exploringbandarban.techzoddha.com
Open in
urlscan Pro
2404:2f40:1a0a:1a06::42
Public Scan
Effective URL: https://exploringbandarban.techzoddha.com/login
Submission Tags: @phish_report
Submission: On September 19 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by E5 on September 19th 2024. Valid for: 3 months.
This is the only time exploringbandarban.techzoddha.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 2404:2f40:1a0... 2404:2f40:1a0a:1a06::42 | 133938 (XEON-BD Xeon) (XEON-BD Xeon) | |
2 | 103.48.119.42 103.48.119.42 | 133938 (XEON-BD Xeon) (XEON-BD Xeon) | |
6 | 2a00:1450:400... 2a00:1450:4001:82f::200a | 15169 (GOOGLE) (GOOGLE) | |
3 | 2a00:1450:400... 2a00:1450:4001:803::2003 | 15169 (GOOGLE) (GOOGLE) | |
13 | 5 |
ASN133938 (XEON-BD Xeon, BD)
exploringbandarban.techzoddha.com |
ASN133938 (XEON-BD Xeon, BD)
PTR: neptune.mydchub.com
exploringbandarban.techzoddha.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 31 |
6 KB |
4 |
techzoddha.com
1 redirects
exploringbandarban.techzoddha.com |
142 KB |
3 |
gstatic.com
fonts.gstatic.com |
55 KB |
0 |
Failed
function sub() { [native code] }. Failed |
|
13 | 4 |
Domain | Requested by | |
---|---|---|
6 | fonts.googleapis.com |
exploringbandarban.techzoddha.com
|
4 | exploringbandarban.techzoddha.com |
1 redirects
exploringbandarban.techzoddha.com
|
3 | fonts.gstatic.com |
fonts.googleapis.com
|
0 | 127.0.0.1 Failed |
exploringbandarban.techzoddha.com
|
13 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
techzoddha.com E5 |
2024-09-19 - 2024-12-18 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-08-26 - 2024-11-18 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-08-26 - 2024-11-18 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://exploringbandarban.techzoddha.com/login
Frame ID: 65B1D8F99BA329CE44A1DDDCD347C8BE
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
জেলা প্রশাসক, বান্দরবানPage URL History Show full URLs
-
http://exploringbandarban.techzoddha.com/
HTTP 307
https://exploringbandarban.techzoddha.com/ HTTP 302
https://exploringbandarban.techzoddha.com/login Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://exploringbandarban.techzoddha.com/
HTTP 307
https://exploringbandarban.techzoddha.com/ HTTP 302
https://exploringbandarban.techzoddha.com/login Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login
exploringbandarban.techzoddha.com/ Redirect Chain
|
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
style.css
exploringbandarban.techzoddha.com/vendor/css/ |
1 MB 118 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
login_logo.png
exploringbandarban.techzoddha.com/images/login/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
login_background.jpg
127.0.0.1/images/login/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
10 KB 835 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
4 KB 551 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
16 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
7 KB 707 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
6 KB 798 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
5 KB 1009 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v32/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
fonts.gstatic.com/s/roboto/v32/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmEU9fBBc4.woff2
fonts.gstatic.com/s/roboto/v32/ |
18 KB 19 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- 127.0.0.1
- URL
- http://127.0.0.1:8000/images/login/login_background.jpg
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
exploringbandarban.techzoddha.com/ | Name: XSRF-TOKEN Value: eyJpdiI6ImxWOGc0WVFqOHFqZ1pIMThXRWJ6OHc9PSIsInZhbHVlIjoiRnZySzZZYjFRTTd6TjRMQm5DSjlCNFVRRzBsQSs1VnhxNVpkcS8rQmJWOWJOUFBTdnAzdDZOeTJSb3h2SU8ySDFnMm11eHc4ZlRIRXJCMWl1V0xWa0NRSFRPU2IrTHFaWGxkUnFSc1FMMUI1Mi9ibWJ1VkZ2SytKWi9TUEE3TTYiLCJtYWMiOiI4YWEzNWYzZGNkOTVlZGE2NGRjMTVlYTBjYjNiNGNlM2MzOGM2ODgzOWFhNzQwZDZkZWYxMzhiMDYzOThlYjgwIn0%3D |
|
exploringbandarban.techzoddha.com/ | Name: onapotti_session Value: eyJpdiI6IlNGNVhmbFR4cXU4Uk9ES3FIODZmanc9PSIsInZhbHVlIjoianUrUVk4c242TDRKcmZaOHArVUljc3hQWkZzUUVRNHJmNWw3NlVsRUVHNU9IQUQvMEVjWnMzU1FyUWV1dkM5UzJjeGNpMHZqYzdTM0R5SjhDblZoVFIvcWwwQnFObzFDcGFwc2pCMklMbTllQXlLZnB0K2d1Qk5PN201ZFZSQWgiLCJtYWMiOiI4M2UzMjhmY2FlODk5ODc2MDY4MzY0MjkwZWM5YzE4MmNkOGE4M2VhYWM1NDAxNGU4NjgxMmE1NjljZGExNGI2In0%3D |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
127.0.0.1
exploringbandarban.techzoddha.com
fonts.googleapis.com
fonts.gstatic.com
127.0.0.1
103.48.119.42
2404:2f40:1a0a:1a06::42
2a00:1450:4001:803::2003
2a00:1450:4001:82f::200a
0b2beb57223d0169d830e0ae57630d493fe5864d42db73b2fefd5d466e302a8a
3ff27e82d78a471905edf58f54d412011e0f3b07cb596b50d425151e7df84404
77b90d79a53397c06475b66eb6cd048708aac8ccd86920e0612a4e5586a635cf
89978e658e840b927dddb5cb3a835c7d8526ece79933bd9f3096b301fe1a8571
976197ea9915971fe95c9723dd2c97278ed7bcd15b491a65d79be2bcd92836fa
9c2f721885ededb421e7a4a69efd8cddce6a97fdbdff98cfb650a700c01dc388
ae0e442895406e9922237108496c2cd60f4947649a826463e2da9860b5c25dd6
be31cc6f5ad4f089f1a4a804709695eb70f481268e6b28add3be269aff468f30
d0e980bb283c68d019c94eaf820686ab2d446f21a95bc98a5db4018faf3dc573
d2619808dc6b38ada9e6ffe1f956e1dd2825f5feefb9e319623c86bd782f7725
d3f78e051d78d87c99e6b286503b34402e82e741415039790bb9e9eaabce7493
d9bada3a44bb2ffa66dec5cc781cafc9ef17ed876cd9b0c5f7ef18228b63cebb