mssql.mahosal.ir
Open in
urlscan Pro
31.25.91.7
Public Scan
Effective URL: https://mssql.mahosal.ir/login_up.php?success_redirect_url=%2F
Submission: On April 06 via api from US — Scanned from US
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on October 20th 2023. Valid for: a year.
This is the only time mssql.mahosal.ir was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 18 | 31.25.91.7 31.25.91.7 | 34412 (SABA-HOST) (SABA-HOST) | |
1 | 35.186.247.156 35.186.247.156 | 15169 (GOOGLE) (GOOGLE) | |
2 | 35.89.72.88 35.89.72.88 | 16509 (AMAZON-02) (AMAZON-02) | |
19 | 4 |
ASN34412 (SABA-HOST, IR)
PTR: setareh.r1host.com
mssql.mahosal.ir |
ASN15169 (GOOGLE, US)
PTR: 156.247.186.35.bc.googleusercontent.com
sentry.io |
ASN16509 (AMAZON-02, US)
PTR: ec2-35-89-72-88.us-west-2.compute.amazonaws.com
firehose.us-west-2.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
18 |
mahosal.ir
2 redirects
mssql.mahosal.ir |
3 MB |
2 |
amazonaws.com
firehose.us-west-2.amazonaws.com — Cisco Umbrella Rank: 7253 |
705 B |
1 |
sentry.io
sentry.io — Cisco Umbrella Rank: 163 |
324 B |
19 | 3 |
Domain | Requested by | |
---|---|---|
18 | mssql.mahosal.ir |
2 redirects
mssql.mahosal.ir
|
2 | firehose.us-west-2.amazonaws.com |
mssql.mahosal.ir
|
1 | sentry.io |
mssql.mahosal.ir
|
19 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
docs.plesk.com |
support.plesk.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.r1host.com Sectigo RSA Domain Validation Secure Server CA |
2023-10-20 - 2024-10-20 |
a year | crt.sh |
sentry.io DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2023-08-08 - 2024-09-07 |
a year | crt.sh |
firehose.us-west-2.amazonaws.com Amazon RSA 2048 M01 |
2024-02-26 - 2025-02-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://mssql.mahosal.ir/login_up.php?success_redirect_url=%2F
Frame ID: 59A9BBE05FA666820AA6E45EA4FE9F99
Requests: 19 HTTP requests in this frame
Screenshot
Page Title
Plesk Obsidian 18.0.45Page URL History Show full URLs
-
https://mssql.mahosal.ir/
HTTP 303
https://mssql.mahosal.ir/login.php?success_redirect_url=%2F HTTP 303
https://mssql.mahosal.ir/login_up.php?success_redirect_url=%2F Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Prototype (JavaScript Frameworks) Expand
Detected patterns
- (?:prototype|protoaculous)(?:-([\d.]*[\d]))?.*\.js
RequireJS (JavaScript Frameworks) Expand
Detected patterns
- require.*\.js
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Cookies collect information
Search URL Search Domain Scan URL
Title: What username and password to use?
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://mssql.mahosal.ir/
HTTP 303
https://mssql.mahosal.ir/login.php?success_redirect_url=%2F HTTP 303
https://mssql.mahosal.ir/login_up.php?success_redirect_url=%2F Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login_up.php
mssql.mahosal.ir/ Redirect Chain
|
23 KB 23 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
plesk-ui-library.css
mssql.mahosal.ir/ui-library/ |
182 KB 183 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
mssql.mahosal.ir/cp/theme/css/ |
319 KB 319 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
prototype.js
mssql.mahosal.ir/cp/javascript/externals/ |
95 KB 95 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
plesk-ui-library.min.js
mssql.mahosal.ir/ui-library/ |
461 KB 462 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendors.js
mssql.mahosal.ir/cp/javascript/ |
1 MB 1 MB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
mssql.mahosal.ir/cp/javascript/ |
478 KB 479 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
require.js
mssql.mahosal.ir/cp/javascript/externals/ |
17 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
global.js
mssql.mahosal.ir/modules/notifier/ |
15 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
global.js
mssql.mahosal.ir/modules/letsencrypt/ |
726 B 808 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
sentry.io/api/1327420/envelope/ |
2 B 324 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
symbols.svg
mssql.mahosal.ir/ui-library/images/ |
252 KB 252 KB |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-600.woff2
mssql.mahosal.ir/ui-library/fonts/ |
60 KB 60 KB |
Font
font/x-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-regular.woff2
mssql.mahosal.ir/ui-library/fonts/ |
58 KB 58 KB |
Font
font/x-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.svg
mssql.mahosal.ir/cp/theme/images/logos/plesk/ |
3 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
35 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
/
firehose.us-west-2.amazonaws.com/ |
257 B 705 B |
XHR
application/x-amz-json-1.1 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H/1.1 |
/
firehose.us-west-2.amazonaws.com/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.svg
mssql.mahosal.ir/images/ |
638 B 720 B |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
mssql.mahosal.ir/ |
4 KB 4 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
76 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| Prototype object| Class function| PeriodicalExecuter function| Template object| $break object| Enumerable function| $A function| $w function| $H function| Hash function| $R function| ObjectRange object| Abstract object| Try object| Ajax object| Form object| Field function| $F object| Toggle object| Insertion object| $continue object| Position function| $ function| $$ undefined| Sizzle function| Selector object| webpackChunkPleskUiLibrary object| PleskUiLibrary object| webpackChunkPlesk function| clearImmediate function| setImmediate object| __SENTRY__ object| process object| AdminPanel object| Smb function| GetContext function| GetHelpModule function| GetHelpPrefix function| OpenHelpWindow function| SetContext function| SetHelpModule function| SetHelpPrefix function| errorfield function| getHelpUrl function| getParentNodeByName function| go_to function| loff function| lon function| lsubmit function| syn function| block_to_num function| chk_dom function| chk_email function| chk_ip_address_and_mask function| chk_ip_t function| chk_login function| chk_mask function| chk_mn function| chk_pd_name function| chk_pos_int function| chk_realm function| chk_sys_passwd function| chk_uint function| chk_url function| ip2long object| Jsw object| Plesk function| requirejs function| require function| define object| PleskExt string| std_context string| _help_prefix string| _help_module string| _context object| tooltip0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
firehose.us-west-2.amazonaws.com
mssql.mahosal.ir
sentry.io
31.25.91.7
35.186.247.156
35.89.72.88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