Submitted URL: https://banking.flatemails.com/
Effective URL: https://banking.flatemails.com/login
Submission: On December 11 via automatic, source certstream-suspicious — Scanned from GB

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 5 HTTP transactions. The main IP is 31.125.25.108, located in Dronfield, United Kingdom and belongs to Plusnet British Telecommunications PLC, GB. The main domain is banking.flatemails.com.
TLS certificate: Issued by E5 on December 11th 2024. Valid for: 3 months.
This is the only time banking.flatemails.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 4 31.125.25.108 6871 (Plusnet B...)
5 2
Apex Domain
Subdomains
Transfer
4 flatemails.com
banking.flatemails.com
33 KB
5 1
Domain Requested by
4 banking.flatemails.com 1 redirects banking.flatemails.com
5 1

This site contains no links.

Subject Issuer Validity Valid
banking.flatemails.com
E5
2024-12-11 -
2025-03-11
3 months crt.sh

This page contains 1 frames:

Primary Page: https://banking.flatemails.com/login
Frame ID: 1986CFE3899062C1881EC6ACC15BE964
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Login to Firefly III

Page URL History Show full URLs

  1. https://banking.flatemails.com/ HTTP 302
    http://banking.flatemails.com/login HTTP 307
    https://banking.flatemails.com/login Page URL

Page Statistics

5
Requests

60 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

31 kB
Transfer

32 kB
Size

3
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://banking.flatemails.com/ HTTP 302
    http://banking.flatemails.com/login HTTP 307
    https://banking.flatemails.com/login Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login
banking.flatemails.com/
Redirect Chain
  • https://banking.flatemails.com/
  • http://banking.flatemails.com/login
  • https://banking.flatemails.com/login
5 KB
3 KB
Document
General
Full URL
https://banking.flatemails.com/login
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
31.125.25.108 Dronfield, United Kingdom, ASN6871 (Plusnet British Telecommunications PLC, GB),
Reverse DNS
fraserclement.plus.com
Software
openresty /
Resource Hash
320c96dd1c1d4d7a1364f92db9b6e5abf5fb4d0f372d2d3134142143e1c8c59d
Security Headers
Name Value
Content-Security-Policy default-src 'none'; object-src 'none'; script-src 'unsafe-eval' 'strict-dynamic' 'nonce-NacuzI/msgH5HsJAEX74uQ=='; style-src 'unsafe-inline' 'self'; base-uri 'self'; font-src 'self' data:; connect-src 'self' ; img-src 'self' data: 'nonce-NacuzI/msgH5HsJAEX74uQ==' ; manifest-src 'self'; form-action 'self'
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36

Response headers

cache-control
no-cache, private
content-encoding
gzip
content-security-policy
default-src 'none'; object-src 'none'; script-src 'unsafe-eval' 'strict-dynamic' 'nonce-NacuzI/msgH5HsJAEX74uQ=='; style-src 'unsafe-inline' 'self'; base-uri 'self'; font-src 'self' data:; connect-src 'self' ; img-src 'self' data: 'nonce-NacuzI/msgH5HsJAEX74uQ==' ; manifest-src 'self'; form-action 'self'
content-type
text/html; charset=UTF-8
date
Wed, 11 Dec 2024 22:00:28 GMT
feature-policy
geolocation 'none'; midi 'none'; sync-xhr 'self'; microphone 'none'; camera 'none'; magnetometer 'none'; gyroscope 'none'; fullscreen 'self'; payment 'none'
referrer-policy
no-referrer
server
openresty
vary
Accept-Encoding
x-content-type-options
nosniff
x-frame-options
deny
x-permitted-cross-domain-policies
none
x-robots-tag
none
x-served-by
banking.flatemails.com
x-xss-protection
1; mode=block

Redirect headers

Location
https://banking.flatemails.com/login
Non-Authoritative-Reason
HttpsUpgrades
logo-session.png
banking.flatemails.com/images/
12 KB
13 KB
Image
General
Full URL
https://banking.flatemails.com/images/logo-session.png
Requested by
Host: banking.flatemails.com
URL: https://banking.flatemails.com/login
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
31.125.25.108 Dronfield, United Kingdom, ASN6871 (Plusnet British Telecommunications PLC, GB),
Reverse DNS
fraserclement.plus.com
Software
openresty /
Resource Hash
d096729d1ce4373b0a99f7cfde4c7ca77133996a0ae82084d6c8c84d1a2471c3

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

etag
"31d1-62799ffe5e540"
accept-ranges
bytes
content-length
12753
date
Wed, 11 Dec 2024 22:00:28 GMT
content-type
image/png
last-modified
Sat, 23 Nov 2024 20:03:57 GMT
server
openresty
x-served-by
banking.flatemails.com
app-DIk1Lb84.css
banking.flatemails.com/build/assets/
0
0

app-DIk1Lb84.css
banking.flatemails.com/build/assets/
0
0

favicon.ico
banking.flatemails.com/
15 KB
15 KB
Other
General
Full URL
https://banking.flatemails.com/favicon.ico
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
31.125.25.108 Dronfield, United Kingdom, ASN6871 (Plusnet British Telecommunications PLC, GB),
Reverse DNS
fraserclement.plus.com
Software
openresty /
Resource Hash
2952ed359914138c12955e3fed76fd30f37b07e75e64009e8a231fb2a1f5a504

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

etag
"3aee-62799ffe5e540"
accept-ranges
bytes
content-length
15086
date
Wed, 11 Dec 2024 22:00:28 GMT
content-type
image/vnd.microsoft.icon
last-modified
Sat, 23 Nov 2024 20:03:57 GMT
server
openresty
x-served-by
banking.flatemails.com

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
banking.flatemails.com
URL
http://banking.flatemails.com/build/assets/app-DIk1Lb84.css
Domain
banking.flatemails.com
URL
http://banking.flatemails.com/build/assets/app-DIk1Lb84.css

Verdicts & Comments Add Verdict or Comment

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

string| theme

3 Cookies

Domain/Path Name / Value
banking.flatemails.com/ Name: XSRF-TOKEN
Value: eyJpdiI6IkRxY0FRSTg3VVNvemVpZmVYbXZWckE9PSIsInZhbHVlIjoiaVZVNHRiSCtQTFdaK2ZqbG1kOWtrZmtUWFFwdXQ3clFiTCtJYmorWUtqV1BSankxeG5nWXlsWnVuUElOTDRPZGFvdFluUFVxMWVXbnJzTXJoSWtjWGQzOVFyZGppQU9sWkl2UDU3d0s1dnN3WksyaDA1ZlpZdmM2aTNQVFNWTTIiLCJtYWMiOiI1ZThjN2E3NWM4MGFmZWRlMjUzNDdiYTZmOTg3YWY4M2VhYmM1YTJkYmE3OTI1MmJkZWMwM2QyODA3OTE0NDdjIiwidGFnIjoiIn0%3D
banking.flatemails.com/ Name: firefly_session
Value: eyJpdiI6InRVMnZSU1liV29RZDdMRUc0WjBzV0E9PSIsInZhbHVlIjoiejNvWWw1SVRCMFpUTnFicFpSVVpGOEdQOEV5bCtQK3dOczFjemJ5QjdsS293RUo3d2VTdThaVmZEeWtRekV3bWRSd1B2SUlYcXFiVTJiNURLa0dzUXl0V1V5MWs1OXJSVEZsUCtmNGpqWko3S0YyaVBKQlhZZDl0TWl2S0p6MXgiLCJtYWMiOiJiZDBhOGJkMDU3ZjM0ZjFjMzc5ZDEyMTU0ODNiYWUyMjdhOTA3NTYwOTNhODNkNWU4ODJhNjVjYjc0Yzg5YjhlIiwidGFnIjoiIn0%3D
banking.flatemails.com/ Name: google2fa_token
Value: eyJpdiI6ImZxbS83N0ZaOU9vaHNyTWdmODJSOVE9PSIsInZhbHVlIjoiZnFsdkQxTEUvSmw2SEVaSDkwR3FpMVZ6RGllc1FOYUorcXJCNTc3VVhUbU9leVp5T3RwakJLUUJXSUhIVHRzVGVVMDhlM0FTNS8xQ3I1ZGM0eXFrZ1E9PSIsIm1hYyI6IjIyYWJiYzQ1YWI4YTNlM2FkODA3OTljNjJlMzE4MTc1MjBjM2I2YmFjZWM2ODI0MjE1YmQwMjdiMzA5MGFhMGEiLCJ0YWciOiIifQ%3D%3D

6 Console Messages

Source Level URL
Text
security warning URL: https://banking.flatemails.com/login
Message:
Mixed Content: The page at 'https://banking.flatemails.com/login' was loaded over HTTPS, but requested an insecure element 'http://banking.flatemails.com/images/logo-session.png'. This request was automatically upgraded to HTTPS, For more information see https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html
security error URL: https://banking.flatemails.com/login(Line 3)
Message:
Refused to set the document's base URI to 'http://banking.flatemails.com/' because it violates the following Content Security Policy directive: "base-uri 'self'".
security error URL: https://banking.flatemails.com/login(Line 64)
Message:
Refused to load the stylesheet 'http://banking.flatemails.com/build/assets/app-DIk1Lb84.css' because it violates the following Content Security Policy directive: "style-src 'unsafe-inline' 'self'". Note that 'style-src-elem' was not explicitly set, so 'style-src' is used as a fallback.
security error URL: https://banking.flatemails.com/login(Line 64)
Message:
Refused to load the stylesheet 'http://banking.flatemails.com/build/assets/app-DIk1Lb84.css' because it violates the following Content Security Policy directive: "style-src 'unsafe-inline' 'self'". Note that 'style-src-elem' was not explicitly set, so 'style-src' is used as a fallback.
security warning URL: https://banking.flatemails.com/login(Line 83)
Message:
Mixed Content: The page at 'https://banking.flatemails.com/login' was loaded over a secure connection, but contains a form that targets an insecure endpoint 'http://banking.flatemails.com/login'. This endpoint should be made available over a secure connection.
recommendation verbose URL: https://banking.flatemails.com/login
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "username"): (More info: https://goo.gl/9p2vKq) %o

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'none'; object-src 'none'; script-src 'unsafe-eval' 'strict-dynamic' 'nonce-NacuzI/msgH5HsJAEX74uQ=='; style-src 'unsafe-inline' 'self'; base-uri 'self'; font-src 'self' data:; connect-src 'self' ; img-src 'self' data: 'nonce-NacuzI/msgH5HsJAEX74uQ==' ; manifest-src 'self'; form-action 'self'
X-Content-Type-Options nosniff
X-Frame-Options deny
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

banking.flatemails.com
banking.flatemails.com
31.125.25.108
2952ed359914138c12955e3fed76fd30f37b07e75e64009e8a231fb2a1f5a504
320c96dd1c1d4d7a1364f92db9b6e5abf5fb4d0f372d2d3134142143e1c8c59d
d096729d1ce4373b0a99f7cfde4c7ca77133996a0ae82084d6c8c84d1a2471c3