URL: https://pass.bitsafe.systems/
Submission: On October 01 via automatic, source certstream-suspicious

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 8 HTTP transactions. The main IP is 45.32.82.236, located in Los Angeles, United States and belongs to AS-CHOOPA - Choopa, LLC, US. The main domain is pass.bitsafe.systems.
TLS certificate: Issued by Let's Encrypt Authority X3 on October 1st 2019. Valid for: 3 months.
This is the only time pass.bitsafe.systems was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
8 45.32.82.236 20473 (AS-CHOOPA)
8 1
Apex Domain
Subdomains
Transfer
8 bitsafe.systems
pass.bitsafe.systems
1 MB
8 1
Domain Requested by
8 pass.bitsafe.systems pass.bitsafe.systems
8 1

This site contains no links.

Subject Issuer Validity Valid
pass.bitsafe.systems
Let's Encrypt Authority X3
2019-10-01 -
2019-12-30
3 months crt.sh

This page contains 1 frames:

Primary Page: https://pass.bitsafe.systems/
Frame ID: C8E4F62AAE9EEC7BD230ED5071304EB3
Requests: 8 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

8
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1433 kB
Transfer

5657 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

8 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
pass.bitsafe.systems/
1 KB
1 KB
Document
General
Full URL
https://pass.bitsafe.systems/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.32.82.236 Los Angeles, United States, ASN20473 (AS-CHOOPA - Choopa, LLC, US),
Reverse DNS
45.32.82.236.vultr.com
Software
nginx /
Resource Hash
81acbcfe5f1e0d7fd926f9bb1fdf81b26090bd9e1397fa91b0bc3b384f566fc8
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
pass.bitsafe.systems
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
navigate
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

status
200
server
nginx
date
Tue, 01 Oct 2019 02:54:35 GMT
content-type
text/html
vary
Accept-Encoding
last-modified
Sat, 07 Sep 2019 19:38:16 GMT
etag
W/"1d565b3cb33814a"
strict-transport-security
max-age=15768000
referrer-policy
same-origin
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
x-frame-options
SAMEORIGIN
x-robots-tag
noindex, nofollow
content-encoding
gzip
main.e7dfe733886d05f0edd0.css
pass.bitsafe.systems/app/
252 KB
44 KB
Stylesheet
General
Full URL
https://pass.bitsafe.systems/app/main.e7dfe733886d05f0edd0.css
Requested by
Host: pass.bitsafe.systems
URL: https://pass.bitsafe.systems/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.32.82.236 Los Angeles, United States, ASN20473 (AS-CHOOPA - Choopa, LLC, US),
Reverse DNS
45.32.82.236.vultr.com
Software
nginx /
Resource Hash
1502f0b6882b43860f3fccd153fc3e21e333d4cef0713c79dadb0d0917a3b604
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://pass.bitsafe.systems/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 01 Oct 2019 02:54:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
strict-transport-security
max-age=15768000
x-xss-protection
1; mode=block
referrer-policy
same-origin
last-modified
Sat, 07 Sep 2019 19:38:16 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
W/"1d565b3cb30740a"
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=1209600
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
x-robots-tag
noindex, nofollow
logo-dark@2x.png
pass.bitsafe.systems/images/
9 KB
10 KB
Image
General
Full URL
https://pass.bitsafe.systems/images/logo-dark@2x.png
Requested by
Host: pass.bitsafe.systems
URL: https://pass.bitsafe.systems/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.32.82.236 Los Angeles, United States, ASN20473 (AS-CHOOPA - Choopa, LLC, US),
Reverse DNS
45.32.82.236.vultr.com
Software
nginx /
Resource Hash
d828792675dbb585e167217ba4cdb9356b12f0e0b72aad927d3e54603fdce86c
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://pass.bitsafe.systems/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 01 Oct 2019 02:54:36 GMT
x-content-type-options
nosniff
status
200
content-length
9319
x-xss-protection
1; mode=block
referrer-policy
same-origin
last-modified
Sat, 07 Sep 2019 19:38:16 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"1d565b3cb33a067"
strict-transport-security
max-age=15768000
content-type
image/png
cache-control
max-age=604800
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
accept-ranges
bytes
x-robots-tag
noindex, nofollow
polyfills.e7dfe733886d05f0edd0.js
pass.bitsafe.systems/app/
137 KB
45 KB
Script
General
Full URL
https://pass.bitsafe.systems/app/polyfills.e7dfe733886d05f0edd0.js
Requested by
Host: pass.bitsafe.systems
URL: https://pass.bitsafe.systems/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.32.82.236 Los Angeles, United States, ASN20473 (AS-CHOOPA - Choopa, LLC, US),
Reverse DNS
45.32.82.236.vultr.com
Software
nginx /
Resource Hash
1f12545190774dd7b79124891914587e939e94bb33a0a26ca4fbf93c1ea5e2f3
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://pass.bitsafe.systems/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 01 Oct 2019 02:54:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
strict-transport-security
max-age=15768000
x-xss-protection
1; mode=block
referrer-policy
same-origin
last-modified
Sat, 07 Sep 2019 19:38:16 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
W/"1d565b3cb31a731"
vary
Accept-Encoding
content-type
application/javascript
cache-control
max-age=1209600
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
x-robots-tag
noindex, nofollow
vendor.e7dfe733886d05f0edd0.js
pass.bitsafe.systems/app/
2 MB
836 KB
Script
General
Full URL
https://pass.bitsafe.systems/app/vendor.e7dfe733886d05f0edd0.js
Requested by
Host: pass.bitsafe.systems
URL: https://pass.bitsafe.systems/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.32.82.236 Los Angeles, United States, ASN20473 (AS-CHOOPA - Choopa, LLC, US),
Reverse DNS
45.32.82.236.vultr.com
Software
nginx /
Resource Hash
70d5221ac906f64684216d4f57ec6693933b4f491c7a4ed98425dac6ad7f11ec
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://pass.bitsafe.systems/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 01 Oct 2019 02:54:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
strict-transport-security
max-age=15768000
x-xss-protection
1; mode=block
referrer-policy
same-origin
last-modified
Sat, 07 Sep 2019 19:38:16 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
W/"1d565b3cb1679ac"
vary
Accept-Encoding
content-type
application/javascript
cache-control
max-age=1209600
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
x-robots-tag
noindex, nofollow
main.e7dfe733886d05f0edd0.js
pass.bitsafe.systems/app/
3 MB
367 KB
Script
General
Full URL
https://pass.bitsafe.systems/app/main.e7dfe733886d05f0edd0.js
Requested by
Host: pass.bitsafe.systems
URL: https://pass.bitsafe.systems/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.32.82.236 Los Angeles, United States, ASN20473 (AS-CHOOPA - Choopa, LLC, US),
Reverse DNS
45.32.82.236.vultr.com
Software
nginx /
Resource Hash
47fca5600c66149afb554d12f64cbd20069f367155e442757519d038f66f49dd
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://pass.bitsafe.systems/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 01 Oct 2019 02:54:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
strict-transport-security
max-age=15768000
x-xss-protection
1; mode=block
referrer-policy
same-origin
last-modified
Sat, 07 Sep 2019 19:38:16 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
W/"1d565b3cb19a016"
vary
Accept-Encoding
content-type
application/javascript
cache-control
max-age=1209600
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
x-robots-tag
noindex, nofollow
fontawesome-webfont.woff2
pass.bitsafe.systems/fonts/
75 KB
76 KB
Font
General
Full URL
https://pass.bitsafe.systems/fonts/fontawesome-webfont.woff2
Requested by
Host: pass.bitsafe.systems
URL: https://pass.bitsafe.systems/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.32.82.236 Los Angeles, United States, ASN20473 (AS-CHOOPA - Choopa, LLC, US),
Reverse DNS
45.32.82.236.vultr.com
Software
nginx /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://pass.bitsafe.systems/app/main.e7dfe733886d05f0edd0.css
Origin
https://pass.bitsafe.systems
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 01 Oct 2019 02:54:37 GMT
x-content-type-options
nosniff
status
200
content-length
77160
x-xss-protection
1; mode=block
referrer-policy
same-origin
last-modified
Sat, 07 Sep 2019 19:38:16 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"1d565b3cb32a968"
strict-transport-security
max-age=15768000
content-type
font/woff2
cache-control
max-age=1209600
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
accept-ranges
bytes
x-robots-tag
noindex, nofollow
Open_Sans-normal-400.woff
pass.bitsafe.systems/fonts/
54 KB
55 KB
Font
General
Full URL
https://pass.bitsafe.systems/fonts/Open_Sans-normal-400.woff
Requested by
Host: pass.bitsafe.systems
URL: https://pass.bitsafe.systems/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.32.82.236 Los Angeles, United States, ASN20473 (AS-CHOOPA - Choopa, LLC, US),
Reverse DNS
45.32.82.236.vultr.com
Software
nginx /
Resource Hash
2770b375eb18d7a74fbbd60a0f9a14214857770f35dac85ce9c5daf9353faf97
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://pass.bitsafe.systems/app/main.e7dfe733886d05f0edd0.css
Origin
https://pass.bitsafe.systems
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 01 Oct 2019 02:54:37 GMT
x-content-type-options
nosniff
status
200
content-length
55268
x-xss-protection
1; mode=block
referrer-policy
same-origin
last-modified
Sat, 07 Sep 2019 19:38:16 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
"1d565b3cb3353e4"
strict-transport-security
max-age=15768000
content-type
application/font-woff
cache-control
max-age=1209600
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
accept-ranges
bytes
x-robots-tag
noindex, nofollow

Verdicts & Comments Add Verdict or Comment

150 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| core object| __core-js_shared__ function| Zone function| __zone_symbol__Promise function| __zone_symbol__ZoneAwarePromise function| __zone_symbol__setTimeout function| __zone_symbol__clearTimeout function| __zone_symbol__setInterval function| __zone_symbol__clearInterval function| __zone_symbol__requestAnimationFrame function| __zone_symbol__cancelAnimationFrame function| __zone_symbol__webkitRequestAnimationFrame function| __zone_symbol__webkitCancelAnimationFrame function| __zone_symbol__alert function| __zone_symbol__prompt function| __zone_symbol__confirm function| __zone_symbol__MutationObserver function| __zone_symbol__WebKitMutationObserver function| __zone_symbol__IntersectionObserver function| __zone_symbol__FileReader boolean| __zone_symbol__ononabortpatched boolean| __zone_symbol__ononanimationendpatched boolean| __zone_symbol__ononanimationiterationpatched boolean| __zone_symbol__ononauxclickpatched boolean| __zone_symbol__ononblurpatched boolean| __zone_symbol__ononcancelpatched boolean| __zone_symbol__ononcanplaypatched boolean| __zone_symbol__ononcanplaythroughpatched boolean| __zone_symbol__ononchangepatched boolean| __zone_symbol__ononcuechangepatched boolean| __zone_symbol__ononclickpatched boolean| __zone_symbol__ononclosepatched boolean| __zone_symbol__ononcontextmenupatched boolean| __zone_symbol__onondblclickpatched boolean| __zone_symbol__onondragpatched boolean| __zone_symbol__onondragendpatched boolean| __zone_symbol__onondragenterpatched boolean| __zone_symbol__onondragleavepatched boolean| __zone_symbol__onondragoverpatched boolean| __zone_symbol__onondroppatched boolean| __zone_symbol__onondurationchangepatched boolean| __zone_symbol__ononemptiedpatched boolean| __zone_symbol__ononendedpatched boolean| __zone_symbol__ononerrorpatched boolean| __zone_symbol__ononfocuspatched boolean| __zone_symbol__onongotpointercapturepatched boolean| __zone_symbol__ononinputpatched boolean| __zone_symbol__ononinvalidpatched boolean| __zone_symbol__ononkeydownpatched boolean| __zone_symbol__ononkeypresspatched boolean| __zone_symbol__ononkeyuppatched boolean| __zone_symbol__ononloadpatched boolean| __zone_symbol__ononloadstartpatched boolean| __zone_symbol__ononloadeddatapatched boolean| __zone_symbol__ononloadedmetadatapatched boolean| __zone_symbol__ononlostpointercapturepatched boolean| __zone_symbol__ononmousedownpatched boolean| __zone_symbol__ononmouseenterpatched boolean| __zone_symbol__ononmouseleavepatched boolean| __zone_symbol__ononmousemovepatched boolean| __zone_symbol__ononmouseoutpatched boolean| __zone_symbol__ononmouseoverpatched boolean| __zone_symbol__ononmouseuppatched boolean| __zone_symbol__ononmousewheelpatched boolean| __zone_symbol__ononpausepatched boolean| __zone_symbol__ononplaypatched boolean| __zone_symbol__ononplayingpatched boolean| __zone_symbol__ononpointercancelpatched boolean| __zone_symbol__ononpointerdownpatched boolean| __zone_symbol__ononpointerenterpatched boolean| __zone_symbol__ononpointerleavepatched boolean| __zone_symbol__ononpointermovepatched boolean| __zone_symbol__ononpointeroverpatched boolean| __zone_symbol__ononpointeruppatched boolean| __zone_symbol__ononprogresspatched boolean| __zone_symbol__ononratechangepatched boolean| __zone_symbol__ononresetpatched boolean| __zone_symbol__ononresizepatched boolean| __zone_symbol__ononscrollpatched boolean| __zone_symbol__ononseekedpatched boolean| __zone_symbol__ononseekingpatched boolean| __zone_symbol__ononselectpatched boolean| __zone_symbol__ononselectionchangepatched boolean| __zone_symbol__ononselectstartpatched boolean| __zone_symbol__ononstalledpatched boolean| __zone_symbol__ononsubmitpatched boolean| __zone_symbol__ononsuspendpatched boolean| __zone_symbol__onontimeupdatepatched boolean| __zone_symbol__ononvolumechangepatched boolean| __zone_symbol__onontransitionendpatched boolean| __zone_symbol__ononwaitingpatched boolean| __zone_symbol__ononwheelpatched boolean| __zone_symbol__onontogglepatched boolean| __zone_symbol__ononafterprintpatched boolean| __zone_symbol__ononappinstalledpatched boolean| __zone_symbol__ononbeforeinstallpromptpatched boolean| __zone_symbol__ononbeforeprintpatched boolean| __zone_symbol__ononbeforeunloadpatched boolean| __zone_symbol__onondevicemotionpatched boolean| __zone_symbol__onondeviceorientationpatched boolean| __zone_symbol__onondeviceorientationabsolutepatched boolean| __zone_symbol__ononhashchangepatched boolean| __zone_symbol__ononlanguagechangepatched boolean| __zone_symbol__ononmessagepatched boolean| __zone_symbol__ononofflinepatched boolean| __zone_symbol__onononlinepatched boolean| __zone_symbol__ononpageshowpatched boolean| __zone_symbol__ononpagehidepatched boolean| __zone_symbol__ononpopstatepatched boolean| __zone_symbol__ononrejectionhandledpatched boolean| __zone_symbol__ononstoragepatched boolean| __zone_symbol__ononunhandledrejectionpatched boolean| __zone_symbol__ononunloadpatched boolean| __zone_symbol__onondragstartpatched boolean| __zone_symbol__ononanimationstartpatched boolean| __zone_symbol__ononsearchpatched boolean| __zone_symbol__ononwebkitanimationendpatched boolean| __zone_symbol__ononwebkitanimationiterationpatched boolean| __zone_symbol__ononwebkitanimationstartpatched boolean| __zone_symbol__ononwebkittransitionendpatched boolean| __zone_symbol__ononpointeroutpatched boolean| __zone_symbol__ononmessageerrorpatched object| webpackJsonp object| ngDevMode object| __zone_symbol__loadfalse object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate function| Dict function| delay object| _ function| swal function| sweetAlert string| GoogleAnalyticsObject function| ga object| bitwardenContainerService object| ng object| __zone_symbol__popstatefalse object| __zone_symbol__hashchangefalse function| __zone_symbol__addEventListener function| __zone_symbol__removeEventListener undefined| __zone_symbol__eventListeners undefined| __zone_symbol__removeAllListeners function| eventListeners function| removeAllListeners

0 Cookies

2 Console Messages

Source Level URL
Text
console-api error URL: https://pass.bitsafe.systems/app/vendor.e7dfe733886d05f0edd0.js(Line 566)
Message:
ERROR TypeError: Cannot read property 'getItem' of null
console-api error URL: https://pass.bitsafe.systems/app/vendor.e7dfe733886d05f0edd0.js(Line 566)
Message:
ERROR Error: Uncaught (in promise): TypeError: Cannot read property 'getItem' of null TypeError: Cannot read property 'getItem' of null at n.get (https://pass.bitsafe.systems/app/main.e7dfe733886d05f0edd0.js:1:2556653) at n.<anonymous> (https://pass.bitsafe.systems/app/main.e7dfe733886d05f0edd0.js:1:2556350) at https://pass.bitsafe.systems/app/main.e7dfe733886d05f0edd0.js:1:2555570 at Object.next (https://pass.bitsafe.systems/app/main.e7dfe733886d05f0edd0.js:1:2555675) at https://pass.bitsafe.systems/app/main.e7dfe733886d05f0edd0.js:1:2554588 at new t (https://pass.bitsafe.systems/app/polyfills.e7dfe733886d05f0edd0.js:8:13933) at t (https://pass.bitsafe.systems/app/main.e7dfe733886d05f0edd0.js:1:2554365) at n.init (https://pass.bitsafe.systems/app/main.e7dfe733886d05f0edd0.js:1:2556255) at Object.<anonymous> (https://pass.bitsafe.systems/app/main.e7dfe733886d05f0edd0.js:1:2552508) at https://pass.bitsafe.systems/app/main.e7dfe733886d05f0edd0.js:1:2550201

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com; frame-src 'self' https://*.duosecurity.com; connect-src 'self' wss://pass.bitsafe.systems https://api.pwnedpasswords.com https://twofactorauth.org; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block