piee.eb.mil
Open in
urlscan Pro
140.17.80.42
Public Scan
Effective URL: https://piee.eb.mil/sol/xhtml/unauth/index.xhtml
Submission: On September 24 via manual from US — Scanned from IL
Summary
TLS certificate: Issued by Entrust Certification Authority - L1K on June 21st 2024. Valid for: a year.
This is the only time piee.eb.mil was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 14 | 140.17.80.42 140.17.80.42 | 5852 (DNIC-ASBL...) (DNIC-ASBLK-05800-06055) | |
13 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
eb.mil
1 redirects
piee.eb.mil — Cisco Umbrella Rank: 167191 |
572 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
14 | piee.eb.mil |
1 redirects
piee.eb.mil
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
piee.eb.mil Entrust Certification Authority - L1K |
2024-06-21 - 2025-07-13 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://piee.eb.mil/sol/xhtml/unauth/index.xhtml
Frame ID: 21CC2509783AE4CC0762D06B4A23C02D
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
SolicitationPage URL History Show full URLs
-
https://piee.eb.mil/sol/xhtml/unauth/search/oppMgmtLink.xhtml?solNo=N6134024R0032es.
HTTP 302
https://piee.eb.mil/sol/xhtml/unauth/index.xhtml Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
DataTables (JavaScript Libraries) Expand
Detected patterns
- dataTables.*\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://piee.eb.mil/sol/xhtml/unauth/search/oppMgmtLink.xhtml?solNo=N6134024R0032es.
HTTP 302
https://piee.eb.mil/sol/xhtml/unauth/index.xhtml Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.xhtml
piee.eb.mil/sol/xhtml/unauth/ Redirect Chain
|
10 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
piee.eb.mil/sol/resources/css/ |
118 KB 119 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
datatables.min.css
piee.eb.mil/resources/css/ |
8 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
final.min.css
piee.eb.mil/sol/resources/css/ |
35 KB 36 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footable.core.min.css
piee.eb.mil/sol/resources/css/ |
5 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
oamSubmit.js.xhtml
piee.eb.mil/sol/javax.faces.resource/ |
2 KB 3 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
portal-jquery.js
piee.eb.mil/resources/js/vendor/ |
86 KB 87 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
portal-bootstrap.js
piee.eb.mil/resources/js/vendor/ |
36 KB 37 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
datatables.min.js
piee.eb.mil/resources/js/vendor/ |
96 KB 97 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
final.min.js
piee.eb.mil/sol/resources/js/ |
132 KB 133 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
session.final.js
piee.eb.mil/resources/js/ |
7 KB 8 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glyphicons-halflings-regular.woff2
piee.eb.mil/sol/resources/fonts/ |
18 KB 19 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tsolicitation.png
piee.eb.mil/resources/img/favicon/ |
3 KB 5 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
80 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| myfaces function| $ function| jQuery boolean| showOverlay function| pleaseWait function| ajaxOnEventLoading function| openSOLHelpPage function| openTimeZonePdf function| showPleaseWait function| hidePleaseWait function| viewAttachment function| convertInputToDate function| autoFocus function| displayModal function| hideModal object| keyStop function| keydown function| keyup function| iterateButtons function| checkAlt function| checkAltFF function| onFileSelect function| openHelpPage function| recordCurrentScrollPosition function| scrollToRecordedPosition function| createDataTables function| documentEvents function| changeTab function| toggleIcon function| setupDatatableServer function| displayOffers function| updateVolumes function| editAttachmentModal function| restrictedAttachmentRequestReviewModal function| editAttachmentModalForOffers function| replaceAttachmentModalForOffers function| editAttachmentModalForUnsolicitedProposals function| setUpOfferTab function| checkContractOpportunitiesConfirmationModal function| setUpFinalRevisionDate function| copyLinkToClipboard function| displayRequiredModalCertificate function| showDownloadPopup function| hideDownloadPopup function| proposalManagerEmailsButton function| editContractOppErrorCodeModal function| sendUnreadableEmailToVendorPoc function| isNumberKey function| attachEditor object| footable function| Spinner object| html5 object| Modernizr function| yepnope object| jstz string| sessionButtons string| expiredButtons string| sessionMessage string| sessionModal string| appName string| timeout number| timeoutWarning number| popupTimer number| cookieTimer function| setSessionExpiration function| sessionExpirationCallback function| findAboutToExpireTimers function| refreshSession function| refreshSessionOnServer function| sessionCancel function| setCookieForExpiringApps function| onWindowClose function| handleExpiredApp function| handleExpiringApps function| showHideSessionModal function| getApplicationName function| getCookieExpirationTime function| killSessionOnServer function| closeExpiredPopup function| initModals10 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.piee.eb.mil/sol | Name: ID Value: 0001WT9aT3VfSQI8Mr-jZEmtvQdEQIGF23yRB_cQGA3nzcCDfkVHIf21u4tcr1qiPa0l:fbccfd9f-1f67-4409-9ce3-2d93666ef3ad |
|
.piee.eb.mil/sol | Name: TS01129f2e Value: 01d263603a7012349c12355e5d4c0d71d6cf092fb2a09635d310017d2d8714ee5aaaa3c48d02a4bce23ea486dfe83483f8200f66b8519f264d8d9b7f8e7fb9161962da6223 |
|
piee.eb.mil/sol | Name: oam.Flash.RENDERMAP.TOKEN Value: omurt7qpt |
|
piee.eb.mil/sol | Name: TS01d1d6bc Value: 01d263603a399a70e23f9453d3b0d0f00d2ed20d75a09635d310017d2d8714ee5aaaa3c48d3283909531b3e532898eebcf22cb9ce720e39f19b92b70d4271f4d64b781a77e |
|
piee.eb.mil/ | Name: AWSALBAPP-1 Value: _remove_ |
|
piee.eb.mil/ | Name: AWSALBAPP-2 Value: _remove_ |
|
piee.eb.mil/ | Name: AWSALBAPP-3 Value: _remove_ |
|
piee.eb.mil/ | Name: session_sol Value: notExpired |
|
piee.eb.mil/ | Name: AWSALBAPP-0 Value: AAAAAAAAAACdztTJNVs8Vobg/6Q+cDu47ccdXu25wYIG+W7eqrgZgOEvNfeaIuI3Hc3HvMrIreWfgfL96cS+41vq8YyTe+DKufQ1hzw2SfITjOO+DSKfAessjyRJjFeFHJ0m+3UlbBmAb0Y= |
|
piee.eb.mil/ | Name: TS010669bd Value: 01d263603acf3316b1d1fe9b3b4a26e8728ed218bca09635d310017d2d8714ee5aaaa3c48debf7f42d0a6d2d478d1b44600f5a2af2592ee5146b835ea10fbfe825374dc73821e38663450300d52d89b3011aa78388337e6ed88bbdae402b63937739ba2f6d8ffa39320f7981bde478510458a7c4d8 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
piee.eb.mil
140.17.80.42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