bwtaqua-ch.demo.conexo-portal.com
Open in
urlscan Pro
2a03:4000:54:e6a:d8f4:cff:feb8:6ee2
Public Scan
Effective URL: https://bwtaqua-ch.demo.conexo-portal.com/login/auth
Submission Tags: @phish_report
Submission: On June 17 via api from FI — Scanned from CH
Summary
TLS certificate: Issued by R11 on June 17th 2024. Valid for: 3 months.
This is the only time bwtaqua-ch.demo.conexo-portal.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 2a03:4000:54:... 2a03:4000:54:e6a:d8f4:cff:feb8:6ee2 | 197540 (NETCUP-AS...) (NETCUP-AS netcup GmbH) | |
9 | 2 |
ASN197540 (NETCUP-AS netcup GmbH, DE)
bwtaqua-ch.demo.conexo-portal.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
conexo-portal.com
1 redirects
bwtaqua-ch.demo.conexo-portal.com |
3 MB |
9 | 1 |
Domain | Requested by | |
---|---|---|
10 | bwtaqua-ch.demo.conexo-portal.com |
1 redirects
bwtaqua-ch.demo.conexo-portal.com
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bwtaqua-ch.demo.conexo-portal.com R11 |
2024-06-17 - 2024-09-15 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bwtaqua-ch.demo.conexo-portal.com/login/auth
Frame ID: 333F92BED6BA8EA7B22ACE059E6F74C8
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
CONEXO Portal | LoginPage URL History Show full URLs
-
http://bwtaqua-ch.demo.conexo-portal.com/
HTTP 307
https://bwtaqua-ch.demo.conexo-portal.com/ HTTP 302
https://bwtaqua-ch.demo.conexo-portal.com/login/auth Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bwtaqua-ch.demo.conexo-portal.com/
HTTP 307
https://bwtaqua-ch.demo.conexo-portal.com/ HTTP 302
https://bwtaqua-ch.demo.conexo-portal.com/login/auth Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
auth
bwtaqua-ch.demo.conexo-portal.com/login/ Redirect Chain
|
48 KB 48 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
application-731fcc2bd324c000ce8a8825bdb5e305.css
bwtaqua-ch.demo.conexo-portal.com/assets/ |
984 KB 985 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-845710746cd3a2d5d696cc7d6ff81185.js
bwtaqua-ch.demo.conexo-portal.com/assets/ |
88 KB 88 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
application-c61d3d802a70697f0bab86764dc2b87a.js
bwtaqua-ch.demo.conexo-portal.com/assets/ |
498 KB 498 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mdb5-fd9139ca4efb58ec47392f8a526cabdc.js
bwtaqua-ch.demo.conexo-portal.com/assets/ |
765 KB 765 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
26 KB 26 KB |
Image
image/pngpng |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto-Medium-webfont-7c2fef29499b03e4623a4ffe2faff2f8.woff
bwtaqua-ch.demo.conexo-portal.com/assets/RobotoMedium/ |
81 KB 81 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto-Light-webfont-b446c2399bb6a115ac0b199f867ca9db.woff
bwtaqua-ch.demo.conexo-portal.com/assets/RobotoLight/ |
79 KB 80 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto-Regular-webfont-ec39515ae8c6f5af6b5f3124f27aa47d.woff
bwtaqua-ch.demo.conexo-portal.com/assets/RobotoRegular/ |
78 KB 79 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon-14173dd066defaff54f404c37ed0ffa6.ico
bwtaqua-ch.demo.conexo-portal.com/assets/ |
12 KB 13 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
54 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage object| _asset_pipeline_loaded_modules function| _asset_pipeline_require object| _asset_pipeline_modules object| process function| $ function| jQuery object| i18n function| showMessage function| showMessageTranslated function| showAlertMessage function| validateError function| resetErrorMessage function| checkIfValueAlreadyExists function| setPrefixToName function| initMDBSelect function| setMultiSelectHideEvent function| waitForElm function| eventForInput function| eventForSelect function| checkToRemoveInvalidClass number| uidEvent object| bootstrap function| moment object| jstz object| tableColumn object| tablePagination object| tableReload object| ajaxMessageHandling object| dropDownSort object| common object| timeout object| deleteButton object| deleteAjaxButton object| editButton object| restoreButton object| copyButton object| selectBox object| message object| dateRangePicker function| daterangepicker object| initModal object| checkbox object| clientSideValidation object| dragAndDropFileUpload object| sessionStorageHandler object| autocomplete object| inputField object| formFieldChange object| mdb function| FileUpload object| main1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bwtaqua-ch.demo.conexo-portal.com/ | Name: JSESSIONID Value: C8D75EAF1BE50243325DC2334D25B95F |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bwtaqua-ch.demo.conexo-portal.com
2a03:4000:54:e6a:d8f4:cff:feb8:6ee2
076f8eeb8e43450c0f17d5e7e2e1253e3b4a85cc47107633c7e76979750e40fe
269c8a362e0927d9d935b55f1e74b74f1bef75610c27a9eca9bbe0cd8299e72a
43f30e2e7058fb2daa02aa7ef5fd467213c49df529c9590de8e1e09bf923b465
502bfbc0193e2881117df9fdb250e96dc68cd568967c2c415e66d542eea6aa91
64f908eed61302028b64dfa15ea0989c1c5ce5a6be49edc130120b79856eeae4
717d25464787e5f7fa13f7cb693f12013b6f48136ebfb25c43ee6efc5c9edfe4
76ffa7157e504320158e90258b437250f517b4aa627d39b3cbbeab0c059b679c
9d583ec6a37744dc1796f340b49afda0d72ec84b14e34a7ec1ab0c78b04c5558
a2e5b66918dd0b145c57e5a7f5eb56de2f1111ba5e04362a70346f83c2a86d70
d1b59e3f0cdf55f576632129ab574efb1701483f290c18828db0df70fc87afb4