esecretaria.bsm.upf.edu
Open in
urlscan Pro
84.88.91.26
Public Scan
Effective URL: https://esecretaria.bsm.upf.edu/Account/login?ReturnUrl=%2f
Submission: On February 29 via manual from FR — Scanned from ES
Summary
TLS certificate: Issued by GEANT OV RSA CA 4 on April 20th 2023. Valid for: a year.
This is the only time esecretaria.bsm.upf.edu was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 14 | 84.88.91.26 84.88.91.26 | 13041 (CESCA-AC) (CESCA-AC) | |
17 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
upf.edu
1 redirects
esecretaria.bsm.upf.edu |
1 MB |
0 |
gstatic.com
Failed
fonts.gstatic.com Failed |
|
17 | 2 |
Domain | Requested by | |
---|---|---|
14 | esecretaria.bsm.upf.edu |
1 redirects
esecretaria.bsm.upf.edu
|
0 | fonts.gstatic.com Failed |
esecretaria.bsm.upf.edu
|
17 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.bsm.upf.edu GEANT OV RSA CA 4 |
2023-04-20 - 2024-04-19 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://esecretaria.bsm.upf.edu/Account/login?ReturnUrl=%2f
Frame ID: 61E7221BAD03D6A9F7E0741371CC5D43
Requests: 17 HTTP requests in this frame
Screenshot
Page Title
UPF Barcelona School Of ManagementPage URL History Show full URLs
-
https://esecretaria.bsm.upf.edu/
HTTP 302
https://esecretaria.bsm.upf.edu/Account/login?ReturnUrl=%2f Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
animate.css (Web Frameworks) Expand
Detected patterns
- <link [^>]+(?:/([\d.]+)/)?animate\.(?:min\.)?css
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Moment.js (JavaScript Libraries) Expand
Detected patterns
- moment(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- jquery-ui.*\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://esecretaria.bsm.upf.edu/
HTTP 302
https://esecretaria.bsm.upf.edu/Account/login?ReturnUrl=%2f Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login
esecretaria.bsm.upf.edu/Account/ Redirect Chain
|
10 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
esecretaria.bsm.upf.edu/Content/ |
115 KB 115 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.css
esecretaria.bsm.upf.edu/Fonts/font-awesome/css/ |
28 KB 28 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
animate.css
esecretaria.bsm.upf.edu/Content/ |
67 KB 67 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
esecretaria.bsm.upf.edu/Content/ |
128 KB 128 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.cookiebar.css
esecretaria.bsm.upf.edu/Content/CookieBar/ |
685 B 930 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LOGO2019.png
esecretaria.bsm.upf.edu/Content/images/ |
173 KB 173 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-2.1.1.js
esecretaria.bsm.upf.edu/Scripts/jquery/ |
242 KB 242 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui.js
esecretaria.bsm.upf.edu/Scripts/jquery/ |
460 KB 460 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
moment.js
esecretaria.bsm.upf.edu/Scripts/plugins/moment/ |
116 KB 117 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SkCube.js
esecretaria.bsm.upf.edu/Scripts/plugins/SkCube/ |
568 B 829 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.blockUI.js
esecretaria.bsm.upf.edu/Scripts/plugins/blockUI/ |
19 KB 20 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.cookiebar.js
esecretaria.bsm.upf.edu/Scripts/plugins/CookieBar/ |
8 KB 8 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
mem5YaGs126MiZpBA-UN_r8OUuhs.ttf
fonts.gstatic.com/s/opensans/v15/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
mem8YaGs126MiZpBA-UFVZ0e.ttf
fonts.gstatic.com/s/opensans/v15/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
mem5YaGs126MiZpBA-UNirkOUuhs.ttf
fonts.gstatic.com/s/opensans/v15/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
mem5YaGs126MiZpBA-UN7rgOUuhs.ttf
fonts.gstatic.com/s/opensans/v15/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- fonts.gstatic.com
- URL
- http://fonts.gstatic.com/s/opensans/v15/mem5YaGs126MiZpBA-UN_r8OUuhs.ttf
- Domain
- fonts.gstatic.com
- URL
- http://fonts.gstatic.com/s/opensans/v15/mem8YaGs126MiZpBA-UFVZ0e.ttf
- Domain
- fonts.gstatic.com
- URL
- http://fonts.gstatic.com/s/opensans/v15/mem5YaGs126MiZpBA-UNirkOUuhs.ttf
- Domain
- fonts.gstatic.com
- URL
- http://fonts.gstatic.com/s/opensans/v15/mem5YaGs126MiZpBA-UN7rgOUuhs.ttf
Verdicts & Comments Add Verdict or Comment
10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| moment boolean| spinnerVisible function| showProgress function| hideProgress function| checkCookieBrowser function| showCookieFail function| SSOLogin function| callAjaxMethod3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
esecretaria.bsm.upf.edu/ | Name: ASP.NET_SessionId Value: 0zbilveyl2eowyp3hmssglcq |
|
esecretaria.bsm.upf.edu/ | Name: __RequestVerificationToken Value: wV6d3_2CqvUwusFU_iOM8awHjnGshXqCKUK5Z_HZ_SHuHFMrvfvvXoWnxjYnzWKV8HqGLBR4_toPvh-BoGLgYwFYpy7iQW65DeusbL8jUTo1 |
|
esecretaria.bsm.upf.edu/ | Name: cb-enabled Value: enabled |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
esecretaria.bsm.upf.edu
fonts.gstatic.com
fonts.gstatic.com
84.88.91.26
140ff438eaaede046f1ceba27579d16dc980595709391873fa9bf74d7dbe53ac
197a3158f61657c73d4448238bdc68a29c11bc0658912d899e04fbe8aa7aaef2
368e9f13ac981caed8234a22b137856fa66a610dbaae309e61b41c6c67efaad3
43309dc3f867766cb0c68d29a876e7e157f25d180044a33f6b565dff43f26a3b
5beab47705b693a7677f6db5bfa599bb1319a64bc6cd069730294c1422da50b0
8e5cfecd6067c2ed62d6c179a1e6bd63199023a52341f1f7d9be2e39bb4c3477
942bbd4398753da3ec5c6b3a885475cd01bb57fe868ae77984b734ad204eef67
96ac4883f5069c75f78b321680e4046ab613ead3d790c29711703e143176218b
a106b0f8926e51c250f5055831c1673f12020d3fa1bfcfa4bb14f614dcd31a17
a8d3beec46708cdc16efbb0f680dad8084c375367b5482dcc4d880cb8b2bba36
c374efba54279628793f04e10ebf5d0c1b4dbc36b3f4132d9235f01d64ca5c8e
f04b517ba5d6a0510485689a3e42dac000f51640fd71b986804cba178eae42a5
fb662806314dd383fefc45a6fdc4b2789788888debf4dee8909310e478a2dd52