breachedemail.staging.riskbasedsecurity.net Open in urlscan Pro
2606:4700::6812:105d  Public Scan

Submitted URL: https://breachedemail.staging.riskbasedsecurity.net/
Effective URL: https://breachedemail.staging.riskbasedsecurity.net/users/sign_in
Submission: On August 31 via automatic, source certstream-suspicious — Scanned from DE

Summary

This website contacted 3 IPs in 1 countries across 3 domains to perform 5 HTTP transactions. The main IP is 2606:4700::6812:105d, located in United States and belongs to CLOUDFLARENET, US. The main domain is breachedemail.staging.riskbasedsecurity.net.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on June 2nd 2022. Valid for: a year.
This is the only time breachedemail.staging.riskbasedsecurity.net was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 4 2606:4700::68... 13335 (CLOUDFLAR...)
1 151.101.194.137 54113 (FASTLY)
1 162.247.241.14 23467 (NEWRELIC-...)
5 3
Apex Domain
Subdomains
Transfer
4 riskbasedsecurity.net
breachedemail.staging.riskbasedsecurity.net
123 KB
1 nr-data.net
bam.nr-data.net — Cisco Umbrella Rank: 227
620 B
1 newrelic.com
js-agent.newrelic.com — Cisco Umbrella Rank: 318
14 KB
5 3
Domain Requested by
4 breachedemail.staging.riskbasedsecurity.net 1 redirects breachedemail.staging.riskbasedsecurity.net
1 bam.nr-data.net js-agent.newrelic.com
1 js-agent.newrelic.com breachedemail.staging.riskbasedsecurity.net
5 3

This site contains no links.

Subject Issuer Validity Valid
riskbasedsecurity.net
Cloudflare Inc ECC CA-3
2022-06-02 -
2023-06-01
a year crt.sh
js-agent.newrelic.com
GlobalSign Atlas R3 DV TLS CA 2022 Q2
2022-07-10 -
2023-08-11
a year crt.sh
*.nr-data.net
DigiCert TLS RSA SHA256 2020 CA1
2022-01-10 -
2023-02-10
a year crt.sh

This page contains 1 frames:

Primary Page: https://breachedemail.staging.riskbasedsecurity.net/users/sign_in
Frame ID: 7C82334A8A5521DDD3DBF9BD680CA656
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

P

Page URL History Show full URLs

  1. https://breachedemail.staging.riskbasedsecurity.net/ HTTP 302
    https://breachedemail.staging.riskbasedsecurity.net/users/sign_in Page URL

Page Statistics

5
Requests

100 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

3
IPs

1
Countries

138 kB
Transfer

583 kB
Size

2
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://breachedemail.staging.riskbasedsecurity.net/ HTTP 302
    https://breachedemail.staging.riskbasedsecurity.net/users/sign_in Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request sign_in
breachedemail.staging.riskbasedsecurity.net/users/
Redirect Chain
  • https://breachedemail.staging.riskbasedsecurity.net/
  • https://breachedemail.staging.riskbasedsecurity.net/users/sign_in
13 KB
6 KB
Document
General
Full URL
https://breachedemail.staging.riskbasedsecurity.net/users/sign_in
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:105d , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Phusion Passenger 6.0.7
Resource Hash
7eea430e99455ddda019146d25ae6ac29aff86a582bba05a6b5ee021040d11f8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.52 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

cache-control
max-age=0, private, must-revalidate
cf-cache-status
DYNAMIC
cf-ray
7438998e9dba6931-FRA
content-encoding
gzip
content-type
text/html; charset=utf-8
date
Wed, 31 Aug 2022 20:43:41 GMT
referrer-policy
strict-origin-when-cross-origin
server
cloudflare
status
200 OK
x-content-type-options
nosniff
x-download-options
noopen
x-frame-options
SAMEORIGIN
x-permitted-cross-domain-policies
none
x-powered-by
Phusion Passenger 6.0.7
x-request-id
85ab349d-e373-45e2-978b-1e282204d6a5
x-runtime
0.008588
x-xss-protection
1; mode=block

Redirect headers

cache-control
no-cache
cf-cache-status
DYNAMIC
cf-ray
7438998bf9666931-FRA
content-type
text/html; charset=utf-8
date
Wed, 31 Aug 2022 20:43:41 GMT
location
https://breachedemail.staging.riskbasedsecurity.net/users/sign_in
server
cloudflare
status
302 Found
x-powered-by
Phusion Passenger 6.0.7
x-request-id
27483246-a4af-43e5-a068-c8240e84aad4
x-runtime
0.004100
application-ad9ac96d344cf450ae063ff1cfc836dc458e502ef11bcd48642896cde199c6a2.css
breachedemail.staging.riskbasedsecurity.net/assets/
285 KB
46 KB
Stylesheet
General
Full URL
https://breachedemail.staging.riskbasedsecurity.net/assets/application-ad9ac96d344cf450ae063ff1cfc836dc458e502ef11bcd48642896cde199c6a2.css
Requested by
Host: breachedemail.staging.riskbasedsecurity.net
URL: https://breachedemail.staging.riskbasedsecurity.net/users/sign_in
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:105d , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f7c520ab30017b60d93051457c003efc955b7346694a784f6abed377b12de458

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://breachedemail.staging.riskbasedsecurity.net/users/sign_in
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.52 Safari/537.36

Response headers

date
Wed, 31 Aug 2022 20:43:42 GMT
content-encoding
gzip
cf-cache-status
MISS
last-modified
Mon, 15 Mar 2021 15:56:10 GMT
server
cloudflare
etag
W/"324ce2-47583-5bd9549d49a80"
vary
Accept-Encoding
content-type
text/css
cache-control
public, max-age=14400
cf-ray
743899913a516931-FRA
expires
Thu, 01 Sep 2022 00:43:42 GMT
application-cd73f92ec87f1d9582b55ac258f4df9d97ac1fc6ef144471108a32afcc790683.js
breachedemail.staging.riskbasedsecurity.net/assets/
246 KB
71 KB
Script
General
Full URL
https://breachedemail.staging.riskbasedsecurity.net/assets/application-cd73f92ec87f1d9582b55ac258f4df9d97ac1fc6ef144471108a32afcc790683.js
Requested by
Host: breachedemail.staging.riskbasedsecurity.net
URL: https://breachedemail.staging.riskbasedsecurity.net/users/sign_in
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:105d , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cd73f92ec87f1d9582b55ac258f4df9d97ac1fc6ef144471108a32afcc790683

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://breachedemail.staging.riskbasedsecurity.net/users/sign_in
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.52 Safari/537.36

Response headers

date
Wed, 31 Aug 2022 20:43:42 GMT
content-encoding
gzip
cf-cache-status
MISS
last-modified
Mon, 15 Mar 2021 15:56:10 GMT
server
cloudflare
etag
W/"324ce0-3d7fa-5bd9549d49a80"
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=14400
cf-ray
743899913a546931-FRA
expires
Thu, 01 Sep 2022 00:43:42 GMT
nr-1216.min.js
js-agent.newrelic.com/
38 KB
14 KB
Script
General
Full URL
https://js-agent.newrelic.com/nr-1216.min.js
Requested by
Host: breachedemail.staging.riskbasedsecurity.net
URL: https://breachedemail.staging.riskbasedsecurity.net/users/sign_in
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.194.137 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6f973e7d75a7e6f6e59708f19631c8890034db5debb4d04f189deb53c114e708

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://breachedemail.staging.riskbasedsecurity.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.52 Safari/537.36

Response headers

x-amz-version-id
mHHzJIqOizHibcYt0xqAszRr0gQRiNYy
content-encoding
gzip
etag
"9f533d8cd24b2c5e3b4dc886ecbd43e8"
x-amz-request-id
QS55VTZ5KYBT01RF
x-cache
HIT
cross-origin-resource-policy
cross-origin
content-length
14391
x-amz-id-2
LqMYMQa4YU1cIYkATbA3xCSvsTD2lndpXc+K9jTcrBu4zKcsnQNt7LnOCIo6x7yoHpJFT7uuVmQ=
x-served-by
cache-hhn4036-HHN
last-modified
Thu, 14 Apr 2022 16:45:57 GMT
server
AmazonS3
x-timer
S1661978623.528834,VS0,VE0
date
Wed, 31 Aug 2022 20:43:42 GMT
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish
cache-control
public, max-age=7200, stale-if-error=604800
accept-ranges
bytes
x-cache-hits
2565
8eb622ec36
bam.nr-data.net/1/
49 B
620 B
Script
General
Full URL
https://bam.nr-data.net/1/8eb622ec36?a=171727397&v=1216.487a282&to=JVlfFURWVFsAQhxSAxBfQgQZSl1EFllcWBVJWFQW&rst=1981&ck=1&ref=https://breachedemail.staging.riskbasedsecurity.net/users/sign_in&ap=9&be=1107&fe=1939&dc=1917&perf=%7B%22timing%22:%7B%22of%22:1661978617150,%22n%22:0,%22r%22:1,%22re%22:651,%22f%22:651,%22dn%22:651,%22dne%22:651,%22c%22:651,%22ce%22:651,%22rq%22:652,%22rp%22:1064,%22rpe%22:1067,%22dl%22:1071,%22di%22:1917,%22ds%22:1917,%22de%22:1939,%22dc%22:1939,%22l%22:1939,%22le%22:1940%7D,%22navigation%22:%7B%22rc%22:1%7D%7D&fp=1949&fcp=1949&jsonp=NREUM.setToken
Requested by
Host: js-agent.newrelic.com
URL: https://js-agent.newrelic.com/nr-1216.min.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.241.14 , United States, ASN23467 (NEWRELIC-AS-1, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a83848cf5c3d96caefe490c19e41659609b3691dd4c531cf925016c084d8e1b0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://breachedemail.staging.riskbasedsecurity.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.52 Safari/537.36

Response headers

Date
Wed, 31 Aug 2022 20:43:42 GMT
Content-Encoding
gzip
CF-Cache-Status
DYNAMIC
Server
cloudflare
Vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, HEAD, OPTIONS
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Transfer-Encoding
chunked
Cross-Origin-Resource-Policy
cross-origin
Connection
keep-alive
access-control-allow-credentials
true
CF-Ray
743899973c42929b-FRA

Verdicts & Comments Add Verdict or Comment

15 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation object| NREUM object| newrelic function| __nr_require function| $ function| jQuery object| jQuery11240010083979563711765

2 Cookies

Domain/Path Name / Value
breachedemail.staging.riskbasedsecurity.net/ Name: _breach_email_session
Value: d0VNUkkrWS9NaHNvbjlHWkRuSWlka25mWExKN0VURXNGUk96Y04zZ0ZnM2RVNGdycElZWmlwaDZ4QjFrbnYrV2t1VmF2VlBoQ3NlNk45TndFWm14WEVJTXpOY1pLb2o1THNSTG5pZDZLYlZMc1I1TjVIek1wQThlcitBQzFRUUFLUlR0elhpbzFYK0dGSHMxQ21RUWNWdnFoREZvei9WSE9HeGk4L3FvM2dEUkZaRk9QUmxTbWx0dnhXejFGRWRGLS0wTEhESjI2NVgrbG1nMlliZVdRM253PT0%3D--8c9fe0041fa3c2dd74a0c3837d01b9ac7c50f2de
.nr-data.net/ Name: JSESSIONID
Value: 4d87af399566756

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block