URL: https://frontend.apply.crosslend.dev/
Submission Tags: @phishunt_io
Submission: On January 09 via api from ES

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 18.195.70.207, located in Frankfurt am Main, Germany and belongs to AMAZON-02, US. The main domain is frontend.apply.crosslend.dev.
TLS certificate: Issued by R3 on January 9th 2021. Valid for: 3 months.
This is the only time frontend.apply.crosslend.dev was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 18.195.70.207 16509 (AMAZON-02)
1 1
Apex Domain
Subdomains
Transfer
1 crosslend.dev
frontend.apply.crosslend.dev
361 B
1 1
Domain Requested by
1 frontend.apply.crosslend.dev
1 1

This site contains no links.

Subject Issuer Validity Valid
frontend.apply.crosslend.dev
R3
2021-01-09 -
2021-04-09
3 months crt.sh

This page contains 1 frames:

Primary Page: https://frontend.apply.crosslend.dev/
Frame ID: 89E3279C7045A12CFEEE211E9283225E
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
frontend.apply.crosslend.dev/
0
361 B
Document
General
Full URL
https://frontend.apply.crosslend.dev/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.195.70.207 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-195-70-207.eu-central-1.compute.amazonaws.com
Software
nginx/1.17.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

:method
GET
:authority
frontend.apply.crosslend.dev
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

server
nginx/1.17.8
date
Sat, 09 Jan 2021 21:00:31 GMT
content-type
text/html
content-length
0
last-modified
Thu, 14 May 2020 08:45:32 GMT
etag
"5ebd052c-0"
access-control-allow-origin
*
access-control-allow-methods
GET, POST, OPTIONS
access-control-allow-headers
DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range
access-control-expose-headers
Content-Length,Content-Range
accept-ranges
bytes
strict-transport-security
max-age=15724800; includeSubDomains

Verdicts & Comments Add Verdict or Comment

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

frontend.apply.crosslend.dev
18.195.70.207
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855