Submitted URL: https://www.ftalliance.com.au/data/accrossborder_attachments/33_fta_winter_19_web%20(1).pdf
Effective URL: https://www.ftalliance.com.au/data/accrossborder_attachments/33_fta_winter_19_web%20(1).pdf
Submission: On November 13 via manual from FR

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 168.1.8.122, located in Sydney, Australia and belongs to SOFTLAYER - SoftLayer Technologies Inc., US. The main domain is www.ftalliance.com.au.
TLS certificate: Issued by COMODO RSA Domain Validation Secure S... on December 7th 2018. Valid for: a year.
This is the only time www.ftalliance.com.au was scanned on urlscan.io!

urlscan.io Verdict: No classification

Downloads These files were downloaded by the website

Domain & IP information

IP Address AS Autonomous System
1 168.1.8.122 36351 (SOFTLAYER)
1 1
Apex Domain
Subdomains
Transfer
1 ftalliance.com.au
www.ftalliance.com.au
1 1
Domain Requested by
1 www.ftalliance.com.au
1 1

This site contains no links.

Subject Issuer Validity Valid
www.ftalliance.com.au
COMODO RSA Domain Validation Secure Server CA
2018-12-07 -
2019-12-07
a year crt.sh

This page contains 1 frames:

Primary Page: https://www.ftalliance.com.au/data/accrossborder_attachments/33_fta_winter_19_web%20(1).pdf
Frame ID: F0BF1BE94632B1706DE0E15D7409AFB1
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request 33_fta_winter_19_web%20(1).pdf
www.ftalliance.com.au/data/accrossborder_attachments/
0
0
Document
General
Full URL
https://www.ftalliance.com.au/data/accrossborder_attachments/33_fta_winter_19_web%20(1).pdf
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
168.1.8.122 Sydney, Australia, ASN36351 (SOFTLAYER - SoftLayer Technologies Inc., US),
Reverse DNS
wweb1701.console-server.net
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
Security Headers
Name Value
X-Frame-Options sameorigin

Request headers

:method
GET
:authority
www.ftalliance.com.au
:scheme
https
:path
/data/accrossborder_attachments/33_fta_winter_19_web%20(1).pdf
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
navigate
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

status
200
content-type
application/pdf
last-modified
Wed, 26 Jun 2019 23:49:14 GMT
accept-ranges
bytes
etag
"e16178c2792cd51:0"
server
Microsoft-IIS/10.0
x-powered-by
ASP.NET
x-powered-by-plesk
PleskWin
x-frame-options
sameorigin
date
Wed, 13 Nov 2019 13:27:32 GMT
content-length
11310573

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options sameorigin

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

www.ftalliance.com.au
168.1.8.122