rootbsd.cet.co.za
Open in
urlscan Pro
199.233.228.46
Public Scan
Submission: On July 24 via api from US
Summary
This is the only time rootbsd.cet.co.za was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 199.233.228.46 199.233.228.46 | 36236 (NETACTUATE) (NETACTUATE) | |
15 | 1 |
ASN36236 (NETACTUATE, US)
PTR: rootbsd.cet.co.za
rootbsd.cet.co.za |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
cet.co.za
rootbsd.cet.co.za |
40 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | rootbsd.cet.co.za |
rootbsd.cet.co.za
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://rootbsd.cet.co.za/
Frame ID: 06C3D849461CE89726C47CF0A9F499F4
Requests: 15 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
FreeBSD (Operating Systems) Expand
Detected patterns
- headers server /FreeBSD(?: ([\d.]+))?/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_dav (Web Server Extensions) Expand
Detected patterns
- headers server /\b(?:mod_)?DAV\b(?:\/([\d.]+))?/i
mod_ssl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_ssl(?:\/([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
- headers server /\b(?:mod_)?DAV\b(?:\/([\d.]+))?/i
- headers server /mod_ssl(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
rootbsd.cet.co.za/ |
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
StyleSheet.css
rootbsd.cet.co.za/style/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cpu-day.png
rootbsd.cet.co.za/ipa/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ipa-internet-rate-day.png
rootbsd.cet.co.za/ipa/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ipa-internet-total-day.png
rootbsd.cet.co.za/ipa/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ipa-internetnational-rate-day.png
rootbsd.cet.co.za/ipa/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ipa-internetnational-total-day.png
rootbsd.cet.co.za/ipa/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ipa-internetlocal-rate-day.png
rootbsd.cet.co.za/ipa/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ipa-internetlocal-total-day.png
rootbsd.cet.co.za/ipa/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ipa-local-rate-day.png
rootbsd.cet.co.za/ipa/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ipa-local-total-day.png
rootbsd.cet.co.za/ipa/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ipa-pop-rate-day.png
rootbsd.cet.co.za/ipa/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ipa-pop-total-day.png
rootbsd.cet.co.za/ipa/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ipa-smtp-rate-day.png
rootbsd.cet.co.za/ipa/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ipa-smtp-total-day.png
rootbsd.cet.co.za/ipa/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
rootbsd.cet.co.za
199.233.228.46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