8171.pass.gov.pk
Open in
urlscan Pro
2a06:98c1:3120::3
Public Scan
Effective URL: https://8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/TrackingMain.aspx?AspxAutoDetectCookieSupport=1
Submission: On April 05 via manual from PK — Scanned from NL
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on July 4th 2022. Valid for: a year.
This is the only time 8171.pass.gov.pk was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 15 | 2a06:98c1:312... 2a06:98c1:3120::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
14 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
pass.gov.pk
1 redirects
8171.pass.gov.pk |
261 KB |
14 | 1 |
Domain | Requested by | |
---|---|---|
15 | 8171.pass.gov.pk |
1 redirects
8171.pass.gov.pk
|
14 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-07-04 - 2023-07-04 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/TrackingMain.aspx?AspxAutoDetectCookieSupport=1
Frame ID: 94F7604EDDCC094B99AF9D47FD5B77C8
Requests: 11 HTTP requests in this frame
Frame:
https://8171.pass.gov.pk/cdn-cgi/challenge-platform/h/g/scripts/alpha/invisible.js?ts=1680652800
Frame ID: 7179FF20BD3597E7F44FD98BB7E5B9F8
Requests: 3 HTTP requests in this frame
Screenshot
Page Title
8171 ویب پورٹلPage URL History Show full URLs
-
https://8171.pass.gov.pk/?AspxAutoDetectCookieSupport=1
HTTP 302
https://8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/TrackingMain.aspx?AspxAutoDetectCookieSupp... Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- \.aspx?(?:$|\?)
- <input[^>]+name="__VIEWSTATE
DataTables (JavaScript Libraries) Expand
Detected patterns
- dataTables.*\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://8171.pass.gov.pk/?AspxAutoDetectCookieSupport=1
HTTP 302
https://8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/TrackingMain.aspx?AspxAutoDetectCookieSupport=1 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
TrackingMain.aspx
8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/ Redirect Chain
|
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/scripts/ |
119 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.min.css
8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/scripts/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.dataTables.css
8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/scripts/ |
15 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
buttons.dataTables.min.css
8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/scripts/ |
9 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/scripts/ |
87 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.dataTables.min.js
8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/scripts/ |
80 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/scripts/ |
39 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bisp_full_banner_tracker.png
8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/images/ |
34 KB 34 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Captcha.ashx
8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/ |
2 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
MehrNastaliqWebRegular.ttf
8171.pass.gov.pk/(X(1)S(rtoyrl31hxykat2imjhptxgw))/fonts/ |
99 KB 100 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
invisible.js
8171.pass.gov.pk/cdn-cgi/challenge-platform/h/g/scripts/alpha/ Frame 7179 |
25 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
pica.js
8171.pass.gov.pk/cdn-cgi/challenge-platform/h/g/scripts/ Frame 7179 |
6 KB 4 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
7b2dd26fae61b8eb
8171.pass.gov.pk/cdn-cgi/challenge-platform/h/g/cv/result/ Frame 7179 |
2 B 659 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 boolean| credentialless function| $ function| jQuery function| isNumberKey function| alphaOnly function| cnic_validate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.pass.gov.pk/ | Name: __cf_bm Value: DaaJ7kdxoIVDEWwQ3IRHsmZEOlLmptjKuFeujhWgoy8-1680656090-0-AQQiXPX0oQ20Sktvix8MSgY6ESSQZixfnvXvbkKmTp9/WxqUKmwSv3/NF3447XgggFgCjVMQ93lFLKUDwgFSGH4hcZBGYIVYORJmr1IpJuuHEFJkm5vLkmTKfx84v6pgXQ== |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
8171.pass.gov.pk
2a06:98c1:3120::3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