp_msg object| cftp_timerId object| before number| timerInterval number| timeoutRedirectInterval function| passwordFormGroupCtrl function| addPasswordDialogClickHandler function| resetStatus function| clearStatus function| addWarningMsg function| unescapeHtml function| addStatusMsg function| clearText function| updateTips function| number_format function| size_format function| clipboardShowTooltip function| clipboardFallbackMessage function| getWaitMessage function| handleJsonFail function| ajaxLoginIdleCheck function| loginIdleCheckDone function| loginIdleCheckFail function| performIdleCheck function| toggleTimer function| getCSRFToken function| setupCSRFTokenInsertion2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
sftphyd.pega.com/ | Name: BIGipServersftpin_https.app~sftpin_https_pool Value: 188485804.47873.0000 |
|
sftphyd.pega.com/ | Name: cftpSID Value: _e9B5TAQCpQxX5g_Nm308KUtawe8fAPCDM6d_LsS7PM |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | default-src 'self' 'unsafe-inline' 'unsafe-eval'; frame-ancestors 'self'; frame-src 'self' https://www.google.com/recaptcha/ *.duosecurity.com *.duofederal.com; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/; img-src 'self' data: blob:; media-src 'self' blob: |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
sftphyd.pega.com
103.38.88.115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