pwawallet.fantom.network
Open in
urlscan Pro
2a01:7a7:2:2545:ec4:7aff:fe18:619a
Public Scan
Submission: On April 27 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on April 27th 2020. Valid for: 3 months.
This is the only time pwawallet.fantom.network was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2a01:7a7:2:25... 2a01:7a7:2:2545:ec4:7aff:fe18:619a | 29066 (VELIANET-...) (VELIANET-AS velia.net Internetdienste GmbH) | |
1 | 2a02:26f0:10:... 2a02:26f0:10:292::19fd | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
6 | 2 |
ASN29066 (VELIANET-AS velia.net Internetdienste GmbH, DE)
pwawallet.fantom.network |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
fantom.network
pwawallet.fantom.network |
2 MB |
1 |
typekit.net
p.typekit.net |
334 B |
6 | 2 |
Domain | Requested by | |
---|---|---|
5 | pwawallet.fantom.network |
pwawallet.fantom.network
|
1 | p.typekit.net |
pwawallet.fantom.network
|
6 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
pwawallet.fantom.network Let's Encrypt Authority X3 |
2020-04-27 - 2020-07-26 |
3 months | crt.sh |
*.typekit.net DigiCert SHA2 Secure Server CA |
2019-12-06 - 2021-12-10 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://pwawallet.fantom.network/
Frame ID: 3FB530EA846681880AD5DD4AAC6DC19C
Requests: 6 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
pwawallet.fantom.network/ |
2 KB 908 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.4d0ca5a2.css
pwawallet.fantom.network/css/ |
65 KB 66 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.c5c955ed.css
pwawallet.fantom.network/css/ |
823 B 955 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.a7cf202f.js
pwawallet.fantom.network/js/ |
127 KB 127 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.7dab3b7a.js
pwawallet.fantom.network/js/ |
2 MB 2 MB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
p.css
p.typekit.net/ |
5 B 334 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| webpackJsonp object| regeneratorRuntime object| @@any-promise/REGISTRATION object| __APOLLO_CLIENT__0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
p.typekit.net
pwawallet.fantom.network
2a01:7a7:2:2545:ec4:7aff:fe18:619a
2a02:26f0:10:292::19fd
1c0ff118a4290c99f39c90abb38703a866e47251b23cca20266c69c812ccafeb
1f4b5a225b691686f2d97298226989479e00f70285299b0231d132236638267a
7111ccda93541dd8e7d0c868288a003297c5f0af3ba0a681b1464c7ca3e0cc90
8c9bb02c0126cf58904cd9fdde4d84a2876679317fe887238842d00d6a8fde62
aed0a8c15296f91c49b0ccc2b434d627c2f9b3a64db32feb3d546b22b0547aa2
d76d2390337dda7cc15bc4f6988212f2a435b3d8b0925cde07e686bf122ccf6c