etsapp-tedge.bnymellon.com
Open in
urlscan Pro
170.61.134.19
Public Scan
Submitted URL: https://etsapp-tedge.bnymellon.com/TESrvEVMDownloadPwd?tblnum=1\u0026tblproc=N2021-09-27-09.30.04.331536ZTE1Q06\u0026tblseq=0000000...
Effective URL: https://etsapp-tedge.bnymellon.com/logoff.jsp?TYPE=33554433&REALMOID=06-000e54f2-0331-1a90-ac7c-2f7b0a00f041&GUID=&SMAUTHREASON=0&M...
Submission: On September 27 via api from US — Scanned from DE
Effective URL: https://etsapp-tedge.bnymellon.com/logoff.jsp?TYPE=33554433&REALMOID=06-000e54f2-0331-1a90-ac7c-2f7b0a00f041&GUID=&SMAUTHREASON=0&M...
Submission: On September 27 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
HTTP STATUS 400 – BAD REQUEST -------------------------------------------------------------------------------- Type Exception Report Message Invalid character found in the request target [/logoff.jsp?TYPE=33554433&REALMOID=06-000e54f2-0331-1a90-ac7c-2f7b0a00f041&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-VxbMcSt%2feRWfnCabvN0KlFzV2Z6NDty9f8iJfzBJMzO39cH1Ry5khmwJfJabvdUAUh9kqTGCbhsqflVpvIV8SgRxSzU3U5rf&TARGET=-SM-HTTPS%3a%2f%2fetsapp--tedge%2ebnymellon%2ecom%2fTESrvEVMDownloadPwd%3ftblnum%3d1\u0026tblproc%3dN2021--09--27--09%2e30%2e04%2e331536ZTE1Q06\u0026tblseq%3d000000001\u0026tblevt%3d2021--09--15--18%2e05%2e41%2e025872\u0026tbldel%3d2021--09--03--16%2e29%2e37%2e588275\u0026stgtyp%3d\u0026tblname%3dTE_V_MSG_ENCRYPTED\u0026delopt%3d06]. The valid characters are defined in RFC 7230 and RFC 3986 Description The server cannot or will not process the request due to something that is perceived to be a client error (e.g., malformed request syntax, invalid request message framing, or deceptive request routing). Exception java.lang.IllegalArgumentException: Invalid character found in the request target [/logoff.jsp?TYPE=33554433&REALMOID=06-000e54f2-0331-1a90-ac7c-2f7b0a00f041&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-VxbMcSt%2feRWfnCabvN0KlFzV2Z6NDty9f8iJfzBJMzO39cH1Ry5khmwJfJabvdUAUh9kqTGCbhsqflVpvIV8SgRxSzU3U5rf&TARGET=-SM-HTTPS%3a%2f%2fetsapp--tedge%2ebnymellon%2ecom%2fTESrvEVMDownloadPwd%3ftblnum%3d1\u0026tblproc%3dN2021--09--27--09%2e30%2e04%2e331536ZTE1Q06\u0026tblseq%3d000000001\u0026tblevt%3d2021--09--15--18%2e05%2e41%2e025872\u0026tbldel%3d2021--09--03--16%2e29%2e37%2e588275\u0026stgtyp%3d\u0026tblname%3dTE_V_MSG_ENCRYPTED\u0026delopt%3d06]. The valid characters are defined in RFC 7230 and RFC 3986 org.apache.coyote.http11.Http11InputBuffer.parseRequestLine(Http11InputBuffer.java:504) org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:503) org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:831) org.apache.tomcat.util.net.Nio2Endpoint$SocketProcessor.doRun(Nio2Endpoint.java:1620) org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) org.apache.tomcat.util.net.AbstractEndpoint.processSocket(AbstractEndpoint.java:1082) org.apache.tomcat.util.net.Nio2Endpoint$Nio2SocketWrapper$2.completed(Nio2Endpoint.java:565) org.apache.tomcat.util.net.Nio2Endpoint$Nio2SocketWrapper$2.completed(Nio2Endpoint.java:543) org.apache.tomcat.util.net.SecureNio2Channel$1.completed(SecureNio2Channel.java:969) org.apache.tomcat.util.net.SecureNio2Channel$1.completed(SecureNio2Channel.java:898) sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126) sun.nio.ch.Invoker$2.run(Invoker.java:218) sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112) java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java) org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) java.lang.Thread.run(Thread.java:748) Note The full stack trace of the root cause is available in the server logs. -------------------------------------------------------------------------------- APACHE TOMCAT/8.5.61