pattern-wiki.win
Open in
urlscan Pro
104.21.56.242
Public Scan
Submission: On May 18 via manual from GB — Scanned from GE
Summary
TLS certificate: Issued by GTS CA 1P5 on March 23rd 2023. Valid for: 3 months.
This is the only time pattern-wiki.win was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 104.21.56.242 104.21.56.242 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
pattern-wiki.win
pattern-wiki.win |
105 KB |
6 | 1 |
Domain | Requested by | |
---|---|---|
6 | pattern-wiki.win |
pattern-wiki.win
|
6 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
penzu.com |
telegra.ph |
rentry.co |
notes.io |
www.mediawiki.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.pattern-wiki.win GTS CA 1P5 |
2023-03-23 - 2023-06-21 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://pattern-wiki.win/wiki/Who_Is_Responsible_For_A_Double_Glazed_Windows_Acton_Budget_12_Ways_To_Spend_Your_Money
Frame ID: 250F32F48FD4070443A7B2FCAFFB32C8
Requests: 13 HTTP requests in this frame
6 Outgoing links
These are links going to different origins than the main page.
Title: replacement double glazing
Search URL Search Domain Scan URL
Title: double glazed windows
Search URL Search Domain Scan URL
Title: upvc windows
Search URL Search Domain Scan URL
Title: upvc windows
Search URL Search Domain Scan URL
Title: Help
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
Who_Is_Responsible_For_A_Double_Glazed_Windows_Acton_Budget_12_Ways_To_Spend_Your_Money
pattern-wiki.win/wiki/ |
22 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wiki.png
pattern-wiki.win/resources/assets/ |
24 KB 24 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
load.php
pattern-wiki.win/ |
41 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
load.php
pattern-wiki.win/ |
17 KB 7 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
poweredby_mediawiki_88x31.png
pattern-wiki.win/resources/assets/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
395 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
124 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
69 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
116 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
94 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
218 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
96 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
load.php
pattern-wiki.win/ |
172 KB 52 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| RLQ1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
pattern-wiki.win/ | Name: cpPosTime Value: 1684445223.0257 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
pattern-wiki.win
104.21.56.242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