pwawallet.fantom.network Open in urlscan Pro
2a01:7a7:2:2545:ec4:7aff:fe18:619a  Public Scan

URL: https://pwawallet.fantom.network/
Submission: On April 27 via automatic, source certstream-suspicious

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 6 HTTP transactions. The main IP is 2a01:7a7:2:2545:ec4:7aff:fe18:619a, located in Germany and belongs to VELIANET-AS velia.net Internetdienste GmbH, DE. The main domain is pwawallet.fantom.network.
TLS certificate: Issued by Let's Encrypt Authority X3 on April 27th 2020. Valid for: 3 months.
This is the only time pwawallet.fantom.network was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
5 2a01:7a7:2:25... 29066 (VELIANET-...)
1 2a02:26f0:10:... 20940 (AKAMAI-ASN1)
6 2
Apex Domain
Subdomains
Transfer
5 fantom.network
pwawallet.fantom.network
2 MB
1 typekit.net
p.typekit.net
334 B
6 2
Domain Requested by
5 pwawallet.fantom.network pwawallet.fantom.network
1 p.typekit.net pwawallet.fantom.network
6 2

This site contains no links.

Subject Issuer Validity Valid
pwawallet.fantom.network
Let's Encrypt Authority X3
2020-04-27 -
2020-07-26
3 months crt.sh
*.typekit.net
DigiCert SHA2 Secure Server CA
2019-12-06 -
2021-12-10
2 years crt.sh

This page contains 1 frames:

Primary Page: https://pwawallet.fantom.network/
Frame ID: 3FB530EA846681880AD5DD4AAC6DC19C
Requests: 6 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Ubuntu/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

6
Requests

100 %
HTTPS

100 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

1752 kB
Transfer

1751 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
pwawallet.fantom.network/
2 KB
908 B
Document
General
Full URL
https://pwawallet.fantom.network/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2a01:7a7:2:2545:ec4:7aff:fe18:619a , Germany, ASN29066 (VELIANET-AS velia.net Internetdienste GmbH, DE),
Reverse DNS
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
7111ccda93541dd8e7d0c868288a003297c5f0af3ba0a681b1464c7ca3e0cc90

Request headers

:method
GET
:authority
pwawallet.fantom.network
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
server
nginx/1.14.0 (Ubuntu)
date
Mon, 27 Apr 2020 18:06:44 GMT
content-type
text/html
last-modified
Mon, 27 Apr 2020 18:03:09 GMT
etag
W/"5ea71e5d-7b5"
content-encoding
gzip
app.4d0ca5a2.css
pwawallet.fantom.network/css/
65 KB
66 KB
Stylesheet
General
Full URL
https://pwawallet.fantom.network/css/app.4d0ca5a2.css
Requested by
Host: pwawallet.fantom.network
URL: https://pwawallet.fantom.network/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2a01:7a7:2:2545:ec4:7aff:fe18:619a , Germany, ASN29066 (VELIANET-AS velia.net Internetdienste GmbH, DE),
Reverse DNS
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
aed0a8c15296f91c49b0ccc2b434d627c2f9b3a64db32feb3d546b22b0547aa2

Request headers

Referer
https://pwawallet.fantom.network/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 27 Apr 2020 18:06:44 GMT
last-modified
Mon, 27 Apr 2020 18:03:09 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"5ea71e5d-10534"
content-type
text/css
status
200
accept-ranges
bytes
content-length
66868
chunk-vendors.c5c955ed.css
pwawallet.fantom.network/css/
823 B
955 B
Stylesheet
General
Full URL
https://pwawallet.fantom.network/css/chunk-vendors.c5c955ed.css
Requested by
Host: pwawallet.fantom.network
URL: https://pwawallet.fantom.network/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2a01:7a7:2:2545:ec4:7aff:fe18:619a , Germany, ASN29066 (VELIANET-AS velia.net Internetdienste GmbH, DE),
Reverse DNS
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
d76d2390337dda7cc15bc4f6988212f2a435b3d8b0925cde07e686bf122ccf6c

Request headers

Referer
https://pwawallet.fantom.network/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 27 Apr 2020 18:06:44 GMT
last-modified
Mon, 27 Apr 2020 18:03:09 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"5ea71e5d-337"
content-type
text/css
status
200
accept-ranges
bytes
content-length
823
app.a7cf202f.js
pwawallet.fantom.network/js/
127 KB
127 KB
Script
General
Full URL
https://pwawallet.fantom.network/js/app.a7cf202f.js
Requested by
Host: pwawallet.fantom.network
URL: https://pwawallet.fantom.network/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2a01:7a7:2:2545:ec4:7aff:fe18:619a , Germany, ASN29066 (VELIANET-AS velia.net Internetdienste GmbH, DE),
Reverse DNS
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
8c9bb02c0126cf58904cd9fdde4d84a2876679317fe887238842d00d6a8fde62

Request headers

Referer
https://pwawallet.fantom.network/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 27 Apr 2020 18:06:44 GMT
last-modified
Mon, 27 Apr 2020 18:03:09 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"5ea71e5d-1fb65"
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
129893
chunk-vendors.7dab3b7a.js
pwawallet.fantom.network/js/
2 MB
2 MB
Script
General
Full URL
https://pwawallet.fantom.network/js/chunk-vendors.7dab3b7a.js
Requested by
Host: pwawallet.fantom.network
URL: https://pwawallet.fantom.network/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2a01:7a7:2:2545:ec4:7aff:fe18:619a , Germany, ASN29066 (VELIANET-AS velia.net Internetdienste GmbH, DE),
Reverse DNS
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
1f4b5a225b691686f2d97298226989479e00f70285299b0231d132236638267a

Request headers

Referer
https://pwawallet.fantom.network/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 27 Apr 2020 18:06:44 GMT
last-modified
Mon, 27 Apr 2020 18:03:09 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"5ea71e5d-184ec9"
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
1593033
p.css
p.typekit.net/
5 B
334 B
Stylesheet
General
Full URL
https://p.typekit.net/p.css?s=1&k=evf2xmx&ht=tk&f=139.173.175.25136&a=9527591&app=typekit&e=css
Requested by
Host: pwawallet.fantom.network
URL: https://pwawallet.fantom.network/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:10:292::19fd , Ascension Island, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
Software
nginx /
Resource Hash
1c0ff118a4290c99f39c90abb38703a866e47251b23cca20266c69c812ccafeb

Request headers

Referer
https://pwawallet.fantom.network/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 27 Apr 2020 18:06:44 GMT
Last-Modified
Fri, 18 Oct 2019 20:47:29 GMT
Server
nginx
ETag
"5daa24e1-5"
Content-Type
text/css
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
5
Expires
Wed, 11 Dec 2019 16:45:14 GMT

Verdicts & Comments Add Verdict or Comment

6 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| webpackJsonp object| regeneratorRuntime object| @@any-promise/REGISTRATION object| __APOLLO_CLIENT__

0 Cookies