pay-mock-client.truelayer-sandbox.com
Open in
urlscan Pro
2606:4700::6812:bf3
Public Scan
Submission: On July 08 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by WE1 on June 20th 2024. Valid for: 3 months.
This is the only time pay-mock-client.truelayer-sandbox.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2606:4700::68... 2606:4700::6812:bf3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 1 |
ASN13335 (CLOUDFLARENET, US)
pay-mock-client.truelayer-sandbox.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
truelayer-sandbox.com
pay-mock-client.truelayer-sandbox.com |
64 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | pay-mock-client.truelayer-sandbox.com |
pay-mock-client.truelayer-sandbox.com
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
truelayer-sandbox.com WE1 |
2024-06-20 - 2024-09-18 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://pay-mock-client.truelayer-sandbox.com/
Frame ID: 012441CCFFE1D1004B79A152EF8AC487
Requests: 5 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
pay-mock-client.truelayer-sandbox.com/ |
553 B 801 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.f8824e12.js
pay-mock-client.truelayer-sandbox.com/static/js/ |
150 KB 49 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.d44b9bf0.css
pay-mock-client.truelayer-sandbox.com/static/css/ |
1 KB 703 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.42e4999c8f867c1b19a9df7d030a7648.svg
pay-mock-client.truelayer-sandbox.com/static/media/ |
15 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
pay-mock-client.truelayer-sandbox.com/ |
91 KB 10 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| webpackChunkpayments_mock_client0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
X-Content-Type-Options | nosniff |
X-Frame-Options | none |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
pay-mock-client.truelayer-sandbox.com
2606:4700::6812:bf3
2c9bc00a718f9d3f213a75fded01de7caaf043cadd59d37c1c88ab4901341024
677070424e48ff951bf2ca7d965d3e7822606af33e226afe7e049c4f0312a823
6a56cc7739abed438ed8179b19bc9c57952107fc22acd058a93ab5e1af6e2e69
c8e25c66b9962abe9fb060816d4639b28bb0af8c66d84464f399b6e132328d52
fc90dc91b433c7eafa26069a20a47d441fff07523c4380dd4b8928a19928253e