www.blacklist.broad-study.com
Open in
urlscan Pro
162.19.234.8
Public Scan
Effective URL: https://www.blacklist.broad-study.com/login
Submission: On June 01 via api from US — Scanned from FR
Summary
TLS certificate: Issued by R3 on May 21st 2024. Valid for: 3 months.
This is the only time www.blacklist.broad-study.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 162.19.234.8 162.19.234.8 | 16276 (OVH) (OVH) | |
2 | 2a00:1450:400... 2a00:1450:4001:812::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:827::2003 | 15169 (GOOGLE) (GOOGLE) | |
12 | 3 |
ASN16276 (OVH, FR)
PTR: ns3231233.ip-162-19-234.eu
www.blacklist.broad-study.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
broad-study.com
1 redirects
www.blacklist.broad-study.com |
643 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 33 |
2 KB |
1 |
gstatic.com
fonts.gstatic.com |
16 KB |
12 | 3 |
Domain | Requested by | |
---|---|---|
10 | www.blacklist.broad-study.com |
1 redirects
www.blacklist.broad-study.com
|
2 | fonts.googleapis.com |
www.blacklist.broad-study.com
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
12 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
backoffice.efficientamentofacile.it R3 |
2024-05-21 - 2024-08-19 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-05-13 - 2024-08-05 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-05-13 - 2024-08-05 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.blacklist.broad-study.com/login
Frame ID: F2B08CF5992660A25CEECB0C9FAAE2BD
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
EfficientamentoFacilePage URL History Show full URLs
-
https://www.blacklist.broad-study.com/
HTTP 302
https://www.blacklist.broad-study.com/login Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
DataTables (JavaScript Libraries) Expand
Detected patterns
- dataTables.*\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.blacklist.broad-study.com/
HTTP 302
https://www.blacklist.broad-study.com/login Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login
www.blacklist.broad-study.com/ Redirect Chain
|
78 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icheck-bootstrap.min.css
www.blacklist.broad-study.com/vendor/icheck-bootstrap/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
www.blacklist.broad-study.com/css/backoffice/ |
1 MB 140 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
datatable-bootstrap4.min.css
www.blacklist.broad-study.com/style-dataTables/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
AdminLTELogo.png
www.blacklist.broad-study.com/vendor/adminlte/dist/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.js
www.blacklist.broad-study.com/js/backoffice/ |
1 MB 402 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
datatable-bootstrap4.min.js
www.blacklist.broad-study.com/style-dataTables/ |
5 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 959 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
16 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
webfa-solid-900.woff2
www.blacklist.broad-study.com/fonts/vendor/@fortawesome/fontawesome-free/ |
76 KB 77 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
XRXI3I6Li01BKofiOc5wtlZ2di8HDLshdTQ3jw.woff2
fonts.gstatic.com/s/nunito/v26/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon-32x32.png
www.blacklist.broad-study.com/favicon/ |
920 B 1 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
53 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| route function| _ function| Popper function| jQuery function| $ string| csrfToken function| axios function| tinycolor object| spectrum object| ParsleyExtend object| ParsleyConfig object| psly object| Parsley object| ParsleyUtils object| ParsleyValidator object| ParsleyUI string| inputEventPatched function| Swal function| ClipboardJS object| summernote object| PNotify function| moment object| select2Options function| initSelect2 function| getSelect2InitValue function| copyValueSelect2 function| disableSelect2 object| datatable_translate object| _configDataTable function| initDataTable function| Loader function| Validator function| Chart object| chartJsOptions function| initCharts function| download function| DownloadFromUrl function| setDefaults function| SwalConfirmation function| FireErrorAlert function| initTooltip function| ToggleElement function| SetTableQuickSearch function| initDatePicker function| strToMoney function| initColorPicker function| SetProgressBarValue function| ToggleCardLoading boolean| stopLoopingTimeouts object| $jscomp function| $jscomp$lookupPolyfilledValue object| stackBottomRight object| genericLoader2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.blacklist.broad-study.com/ | Name: XSRF-TOKEN Value: eyJpdiI6Ilo2YWUyUXEzNUdNTUtFUlEvdW9GL0E9PSIsInZhbHVlIjoiK2tJZTYySGhRVS9ub3c0cEF6VVVHdEMvWTZ1OTZTYW5ZSHZEd1FsR2JEL0Q2TGJ2MVZZV0M1ZDJsb21Kb2x5UXNlbUNqQ3JjdGZ6SUNFNEs2dkQxT3JoR2tBUUM4TVExVVJPQnhCMTFhei92ZnRiR2xJekVuTGFiN2hidEZoY0MiLCJtYWMiOiIzNWVmZDNiNzAxNzY2N2YxMWE0MmNkODEyMDZkMDY0YmEwMmM1ODQzYzc0YjEwZjJhZmU1YzVkMjE4NTEzYTMxIiwidGFnIjoiIn0%3D |
|
www.blacklist.broad-study.com/ | Name: efficientamentofacile_session Value: eyJpdiI6Ik1QV3I1T3VwUHpYNjZ1MUpXdSs1VXc9PSIsInZhbHVlIjoiYkQxYU9RaVNOVmNMVUdBdU1OTFNacndJUEFpQXRsRURwTjIxQTg5NjBCUGp4NDFsUVRlcnVlQjdDVUhRaXJYdlZ3Y2E1NFFodzdod2NGWWNzOHh5Q2ZQK0FNREppckNnbk0wRC9VL0VMZ1F4TjFmMlVxVW5aakpidHNRUnp6TloiLCJtYWMiOiIxNWFhMmNkYjhkMjZlZTUzMzZmYTg4NjVlOGVkYTQ5ZWJlNTFhYjg2NWVjM2E3OTU1NGVlZTdiNGViNjI0MjQwIiwidGFnIjoiIn0%3D |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
www.blacklist.broad-study.com
162.19.234.8
2a00:1450:4001:812::200a
2a00:1450:4001:827::2003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