webdownload.hunton.com
Open in
urlscan Pro
2620:1ec:bdf::45
Public Scan
Submission: On April 21 via api from US
Summary
This is the only time webdownload.hunton.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 2620:1ec:bdf::45 2620:1ec:bdf::45 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 2 | 2606:4700:10:... 2606:4700:10::ac43:c5e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
huntonak.com
1 redirects
www.huntonak.com |
2 KB |
2 |
hunton.com
webdownload.hunton.com |
27 MB |
3 | 2 |
Domain | Requested by | |
---|---|---|
2 | www.huntonak.com |
1 redirects
webdownload.hunton.com
|
2 | webdownload.hunton.com |
webdownload.hunton.com
|
3 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-07-05 - 2021-07-05 |
a year | crt.sh |
This page contains 1 frames:
Frame:
https://www.huntonak.com/en/people/jonathan-reichman/vcard.vcf
Frame ID: 630A37F16BC34103C7287428BAEC179E
Requests: 3 HTTP requests in this frame
Screenshot
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- url /\.aspx?(?:$|\?)/i
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
IIS (Web Servers) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- https://www.huntonak.com/vcards/72213.vcf HTTP 301
- https://www.huntonak.com/en/people/jonathan-reichman/vcard.vcf
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
vcard.aspx
webdownload.hunton.com/esignature/ |
2 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
attorney.json
webdownload.hunton.com/esignature/ |
27 MB 27 MB |
XHR
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vcard.vcf
www.huntonak.com/en/people/jonathan-reichman/ Redirect Chain
|
0 0 |
Document
text/vcard |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated string| redirectbaseURL function| getUrlParameter function| loadJSON string| id0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
webdownload.hunton.com
www.huntonak.com
2606:4700:10::ac43:c5e
2620:1ec:bdf::45
6c22b117768abb565aafc300763382eaa2bdb42091a9791ab294937f6a3192de