URL: https://www.updatetolinux.com/
Submission: On May 02 via automatic, source certstream-suspicious — Scanned from CA

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 65.39.134.174, located in Toronto, Canada and belongs to COGECO-PEER1, CA. The main domain is www.updatetolinux.com.
TLS certificate: Issued by RapidSSL TLS DV RSA Mixed SHA256 2020... on January 19th 2021. Valid for: a year.
This is the only time www.updatetolinux.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 65.39.134.174 13768 (COGECO-PEER1)
2 1
Apex Domain
Subdomains
Transfer
2 updatetolinux.com
www.updatetolinux.com
68 KB
2 1
Domain Requested by
2 www.updatetolinux.com www.updatetolinux.com
2 1

This site contains no links.

Subject Issuer Validity Valid
duluxxperience.starnix.com
RapidSSL TLS DV RSA Mixed SHA256 2020 CA-1
2021-01-19 -
2022-01-19
a year crt.sh

This page contains 1 frames:

Primary Page: https://www.updatetolinux.com/
Frame ID: 51675206A1FCE0FA0368DF02F7DA7AD7
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

Home | Dulux Xperience

Page Statistics

2
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

68 kB
Transfer

69 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.updatetolinux.com/
3 KB
2 KB
Document
General
Full URL
https://www.updatetolinux.com/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
65.39.134.174 Toronto, Canada, ASN13768 (COGECO-PEER1, CA),
Reverse DNS
Software
Apache /
Resource Hash
4b1da9ec655a990935a1cf1ccab809269a0f336c7f8c412f6b0101c21e8028ff
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options sameorigin

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
accept-language
en-CA,en;q=0.9

Response headers

Connection
Keep-Alive
Content-Encoding
gzip
Content-Length
1235
Content-Type
text/html; charset=ISO-8859-1
Date
Mon, 02 May 2022 18:44:27 GMT
Keep-Alive
timeout=5, max=100
Server
Apache
Vary
Accept-Encoding
X-Content-Type-Options
nosniff
X-Frame-Options
sameorigin
Homepageimage.jpg
www.updatetolinux.com/i/
66 KB
66 KB
Image
General
Full URL
https://www.updatetolinux.com/i/Homepageimage.jpg
Requested by
Host: www.updatetolinux.com
URL: https://www.updatetolinux.com/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
65.39.134.174 Toronto, Canada, ASN13768 (COGECO-PEER1, CA),
Reverse DNS
Software
Apache /
Resource Hash
ddd82cae0112a032a648a9c128f52a87c7394d1ce58dc9d5f4bb80c831c2cc9c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options sameorigin

Request headers

accept-language
en-CA,en;q=0.9
Referer
https://www.updatetolinux.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Date
Mon, 02 May 2022 18:44:27 GMT
X-Content-Type-Options
nosniff
Last-Modified
Thu, 10 Apr 2014 19:48:48 GMT
Server
Apache
ETag
"10856-4f6b58170a800"
X-Frame-Options
sameorigin
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
67670

Verdicts & Comments Add Verdict or Comment

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontextlost object| oncontextrestored function| structuredClone function| getScreenDetails

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options sameorigin

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

www.updatetolinux.com
65.39.134.174
4b1da9ec655a990935a1cf1ccab809269a0f336c7f8c412f6b0101c21e8028ff
ddd82cae0112a032a648a9c128f52a87c7394d1ce58dc9d5f4bb80c831c2cc9c