URL: https://windows2016.giize.com/
Submission Tags: @phishunt_io
Submission: On November 27 via api from ES

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 192.3.7.204, located in Buffalo, United States and belongs to AS-COLOCROSSING, US. The main domain is windows2016.giize.com.
TLS certificate: Issued by cPanel, Inc. Certification Authority on November 27th 2020. Valid for: 3 months.
This is the only time windows2016.giize.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 192.3.7.204 36352 (AS-COLOCR...)
1 1
Apex Domain
Subdomains
Transfer
1 giize.com
windows2016.giize.com
648 B
1 1
Domain Requested by
1 windows2016.giize.com
1 1

This site contains no links.

Subject Issuer Validity Valid
windows2016.giize.com
cPanel, Inc. Certification Authority
2020-11-27 -
2021-02-25
3 months crt.sh

This page contains 1 frames:

Primary Page: https://windows2016.giize.com/
Frame ID: B571C11CDE0ABA8B3D90E779B15F552D
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1 kB
Transfer

0 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set /
windows2016.giize.com/
194 B
648 B
Document
General
Full URL
https://windows2016.giize.com/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
192.3.7.204 Buffalo, United States, ASN36352 (AS-COLOCROSSING, US),
Reverse DNS
host.colocrossing.com
Software
Apache /
Resource Hash
afca372f9959cb6c46bde573d25172c1b223dac52cba20ffad3c8fc2ea09cc8e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
windows2016.giize.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 27 Nov 2020 15:48:00 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Set-Cookie
PHPSESSID=57f3568224c3e90eafde25e89b961011; path=/
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Verdicts & Comments Add Verdict or Comment

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated

1 Cookies

Domain/Path Name / Value
windows2016.giize.com/ Name: PHPSESSID
Value: 57f3568224c3e90eafde25e89b961011

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

windows2016.giize.com
192.3.7.204
afca372f9959cb6c46bde573d25172c1b223dac52cba20ffad3c8fc2ea09cc8e