billing.hntelecom.com.bd
Open in
urlscan Pro
103.93.90.11
Public Scan
Submission: On January 04 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on January 4th 2020. Valid for: 3 months.
This is the only time billing.hntelecom.com.bd was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 103.93.90.11 103.93.90.11 | 136598 (HTL-AS-AP...) (HTL-AS-AP HN Telecom Limited) | |
4 | 1 |
ASN136598 (HTL-AS-AP HN Telecom Limited, BD)
PTR: billing.hntelecom.com.bd
billing.hntelecom.com.bd |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
hntelecom.com.bd
billing.hntelecom.com.bd |
171 KB |
4 | 1 |
Domain | Requested by | |
---|---|---|
4 | billing.hntelecom.com.bd |
billing.hntelecom.com.bd
|
4 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
billing.hntelecom.com.bd Let's Encrypt Authority X3 |
2020-01-04 - 2020-04-03 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://billing.hntelecom.com.bd/
Frame ID: 3928A9ED5ACDD5F38DDF7AB2A9FF1F23
Requests: 4 HTTP requests in this frame
Screenshot
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
billing.hntelecom.com.bd/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
billing.hntelecom.com.bd/bower_components/bootstrap/dist/css/ |
115 KB 115 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
billing.hntelecom.com.bd/images/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
billing.hntelecom.com.bd/bower_components/bootstrap/dist/js/ |
35 KB 35 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
billing.hntelecom.com.bd/ | Name: JSESSIONID Value: CAD4E1E7639012A9FCE512E5AFB81EC7 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
billing.hntelecom.com.bd
103.93.90.11
6447e59227786bcda7ad58ef045540cba328e5ec0e5ddbd88b4f57122feaf926
ab498f94d8763132d0eeb0a03f1e413abade03d6fe26e1968b392c4172a0a3ca
bb5a696953f681f19d6e2cd2d6adc31202761ec3b47d1f072c96abac5cf61973
e7a19173e444dc0f49ae56520f7bf6ae876e5dc3bb1230022e00dd184697c9d6