www.royalpayback.com
Open in
urlscan Pro
2606:4700:30::681c:1c23
Public Scan
Effective URL: https://www.royalpayback.com/survey/adidsnorw/source=10523/subid=e:VM-K5atxAb8sdS7tddfcow&subid2=winestewardarmy.com&subid3=1...
Submission: On October 07 via manual from NO
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on August 26th 2019. Valid for: a year.
This is the only time www.royalpayback.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 51.68.107.238 51.68.107.238 | 16276 (OVH) (OVH) | |
14 | 2606:4700:30:... 2606:4700:30::681c:1c23 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 23.111.9.35 23.111.9.35 | 33438 (HIGHWINDS2) (HIGHWINDS2 - Highwinds Network Group) | |
1 | 2a00:1450:400... 2a00:1450:4001:817::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
16 | 3 |
ASN16276 (OVH, FR)
PTR: 238.107.68.51.winestewardarmy.com
link.winestewardarmy.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
www.royalpayback.com |
ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US)
use.fontawesome.com |
ASN15169 (GOOGLE - Google LLC, US)
fonts.googleapis.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
royalpayback.com
www.royalpayback.com |
200 KB |
1 |
googleapis.com
fonts.googleapis.com |
443 B |
1 |
fontawesome.com
use.fontawesome.com |
12 KB |
1 |
winestewardarmy.com
1 redirects
link.winestewardarmy.com |
484 B |
16 | 4 |
Domain | Requested by | |
---|---|---|
14 | www.royalpayback.com |
www.royalpayback.com
|
1 | fonts.googleapis.com |
www.royalpayback.com
|
1 | use.fontawesome.com |
www.royalpayback.com
|
1 | link.winestewardarmy.com | 1 redirects |
16 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-08-26 - 2020-08-25 |
a year | crt.sh |
*.fontawesome.com DigiCert SHA2 Secure Server CA |
2018-09-17 - 2019-11-21 |
a year | crt.sh |
*.googleapis.com GTS CA 1O1 |
2019-09-17 - 2019-12-10 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.royalpayback.com/survey/adidsnorw/source=10523/subid=e:VM-K5atxAb8sdS7tddfcow&subid2=winestewardarmy.com&subid3=10523&firstname=Mat&surname=Veg&address=Meg&email=marianne.vegsund%40nordea.no&zipcode=166&city=Oslo&phone=/nrp=jc956a9krp24an86q1m0zw3sk
Frame ID: EB2FEBF85378D3261A50B46ECC171EFA
Requests: 16 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://link.winestewardarmy.com/ga/click/2-82492362-6204-08709-54140-77759-09555a44a3-454ed16513
HTTP 302
https://www.royalpayback.com/survey/adidsnorw/source=10523/subid=e:VM-K5atxAb8sdS7tddfcow&subid2=winestew... Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
- html /<link[^>]* href="https:\/\/use\.fontawesome\.com\/releases\/v([^>]+)\/css\//i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://link.winestewardarmy.com/ga/click/2-82492362-6204-08709-54140-77759-09555a44a3-454ed16513
HTTP 302
https://www.royalpayback.com/survey/adidsnorw/source=10523/subid=e:VM-K5atxAb8sdS7tddfcow&subid2=winestewardarmy.com&subid3=10523&firstname=Mat&surname=Veg&address=Meg&email=marianne.vegsund%40nordea.no&zipcode=166&city=Oslo&phone=/nrp=jc956a9krp24an86q1m0zw3sk Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
nrp=jc956a9krp24an86q1m0zw3sk
www.royalpayback.com/survey/adidsnorw/source=10523/subid=e:VM-K5atxAb8sdS7tddfcow&subid2=winestewardarmy.com&subid3=10523&firstname=Mat&surname=Veg&address=Meg&email=marianne.vegsund%40nordea.no&zi... Redirect Chain
|
18 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
backend.css
www.royalpayback.com/css/ |
2 KB 689 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
www.royalpayback.com/css/bootstrap-4.1.3/ |
138 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
www.royalpayback.com/assets/font-awesome/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
www.royalpayback.com/js/ |
278 KB 79 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
www.royalpayback.com/js/bootstrap-4.1.3/ |
50 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.cookie.js
www.royalpayback.com/js/plugins/jqueryCookie/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.plugin.js
www.royalpayback.com/js/plugins/jquery_countdown/ |
11 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
currency_cnd2.js
www.royalpayback.com/custom_js/ |
1 KB 572 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
use.fontawesome.com/releases/v5.2.0/css/ |
46 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
20190913104615_fake%20adidas%20logo.PNG
www.royalpayback.com/uploads/ |
35 KB 35 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
20190523181638_Settingsicon.png
www.royalpayback.com/uploads/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
20190918100855_adidas-gift7(1).png
www.royalpayback.com/uploads/products/ |
33 KB 33 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
763 B 443 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
survey
www.royalpayback.com/survey/ |
746 B 754 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
survey
www.royalpayback.com/survey/ |
14 B 508 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
22 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery object| bootstrap object| jQuery111308884133636089395 function| JQClass function| countdown number| current_question object| questions number| survey_id function| renderQuestions function| renderAnswers function| activateButtons function| migrateProductDescriptions function| showQuestion function| trackAnswer function| setConversion function| setProductImpression function| setServerPixel function| trackProductClick function| loadSurveyQuestions4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.royalpayback.com/ | Name: b2ZmZXJXYWxs Value: %7B%22campaign%22%3A%2216598%22%2C%22survey%22%3A19010%2C%22source%22%3A%2210523%22%2C%22subid%22%3A%22subid%3De%3AVM-K5atxAb8sdS7tddfcow%26subid2%3Dwinestewardarmy.com%26subid3%3D10523%26firstname%3DMat%26surname%3DVeg%26address%3DMeg%26email%3Dmarianne.vegsund%40nordea.no%26zipcode%3D166%26city%3DOslo%26phone%3D%22%2C%22firstSession%22%3A%22boF0Fb8yI3gUynIgm8ohLSZ6scLnnCQheAzbuFCW_16598%22%7D |
|
www.royalpayback.com/ | Name: laravel_session Value: eyJpdiI6IlVTeHdMZHY4Znc0UlR0SlR5MzN1RkE9PSIsInZhbHVlIjoiNjJ0Rm1Xc3pNYUk1akxZUVVHbVYwS3Q0dG5FK1IybFlGSVVNZlRLYllpUWhGUm16VU5MZk8xcGZWQmtqVGJEMUFkdXA0eEJNYWlxVkU0bUNUVEJwdlE9PSIsIm1hYyI6ImZhNmIzMTEwOTQyZWY3ZDRlN2UzMDI1ZjNmMTQzYTdlNTZlY2NjNDgyMWYyMzgwYWU2OGRjODE2YjAxZjE3ZWIifQ%3D%3D |
|
www.royalpayback.com/ | Name: survey_id_19010 Value: true |
|
.royalpayback.com/ | Name: __cfduid Value: dfaeae050377c88e959ff37cf415137701570431270 |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
link.winestewardarmy.com
use.fontawesome.com
www.royalpayback.com
23.111.9.35
2606:4700:30::681c:1c23
2a00:1450:4001:817::200a
51.68.107.238
2065aecca0fb9b0567358d352ed5f1ab72fce139bf449b4d09805f5d9c3725ed
35f15c61a7e55bfc8066ae8a61ce78b9a0bffde787dd4aefb5c294ee03d4bdc8
4362ccb3cb56d9b2317269320ff7edd2c81464047746ca72f196491be8da62a0
546f22daa21fdc336f4ea6181ca8c4a4dd5282dde72115f0bf3aa69e3b835b41
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
8891a160f8a2afb81de5259f9f68e5af3782348ea2927ad9e969bc88c7d39984
92b53042cd52b50a9f842e366e836ea10ee04ad565ecd49ee389d1d0031b0209
930bd3dca9f0581f01df5c4d8e9e14e555eb55a9e1e4344f95927becf7e5b158
a622350a3111aaf7604a74c743f00d4b6d2d2a3ea805628744147d94aeb5581c
b24eb9638260837328cb57cc88a42c7472eebcef0d23ad953073901d3bf41c6d
b84161c9fbf7520cd14e7019f92120bd87a928a074156e91a992eba9fc9436e8
ccdc2f2a7a716655ee0e5604046dec02277fbc59252dbc59067d29582e027e58
d1b923bd321edf1b6d8c70e83fc400818a545d8eb54f5f671fa81b871a9b3f2b
d7793635b3a67ad46bb0f738f17326d1d4de4ef3e9a2a2ee4ac4e318a77dabd0
dc0bdaf52935bb4c744ff8c9b096c0e56ac2a35f3e2636bdfc1f5e5426adbd9b
ff4610869c48d9eefb45f127331f4203f8624db93d14cb268c69c38cfc77620e