blog.securitypath.de
Open in
urlscan Pro
85.13.145.134
Public Scan
Effective URL: https://blog.securitypath.de/
Submission: On February 05 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by R3 on February 5th 2023. Valid for: 3 months.
This is the only time blog.securitypath.de was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 9 | 85.13.145.134 85.13.145.134 | 34788 (NMM-AS D) (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68) | |
2 | 185.180.12.68 185.180.12.68 | 60068 (CDN77 ^_^) (CDN77 ^_^) | |
10 | 2 |
ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE)
PTR: dd26534.kasserver.com
www.blog.securitypath.de | |
blog.securitypath.de |
ASN60068 (CDN77 ^_^, GB)
PTR: edge-731.bunnyinfra.net
fonts.bunny.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
securitypath.de
1 redirects
www.blog.securitypath.de blog.securitypath.de |
295 KB |
2 |
bunny.net
fonts.bunny.net — Cisco Umbrella Rank: 14282 |
18 KB |
10 | 2 |
Domain | Requested by | |
---|---|---|
8 | blog.securitypath.de |
blog.securitypath.de
|
2 | fonts.bunny.net |
blog.securitypath.de
fonts.bunny.net |
1 | www.blog.securitypath.de | 1 redirects |
10 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
wordpress.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
blog.securitypath.de R3 |
2023-02-05 - 2023-05-06 |
3 months | crt.sh |
fonts.bunny.net R3 |
2023-01-24 - 2023-04-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://blog.securitypath.de/
Frame ID: A72E454DC1E20972768BDABD25CDFBBE
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Site is undergoing maintenancePage URL History Show full URLs
-
https://www.blog.securitypath.de/
HTTP 301
https://blog.securitypath.de/ Page URL
Detected technologies
WordPress (CMS) ExpandDetected patterns
- <link rel=["']stylesheet["'] [^>]+/wp-(?:content|includes)/
- /wp-(?:content|includes)/
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery Migrate (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]migrate(?:-([\d.]+))?(?:\.min)?\.js(?:\?ver=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: WP Maintenance plugin
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.blog.securitypath.de/
HTTP 301
https://blog.securitypath.de/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
blog.securitypath.de/ Redirect Chain
|
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
blog.securitypath.de/wp-content/plugins/maintenance/load/css/ |
16 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fonts.css
blog.securitypath.de/wp-content/plugins/maintenance/load/css/ |
47 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.bunny.net/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mt-sample-background.jpg
blog.securitypath.de/wp-content/uploads/2023/02/ |
212 KB 214 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
blog.securitypath.de/wp-includes/js/jquery/ |
88 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-migrate.min.js
blog.securitypath.de/wp-includes/js/jquery/ |
11 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.frontend.js
blog.securitypath.de/wp-content/plugins/maintenance/load/js/ |
2 KB 622 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
foundation-icons.woff
blog.securitypath.de/wp-content/plugins/maintenance/load/fonts/ |
31 KB 32 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-latin-400-normal.woff2
fonts.bunny.net/open-sans/files/ |
16 KB 17 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange undefined| $ function| jQuery object| mtnc_front_options0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
blog.securitypath.de
fonts.bunny.net
www.blog.securitypath.de
185.180.12.68
85.13.145.134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