www.junglepilots.com
Open in
urlscan Pro
2606:4700:3037::6812:28eb
Public Scan
Effective URL: https://www.junglepilots.com/survey/19141/source=5c77a31fd63f41042710cd26/subid=5c77a31fd63f41042710cd26/subid2=&firstname=Se...
Submission: On April 16 via api from BE
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on March 23rd 2020. Valid for: 7 months.
This is the only time www.junglepilots.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 212.103.47.140 212.103.47.140 | 38964 (BALTNETAS) (BALTNETAS) | |
2 2 | 2606:4700:303... 2606:4700:3030::681b:8083 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 1 | 2606:4700:303... 2606:4700:3037::681b:826c | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
11 | 2606:4700:303... 2606:4700:3037::6812:28eb | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2a00:1450:400... 2a00:1450:4001:809::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2606:4700:303... 2606:4700:3030::681b:bb84 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 52.219.72.191 52.219.72.191 | 16509 (AMAZON-02) (AMAZON-02) | |
4 | 2a00:1450:400... 2a00:1450:4001:816::2003 | 15169 (GOOGLE) (GOOGLE) | |
21 | 5 |
ASN38964 (BALTNETAS, LV)
PTR: servera.promotiontactics.net
www.promotiontactics.net |
ASN16509 (AMAZON-02, US)
PTR: s3.eu-central-1.amazonaws.com
s3-eu-central-1.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
junglepilots.com
www.junglepilots.com |
116 KB |
4 |
gstatic.com
fonts.gstatic.com |
31 KB |
2 |
amazonaws.com
s3-eu-central-1.amazonaws.com |
49 KB |
2 |
pandapluss.com
pandapluss.com |
8 KB |
2 |
googleapis.com
fonts.googleapis.com |
1 KB |
2 |
turbocommands.org
2 redirects
www.turbocommands.org |
2 KB |
1 |
peakdivision.net
1 redirects
www.peakdivision.net |
717 B |
1 |
promotiontactics.net
1 redirects
www.promotiontactics.net |
504 B |
21 | 8 |
Domain | Requested by | |
---|---|---|
11 | www.junglepilots.com |
www.junglepilots.com
|
4 | fonts.gstatic.com |
www.junglepilots.com
|
2 | s3-eu-central-1.amazonaws.com |
www.junglepilots.com
|
2 | pandapluss.com |
www.junglepilots.com
pandapluss.com |
2 | fonts.googleapis.com |
www.junglepilots.com
|
2 | www.turbocommands.org | 2 redirects |
1 | www.peakdivision.net | 1 redirects |
1 | www.promotiontactics.net | 1 redirects |
21 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-03-23 - 2020-10-09 |
7 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-04-01 - 2020-06-24 |
3 months | crt.sh |
*.s3.eu-central-1.amazonaws.com DigiCert Baltimore CA-2 G2 |
2019-11-09 - 2020-12-10 |
a year | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-04-01 - 2020-06-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.junglepilots.com/survey/19141/source=5c77a31fd63f41042710cd26/subid=5c77a31fd63f41042710cd26/subid2=&firstname=Sebastien&lastname=Bearzatto&address=Chaussee%20D%C2%92engh%2048a&zipcode=%5B%5B%5BZIPCODE%5D%5D%5D&mobile=&city=Hoves&email=%5B%5B%5BEMAIL%5D%5D%5D/nrp=5e98f092fcaa97528df780bd
Frame ID: F32DDDABE0034458FEB34D09B58B3F27
Requests: 21 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.promotiontactics.net/Link/?url=&clnt=4d3d8&utm_medium=e&utm_campaign=a2&cv=56b249...
HTTP 302
https://www.turbocommands.org/survey/gegnanipho/source=12846/subid=e:BnHSKkq4jQSvFDkzeMB8mBnQpmpgZOAKaGQ5E... HTTP 302
https://www.turbocommands.org/urlshort_test/uid_long=30236&tracking_id=39288576&token=mpqdcfahEEyCkJvP5kwL... HTTP 302
https://www.peakdivision.net/tracking/5aaf87dc54770535beefcf23?src=5c77a31fd63f41042710cd26&s1=&s2=7mRUp&... HTTP 302
https://www.junglepilots.com/survey/19141/source=5c77a31fd63f41042710cd26/subid=5c77a31fd63f41042710cd26/... Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.promotiontactics.net/Link/?url=&clnt=4d3d8&utm_medium=e&utm_campaign=a2&cv=56b2498495327ce57cfb511f&slid=1
HTTP 302
https://www.turbocommands.org/survey/gegnanipho/source=12846/subid=e:BnHSKkq4jQSvFDkzeMB8mBnQpmpgZOAKaGQ5EjBKkZU&subid2=promotiontactics.net&subid3=12846&firstname=Sebastien&surname=Bearzatto&address=Chaussee+D%C2%92engh+48a&city=Hoves&phone=498907437/nrp=dhkwipvkmcwi8q7ren6bvnwue HTTP 302
https://www.turbocommands.org/urlshort_test/uid_long=30236&tracking_id=39288576&token=mpqdcfahEEyCkJvP5kwLAFGv69nlMjgBfsVK4rhI&preview=0&subid_json=eyJzdWJpZDEiOiJlOkJuSFNLa3E0alFTdkZEa3plTUI4bUJuUXBtcGdaT0FLYUdRNUVqQktrWlUiLCJzdWJpZCI6ImU6Qm5IU0trcTRqUVN2RkRremVNQjhtQm5RcG1wZ1pPQUthR1E1RWpCS2taVSIsInN1YmlkMiI6InByb21vdGlvbnRhY3RpY3MubmV0Iiwic3ViaWQzIjoiMTI4NDYiLCJmaXJzdG5hbWUiOiJTZWJhc3RpZW4iLCJzdXJuYW1lIjoiQmVhcnphdHRvIiwiYWRkcmVzcyI6IkNoYXVzc2VlK0RcdTAwOTJlbmdoKzQ4YSIsImNpdHkiOiJIb3ZlcyIsInBob25lIjoiNDk4OTA3NDM3In0= HTTP 302
https://www.peakdivision.net/tracking/5aaf87dc54770535beefcf23?src=5c77a31fd63f41042710cd26&s1=&s2=7mRUp&s3=&s4=&s5=&k=5e54ec98935cad332518d1d0&firstname=Sebastien&lastname=Bearzatto&address=Chaussee+D%C2%92engh+48a&zipcode=[[[ZIPCODE]]]&emailaddress=[[[EMAIL]]]&city=Hoves HTTP 302
https://www.junglepilots.com/survey/19141/source=5c77a31fd63f41042710cd26/subid=5c77a31fd63f41042710cd26/subid2=&firstname=Sebastien&lastname=Bearzatto&address=Chaussee%20D%C2%92engh%2048a&zipcode=%5B%5B%5BZIPCODE%5D%5D%5D&mobile=&city=Hoves&email=%5B%5B%5BEMAIL%5D%5D%5D/nrp=5e98f092fcaa97528df780bd Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
nrp=5e98f092fcaa97528df780bd
www.junglepilots.com/survey/19141/source=5c77a31fd63f41042710cd26/subid=5c77a31fd63f41042710cd26/subid2=&firstname=Sebastien&lastname=Bearzatto&address=Chaussee%20D%C2%92engh%2048a&zipcode=%5B%5B%5... Redirect Chain
|
23 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
www.junglepilots.com/assets/font-awesome/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
www.junglepilots.com/js/ |
278 KB 79 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.cookie.js
www.junglepilots.com/js/plugins/jqueryCookie/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
track_trace_v2.css
www.junglepilots.com/css/tpl_css/track_trace_v2/ |
33 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
backend.css
www.junglepilots.com/css/ |
2 KB 734 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
currency_cnd2.js
www.junglepilots.com/custom_js/ |
1 KB 534 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
5 KB 694 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
embed.js
pandapluss.com/ |
22 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Lidl-3_logolight.png
s3-eu-central-1.amazonaws.com/igamingcloudstr/images/ |
40 KB 40 KB |
Image
image/jpg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
202002241346_cloned_202002241344_cloned_202002181225_cloned_202002171303_cloned_202002171301_cloned_20200217091945_checkout_ip11.png
www.junglepilots.com/uploads/products/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
socialfn1.png
s3-eu-central-1.amazonaws.com/igamingcloudstr/images/ |
9 KB 10 KB |
Image
image/jpg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
763 B 445 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icons.svg
www.junglepilots.com/img/track_trace_v2/ |
7 KB 2 KB |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pxiByp8kv8JHgFVrLEj6Z1xlFd2JQEk.woff2
fonts.gstatic.com/s/poppins/v9/ |
8 KB 8 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pxiEyp8kv8JHgFVrJJfecnFHGPc.woff2
fonts.gstatic.com/s/poppins/v9/ |
8 KB 8 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pxiByp8kv8JHgFVrLGT9Z1xlFd2JQEk.woff2
fonts.gstatic.com/s/poppins/v9/ |
8 KB 8 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pxiByp8kv8JHgFVrLCz7Z1xlFd2JQEk.woff2
fonts.gstatic.com/s/poppins/v9/ |
8 KB 8 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
survey
www.junglepilots.com/survey/ |
154 B 519 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
survey
www.junglepilots.com/survey/ |
19 B 554 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
pandapluss.com/pull/ |
19 B 416 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| countdown function| plushLoaded number| current_question object| questions number| survey_id function| lastStep function| renderQuestions function| renderAnswers function| showQuestion function| trackAnswer function| setConversion function| setProductImpression function| setServerPixel function| trackProductClick function| loadSurveyQuestions function| Plush boolean| plushExecuted4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.junglepilots.com/ | Name: survey_id_22125 Value: true |
|
www.junglepilots.com/ | Name: b2ZmZXJXYWxs Value: %7B%22campaign%22%3A%2219141%22%2C%22survey%22%3A22125%2C%22source%22%3A%225c77a31fd63f41042710cd26%22%2C%22subid%22%3A%22subid2%3D%26firstname%3DSebastien%26lastname%3DBearzatto%26address%3DChaussee%20D%C2%92engh%2048a%26zipcode%3D%5B%5B%5BZIPCODE%5D%5D%5D%26mobile%3D%26city%3DHoves%26email%3D%5B%5B%5BEMAIL%5D%5D%5D%22%2C%22firstSession%22%3A%22Z0ydHyqkrGOgmo0nEvhjdwI4KYubCzm9PLGyvz9O_19141%22%7D |
|
www.junglepilots.com/ | Name: laravel_session Value: eyJpdiI6InF5OGZwRFRRS2plRjRcL09IdDd3M25RPT0iLCJ2YWx1ZSI6InpHMUVnTG1pVGZzUlVcL0xIYWlWNk9MMGs1bU1GK2ZwZkRLcTZaYjYyWVwva1hoTjdadlFyWDZuNGV3Q3N5eE5QbTZrTE5TN2xtZVBLVElSMkFmSVJXMVE9PSIsIm1hYyI6IjRjMTc5ZGI2NjAwODU5ZmJlOWY4ZjY5NTQ2ZmM3MTU1Y2IzZGI5ZDYzZjRhNzEyNjE0OTAxZjBhYTA5OGNlMGYifQ%3D%3D |
|
.junglepilots.com/ | Name: __cfduid Value: d2b927685ed7c0fae41333df7111ed9b61587081362 |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
pandapluss.com
s3-eu-central-1.amazonaws.com
www.junglepilots.com
www.peakdivision.net
www.promotiontactics.net
www.turbocommands.org
212.103.47.140
2606:4700:3030::681b:8083
2606:4700:3030::681b:bb84
2606:4700:3037::6812:28eb
2606:4700:3037::681b:826c
2a00:1450:4001:809::200a
2a00:1450:4001:816::2003
52.219.72.191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