Submitted URL: http://zipsites6b.staging.tempurl.host/
Effective URL: https://zipsites6b.staging.tempurl.host/
Submission Tags: @phish_report
Submission: On October 18 via api from FI — Scanned from AU

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 45.76.31.246, located in Elk Grove Village, United States and belongs to AS-VULTR, US. The main domain is zipsites6b.staging.tempurl.host.
TLS certificate: Issued by E6 on October 17th 2024. Valid for: 3 months.
This is the only time zipsites6b.staging.tempurl.host was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 45.76.31.246 20473 (AS-VULTR)
1 1
Apex Domain
Subdomains
Transfer
1 tempurl.host
zipsites6b.staging.tempurl.host
1 1
Domain Requested by
1 zipsites6b.staging.tempurl.host
1 1

This site contains no links.

Subject Issuer Validity Valid
*.zipsites6b.tempurl.host
E6
2024-10-17 -
2025-01-15
3 months crt.sh

This page contains 1 frames:

Primary Page: https://zipsites6b.staging.tempurl.host/
Frame ID: B1F17B47569ECF43FFF08322A0E825C5
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.


Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
zipsites6b.staging.tempurl.host/
Redirect Chain
  • http://zipsites6b.staging.tempurl.host/
  • https://zipsites6b.staging.tempurl.host/
0
0
Document
General
Full URL
https://zipsites6b.staging.tempurl.host/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
45.76.31.246 Elk Grove Village, United States, ASN20473 (AS-VULTR, US),
Reverse DNS
zipsites6b.tempurl.host
Software
nginx /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (iPhone; CPU iPhone OS 16_5_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.5 Mobile/15E148 Safari/604.1

Response headers

content-length
1766
content-type
text/html; charset=UTF-8
date
Fri, 18 Oct 2024 12:46:51 GMT
etag
"6673099b-6e6"
server
nginx
www-authenticate
Basic realm="Password Protection Enabled"

Redirect headers

Location
https://zipsites6b.staging.tempurl.host/
Non-Authoritative-Reason
HttpsUpgrades

Verdicts & Comments Add Verdict or Comment

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| certificateErrorPageController object| errorPageController object| supervisedUserErrorPageController

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: chrome-error://chromewebdata/
Message:
Failed to load resource: the server responded with a status of 401 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

zipsites6b.staging.tempurl.host
45.76.31.246