uvirtual2023.uaw.edu.ec
Open in
urlscan Pro
190.15.135.74
Public Scan
Effective URL: https://uvirtual2023.uaw.edu.ec/login/index.php
Submission Tags: demotag1 demotag2 Search All
Submission: On October 17 via api from IE — Scanned from DE
Summary
TLS certificate: Issued by R3 on September 14th 2023. Valid for: 3 months.
This is the only time uvirtual2023.uaw.edu.ec was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 20 | 190.15.135.74 190.15.135.74 | 61468 (CEDIA) (CEDIA) | |
19 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
uaw.edu.ec
1 redirects
uvirtual2023.uaw.edu.ec |
5 MB |
19 | 1 |
Domain | Requested by | |
---|---|---|
20 | uvirtual2023.uaw.edu.ec |
1 redirects
uvirtual2023.uaw.edu.ec
|
19 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
moodle.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
uvirtual2023.uaw.edu.ec R3 |
2023-09-14 - 2023-12-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://uvirtual2023.uaw.edu.ec/login/index.php
Frame ID: 7BACD2F3DD0267811A6E95485DDC95F5
Requests: 19 HTTP requests in this frame
Screenshot
Page Title
Ambiente Virtual de Aprendizaje - UAW: Entrar al sitioPage URL History Show full URLs
-
https://uvirtual2023.uaw.edu.ec/course/view.php?id=3§ion=1
HTTP 303
https://uvirtual2023.uaw.edu.ec/login/index.php Page URL
Detected technologies
RequireJS (JavaScript Frameworks) ExpandDetected patterns
- require.*\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Moodle
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://uvirtual2023.uaw.edu.ec/course/view.php?id=3§ion=1
HTTP 303
https://uvirtual2023.uaw.edu.ec/login/index.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.php
uvirtual2023.uaw.edu.ec/login/ Redirect Chain
|
26 KB 27 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
yui_combo.php
uvirtual2023.uaw.edu.ec/theme/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all
uvirtual2023.uaw.edu.ec/theme/styles.php/boost/1696007479_1693948022/ |
685 KB 123 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
polyfill.js
uvirtual2023.uaw.edu.ec/lib/javascript.php/1695754570/lib/polyfills/ |
195 KB 60 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
yui_combo.php
uvirtual2023.uaw.edu.ec/theme/ |
276 KB 83 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
javascript-static.js
uvirtual2023.uaw.edu.ec/lib/javascript.php/1695754570/lib/ |
21 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_vertical_uaw.png
uvirtual2023.uaw.edu.ec/pluginfile.php/1/core_admin/logo/0x200/1696007479/ |
20 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
require.min.js
uvirtual2023.uaw.edu.ec/lib/javascript.php/1695754570/lib/requirejs/ |
17 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
yui_combo.php
uvirtual2023.uaw.edu.ec/theme/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
page_bg_00.png
uvirtual2023.uaw.edu.ec/pluginfile.php/1/theme_boost/loginbackgroundimage/1696007479/ |
4 MB 4 MB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff2
uvirtual2023.uaw.edu.ec/theme/font.php/boost/core/1696007479/ |
75 KB 76 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
first.js
uvirtual2023.uaw.edu.ec/lib/requirejs.php/1695754570/core/ |
2 MB 501 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
events.js
uvirtual2023.uaw.edu.ec/lib/requirejs.php/1695754570/core_form/ |
2 MB 501 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.1.min.js
uvirtual2023.uaw.edu.ec/lib/javascript.php/1695754570/lib/jquery/ |
88 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
yui_combo.php
uvirtual2023.uaw.edu.ec/theme/ |
15 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
service.php
uvirtual2023.uaw.edu.ec/lib/ajax/ |
5 KB 6 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
service-nologin.php
uvirtual2023.uaw.edu.ec/lib/ajax/ |
31 KB 31 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
service-nologin.php
uvirtual2023.uaw.edu.ec/lib/ajax/ |
2 KB 3 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
service-nologin.php
uvirtual2023.uaw.edu.ec/lib/ajax/ |
225 B 756 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
42 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| M function| yui1ConfigFn function| yui2ConfigFn object| YUI_config object| runtime object| regeneratorRuntime function| setImmediate function| clearImmediate function| YUI object| Y function| checkall function| checknone function| select_all_in_element_with_id function| select_all_in function| deselect_all_in function| confirm_if function| findParentNode function| unmaskPassword function| filterByParent function| fix_column_widths function| fix_column_width function| insertAtCursor function| increment_filename function| right_to_left function| openpopup function| close_window function| focuscontrol function| old_onload_focus function| build_querystring function| build_windowoptionsstring function| convert_object_to_string function| stripHTML function| updateProgressBar function| require function| requirejs function| define object| root function| definition object| e function| t function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
uvirtual2023.uaw.edu.ec/ | Name: MoodleSession Value: a2setso4ge1k5fu4vplmvuqdfd |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | default-src https: 'unsafe-inline' 'unsafe-eval'; object-src 'none'; img-src 'self' data:; font-src 'self' data: |
Strict-Transport-Security | max-age=15768000; includeSubdomains; preload |
X-Content-Type-Options | nosniff |
X-Frame-Options | sameorigin SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
uvirtual2023.uaw.edu.ec
190.15.135.74
01e644698fc787a38c18a7312893aaf9081b994f57f059ba3274361f7b09b206
02a7852c5d2d394b4a3fda6d744e74e7c687ba516d82e96a9d04bac8f4d39b98
05ae34a8894cbc4b6ccc7daf644d10e996182a22134f33b82e149c1277c405fa
111b6329693bb290516569c49cd2f5b578d4310138d7fb36fef8fd4a8288a38d
13eaaadfa414f262b7964320054bb2b322b9ef9f3522bc25c9d60dc83b5141cf
1d6ba14cf4f307b9bbb13d2ad4e4cb5e701add10378e1b785c4c80dba1342170
26d1a45d173703f01ca9bb8be4335bae6005c3bc0a5f78b380ad18fb152b8835
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
6f228115446cd61c66b30c415c6e72b7604205216b8ac99ffe6ecf71f7fc37f4
729ac4f550425ac02f3314a78f950ea322584de22ee9079d7d63b0ee8eda7359
8ca613086bab20df17ab9a58daafbe5c45e4df467fa9bd6ca8650e8ece181393
8e2f7abc8605fe4850ff4c1cb6b77fdc1cb8ac61fb97bbc1a62961486019fcd0
935cfe90305c51194137b8bed960b9c09ad22369734ed4d0b405263791fe6d46
9ce0dbd6a1df9332653e27d1ddc505c5b78fd82b4112de0ec63840c3fbe0b8c2
d9fc06238c802d4f69cbb2ffc81c0f11355f08de58e0fd3247baddd7fdd1e983
e409035899d5171a78b6d4e93567c3c83305f975599d8ebdf9a598247d8e12e2
ee00a2a3f4aa45ef8e17c2613ff27c662ef535aa76deb190e8034e1c37332179
fbd5b8255a99afe96e89a88423275ed4e93083fad3311dd349906122e63206a0