64.8.139.61
Open in
urlscan Pro
64.8.139.61
Public Scan
Effective URL: https://64.8.139.61/login?redir=%2Fng
Submission: On October 26 via manual from US
Summary
TLS certificate: Issued by FortiGate on October 25th 2019. Valid for: 10 years.
This is the only time 64.8.139.61 was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 14 | 64.8.139.61 64.8.139.61 | 1998 (STATE-OF-MN) (STATE-OF-MN) | |
13 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 | 0 |
Domain | Requested by | |
---|---|---|
13 | 0 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
FortiGate FortiGate |
2019-10-25 - 2029-10-25 |
10 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://64.8.139.61/login?redir=%2Fng
Frame ID: 4898097AB095D003A2DAD50B41C65B7B
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://64.8.139.61/
HTTP 302
https://64.8.139.61/ Page URL
- https://64.8.139.61/ng Page URL
- https://64.8.139.61/logout?redir=%2Fng Page URL
- https://64.8.139.61/login?redir=%2Fng Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://64.8.139.61/
HTTP 302
https://64.8.139.61/ Page URL
- https://64.8.139.61/ng Page URL
- https://64.8.139.61/logout?redir=%2Fng Page URL
- https://64.8.139.61/login?redir=%2Fng Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://64.8.139.61/ HTTP 302
- https://64.8.139.61/
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
64.8.139.61/ Redirect Chain
|
76 B 463 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ng
64.8.139.61/ |
6 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
require_all.js
64.8.139.61/be4e03557fd0cb05b2110f29c739199a/js/ |
27 KB 10 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/0.9 |
ng_all.js
64.8.139.61/be4e03557fd0cb05b2110f29c739199a/ng/ |
123 B 123 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/0.9 |
ng_all.js
64.8.139.61/be4e03557fd0cb05b2110f29c739199a/ng/ |
123 B 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
state
64.8.139.61/api/v2/monitor/web-ui/ |
525 B 934 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
logout
64.8.139.61/ |
76 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
Cookie set
login
64.8.139.61/ |
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main-green.css
64.8.139.61/be4e03557fd0cb05b2110f29c739199a/css/ |
999 KB 91 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.js
64.8.139.61/be4e03557fd0cb05b2110f29c739199a/js/ |
7 KB 3 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
en.json
64.8.139.61/be4e03557fd0cb05b2110f29c739199a/lang/ |
741 KB 187 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lato-regular.woff2
64.8.139.61/be4e03557fd0cb05b2110f29c739199a/fonts/ |
27 KB 28 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ftnt-icons.woff
64.8.139.61/be4e03557fd0cb05b2110f29c739199a/fonts/ |
40 KB 40 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
53 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes object| fgt_lang object| my_xmlhttp boolean| buf_request_in_progress object| ftm_push_status_timeout object| elm_username object| elm_secretkey object| elm_twofactor object| elm_authtoken object| elm_tokenmsg object| elm_tokencode object| elm_ftm_push_enabled number| ftm_pushed_enabled object| elm_button object| str_table string| GUI_LOGIN_STATUS_OK string| GUI_LOGIN_STATUS_LOCKOUT string| GUI_LOGIN_STATUS_NEED_TFA string| GUI_LOGIN_STATUS_CHANGE_PWD string| GUI_LOGIN_STATUS_FTM_PUSH_PARAMS string| GUI_LOGIN_STATUS_FTM_PUSH_STATUS string| GUI_LOGIN_STATUS_FTM_PUSH_FAILURE string| FNBAM_SUCCESS string| FNBAM_DENIED string| FNBAM_PENDING string| FNBAM_ERROR function| getQueryValue function| login_sso function| login_send_request function| handle_buffer_statechange function| addQuery function| try_login function| trigger_ftm_push function| get_ftm_push_status function| start_ftm_push_poll function| cancel_ftm_push_poll function| update_error_status_line function| clear_error_status_line function| update_warning_status_line function| handle_buffer_ready function| disable_input function| reenable_input function| login_get_cmd_kbd_event function| login_crack_kbd_event function| key_pressdown function| update_token_msg function| showToken function| clear_input function| abort_current_request string| FNBAM_NEED_TOKEN0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | frame-ancestors 'self' |
Strict-Transport-Security | max-age=15552000 |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
64.8.139.61
04cae1634c8df12cb37c8a0c22b78d77cbd9fba396f14353c4143e1ff6a4c799
0c76edd76812558784cda76b3a12847548c5cfa797d873039a2511c1e1adf58b
2ee055921e5460e768980da0e441063d23f4320ea15e232a4f77ffcbe5b4f74f
6569aba55a086c821c43ff37a3333eeca29f1f1ffd477d707b90de74245948fe
6e2dc916e6858f85a889e0c79690b68feb4a6dbfca3322d0763608f631351323
6fda65a02da1128ff29c17b2099db275e8204d1032de86699f2482d05761e8f9
748aff55ce918b0ecefe33dc4e951392177c0254e800f06a6836f5a82dc8586e
79a93b375184b8405b69d6ae69266bf0ddddd37142b89bea9602f8ca772807ad
8ae04059e9297745fb3f6b5fb4b6fdf9ddef56d5f2cf3c4c545a4bb703b61895
8f4c598d30a387a23539cb31d559ef1ac61e4a10380570c4f5e470d3614be8e7
979d2e684375c8a71592ce0d088aee06ce1e39b1ee4cf92e66ba3f98ca3ad3ce