URL: http://tuning-challenge-api.herokuapp.com/
Submission Tags: falconsandbox
Submission: On May 11 via api from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 3.219.185.113, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is tuning-challenge-api.herokuapp.com.
This is the only time tuning-challenge-api.herokuapp.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 3.219.185.113 14618 (AMAZON-AES)
1 1
Apex Domain
Subdomains
Transfer
1 herokuapp.com
tuning-challenge-api.herokuapp.com
765 B
1 1
Domain Requested by
1 tuning-challenge-api.herokuapp.com
1 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://tuning-challenge-api.herokuapp.com/
Frame ID: 6549AF0BE9BC9F4482F6F60D4763E00E
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^Cowboy$/i

Overall confidence: 100%
Detected patterns
  • headers server /^Cowboy$/i

Page Statistics

1
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1 kB
Transfer

0 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set /
tuning-challenge-api.herokuapp.com/
139 B
765 B
Document
General
Full URL
http://tuning-challenge-api.herokuapp.com/
Protocol
HTTP/1.1
Server
3.219.185.113 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-219-185-113.compute-1.amazonaws.com
Software
Cowboy / Express
Resource Hash
52c1e7a2c36be28c42455fe1572d7d7918c3180cad99a2b82daa2a38a7e7bb23
Security Headers
Name Value
Content-Security-Policy default-src 'self'
X-Content-Type-Options nosniff

Request headers

Host
tuning-challenge-api.herokuapp.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Server
Cowboy
Connection
keep-alive
X-Powered-By
Express
Access-Control-Allow-Credentials
true
Access-Control-Allow-Methods
GET,PUT,POST,DELETE,OPTIONS
Access-Control-Allow-Headers
Content-Type, Authorization, Content-Length, X-Requested-With
Content-Security-Policy
default-src 'self'
X-Content-Type-Options
nosniff
Content-Type
text/html; charset=utf-8
Content-Length
139
Set-Cookie
connect.sid=s%3AOpMIJSIurxX8XEn3NTm_X7s4JyyG9B8K.JhBaI%2FQKjBGP7WuRBFrQUBcLIb4PNKxTYuV%2BUpFmo%2BE; Path=/; HttpOnly
Vary
Accept-Encoding
Date
Tue, 11 May 2021 03:05:01 GMT
Via
1.1 vegur

Verdicts & Comments Add Verdict or Comment

7 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated

1 Cookies

Domain/Path Name / Value
tuning-challenge-api.herokuapp.com/ Name: connect.sid
Value: s%3AOpMIJSIurxX8XEn3NTm_X7s4JyyG9B8K.JhBaI%2FQKjBGP7WuRBFrQUBcLIb4PNKxTYuV%2BUpFmo%2BE

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'self'
X-Content-Type-Options nosniff

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

tuning-challenge-api.herokuapp.com
3.219.185.113
52c1e7a2c36be28c42455fe1572d7d7918c3180cad99a2b82daa2a38a7e7bb23