URL: https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
Submission: On September 21 via api from US — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 5 HTTP transactions. The main IP is 39.99.238.141, located in Beijing, China and belongs to ALIBABA-CN-NET Hangzhou Alibaba Advertising Co.,Ltd., CN. The main domain is bugzilla.openanolis.cn.
TLS certificate: Issued by Encryption Everywhere DV TLS CA - G1 on April 27th 2022. Valid for: a year.
This is the only time bugzilla.openanolis.cn was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
5 39.99.238.141 37963 (ALIBABA-C...)
5 1
Apex Domain
Subdomains
Transfer
5 openanolis.cn
bugzilla.openanolis.cn
199 KB
5 1
Domain Requested by
5 bugzilla.openanolis.cn bugzilla.openanolis.cn
5 1

This site contains links to these domains. Also see Links.

Domain
passport.openanolis.cn
bugzilla.readthedocs.org
Subject Issuer Validity Valid
*.openanolis.cn
Encryption Everywhere DV TLS CA - G1
2022-04-27 -
2023-04-28
a year crt.sh

This page contains 1 frames:

Primary Page: https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
Frame ID: 62CB567A02782862922B1DDD21680656
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Bug Access Denied

Detected technologies

Overall confidence: 100%
Detected patterns
  • href="enter_bug\.cgi">

Page Statistics

5
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

199 kB
Transfer

617 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request show_bug.cgi
bugzilla.openanolis.cn/
12 KB
4 KB
Document
General
Full URL
https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
39.99.238.141 Beijing, China, ASN37963 (ALIBABA-CN-NET Hangzhou Alibaba Advertising Co.,Ltd., CN),
Reverse DNS
Software
Apache /
Resource Hash
95073283f7c6e1e75a3b1c15715af9757f2607ca9c8405a52bacb7a0ac1f7644
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

content-disposition
inline; filename="error-2022-09-22.html"
content-encoding
gzip
content-length
3357
content-type
text/html; charset=UTF-8
date
Wed, 21 Sep 2022 18:17:06 GMT
server
Apache
vary
Accept-Encoding
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-xss-protection
1; mode=block
page.cgi
bugzilla.openanolis.cn/
37 KB
37 KB
Script
General
Full URL
https://bugzilla.openanolis.cn/page.cgi?1662521463&id=bayotbase/fielddefs.js
Requested by
Host: bugzilla.openanolis.cn
URL: https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
39.99.238.141 Beijing, China, ASN37963 (ALIBABA-CN-NET Hangzhou Alibaba Advertising Co.,Ltd., CN),
Reverse DNS
Software
Apache /
Resource Hash
e5ef79acbd85882e3d88fd9597dd661a09d4f52aed96c6cb3b87916d4dba4a54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36

Response headers

date
Wed, 21 Sep 2022 18:17:06 GMT
x-content-type-options
nosniff
expires
Thu, 22 Sep 2022 18:17:06 GMT
server
Apache
x-frame-options
SAMEORIGIN
x-xss-protection
1; mode=block
content-type
text/javascript; charset=UTF-8
b8912c60428cd5ed6602ed80e29fa2b6.css
bugzilla.openanolis.cn/data/assets/
59 KB
14 KB
Stylesheet
General
Full URL
https://bugzilla.openanolis.cn/data/assets/b8912c60428cd5ed6602ed80e29fa2b6.css
Requested by
Host: bugzilla.openanolis.cn
URL: https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
39.99.238.141 Beijing, China, ASN37963 (ALIBABA-CN-NET Hangzhou Alibaba Advertising Co.,Ltd., CN),
Reverse DNS
Software
Apache /
Resource Hash
fd260729d032d38acb080d737edea031e6e55f32c9326d47b94924c0ddfb4342

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36

Response headers

date
Wed, 21 Sep 2022 18:17:06 GMT
content-encoding
gzip
last-modified
Wed, 07 Sep 2022 03:31:52 GMT
server
Apache
etag
"ed37-5e80df4314d6a-gzip"
vary
Accept-Encoding
content-type
text/css
accept-ranges
bytes
content-length
14046
fb1be8cecf954227a45d18c8091083d4.js
bugzilla.openanolis.cn/data/assets/
408 KB
117 KB
Script
General
Full URL
https://bugzilla.openanolis.cn/data/assets/fb1be8cecf954227a45d18c8091083d4.js
Requested by
Host: bugzilla.openanolis.cn
URL: https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
39.99.238.141 Beijing, China, ASN37963 (ALIBABA-CN-NET Hangzhou Alibaba Advertising Co.,Ltd., CN),
Reverse DNS
Software
Apache /
Resource Hash
dcc2a08fddbf1568d5d86dc384dc757ab3a37975e03afd18e6aca243fdcd83ad

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36

Response headers

date
Wed, 21 Sep 2022 18:17:06 GMT
content-encoding
gzip
last-modified
Wed, 07 Sep 2022 03:41:32 GMT
server
Apache
etag
"65eab-5e80e16c45b42-gzip"
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
accept-ranges
bytes
ec2868ad675253543205816f7a989da2.js
bugzilla.openanolis.cn/data/assets/
101 KB
26 KB
Script
General
Full URL
https://bugzilla.openanolis.cn/data/assets/ec2868ad675253543205816f7a989da2.js
Requested by
Host: bugzilla.openanolis.cn
URL: https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
39.99.238.141 Beijing, China, ASN37963 (ALIBABA-CN-NET Hangzhou Alibaba Advertising Co.,Ltd., CN),
Reverse DNS
Software
Apache /
Resource Hash
2406ccbbd57e4a7b119af7186120758748d2a71c435bcca1507a196b331aed38

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36

Response headers

date
Wed, 21 Sep 2022 18:17:06 GMT
content-encoding
gzip
last-modified
Wed, 07 Sep 2022 03:31:52 GMT
server
Apache
etag
"192c3-5e80df43168c2-gzip"
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
accept-ranges
bytes
content-length
26740

Verdicts & Comments Add Verdict or Comment

64 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation object| KEYWORDS object| RELATED_FIELDS object| all_classifications object| AGILE_TEAMS object| BB_FIELD_ORDER object| BB_FIELDS object| BB_CONFIG string| classifications object| c_optgroups object| YAHOO function| Base boolean| show_alerts function| absorb object| entityMap function| escapeHtml number| count function| Rpc object| RpcProgressView function| Bug function| getQueryParams function| getQueryString function| show_mini_login_form function| hide_mini_login_form function| show_forgot_form function| hide_forgot_form function| set_language function| display_value function| $ function| jQuery function| unhide_language_selector object| BUGZILLA function| load_hist function| any_matches function| getBzFieldList function| warn function| set_comp_multi function| _value_id function| init_components function| init_products function| init_sub_components function| show_sub_components function| get_selected_items_text function| hide_and_clear_sub_components function| fetch_all_listener function| fetch_all_or_open function| assign_to_default function| reassign_to_default boolean| comp_is_private function| flag_as_private function| flag_as_security function| update_selects function| Sifter object| MicroPlugin function| Selectize object| no_redirect

1 Cookies

Domain/Path Name / Value
bugzilla.openanolis.cn/ Name: Bugzilla_login_request_cookie
Value: hdOObxnx4U

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block