www.userspice.jonschroth.com
Open in
urlscan Pro
50.87.151.133
Public Scan
Submission: On July 23 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by R11 on July 23rd 2024. Valid for: 3 months.
This is the only time www.userspice.jonschroth.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 50.87.151.133 50.87.151.133 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
14 | 2 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: braveheartbeverage.com
www.userspice.jonschroth.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
jonschroth.com
www.userspice.jonschroth.com |
196 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 336 |
6 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
13 | www.userspice.jonschroth.com |
www.userspice.jonschroth.com
|
1 | cdnjs.cloudflare.com |
www.userspice.jonschroth.com
|
14 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
userspice.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.userspice.jonschroth.com R11 |
2024-07-23 - 2024-10-21 |
3 months | crt.sh |
cdnjs.cloudflare.com E1 |
2024-06-02 - 2024-08-31 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.userspice.jonschroth.com/
Frame ID: 9930F7A7F63D84E5ECA91C09F30B658C
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
Home UserSpiceDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
DataTables (JavaScript Libraries) Expand
Detected patterns
- dataTables.*\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Glyphicons (Font Scripts) Expand
Detected patterns
- (?:<link[^>]* href=[^>]+glyphicons(?:\.min)?\.css|<img[^>]* src=[^>]+glyphicons)
Popper (Miscellaneous) Expand
Detected patterns
- <script [^>]*src="[^"]*/popper\.js/([0-9.]+)
- /popper\.js/([0-9.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: https://userspice.com/getting-started/
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.userspice.jonschroth.com/ |
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
messages.js
www.userspice.jonschroth.com/users/js/ |
412 B 321 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
glyphicons.css
www.userspice.jonschroth.com/usersc/templates/standard/assets/fonts/ |
11 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
www.userspice.jonschroth.com/usersc/templates/standard/assets/css/ |
158 KB 36 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
datatables.css
www.userspice.jonschroth.com/users/css/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
www.userspice.jonschroth.com/users/fonts/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
www.userspice.jonschroth.com/users/js/ |
87 KB 38 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/2.9.2/umd/ |
18 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
www.userspice.jonschroth.com/usersc/templates/standard/assets/js/ |
62 KB 23 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hamburgers.min.css
www.userspice.jonschroth.com/usersc/templates/standard/assets/css/ |
4 KB 960 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
www.userspice.jonschroth.com/usersc/templates/standard/assets/css/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
www.userspice.jonschroth.com/users/images/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff2
www.userspice.jonschroth.com/users/fonts/fonts/ |
75 KB 75 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
www.userspice.jonschroth.com/ |
1 KB 1 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| usMessage function| $ function| jQuery object| Popper object| bootstrap object| $hamburger1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.userspice.jonschroth.com/ | Name: PHPSESSID Value: cf92969fba15f36206c91d4597eb2c1b |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubdomains; preload |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
www.userspice.jonschroth.com
104.17.24.14
50.87.151.133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