techb2bsolutions.com
Open in
urlscan Pro
184.168.112.170
Public Scan
Submission: On April 27 via api from BY — Scanned from SG
Summary
TLS certificate: Issued by Go Daddy Secure Certificate Authority... on October 21st 2023. Valid for: a year.
This is the only time techb2bsolutions.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 184.168.112.170 184.168.112.170 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC) | |
2 | 104.18.11.207 104.18.11.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2404:6800:400... 2404:6800:4003:c01::5f | 15169 (GOOGLE) (GOOGLE) | |
8 | 3 |
ASN26496 (AS-26496-GO-DADDY-COM-LLC, US)
PTR: 170.112.168.184.host.secureserver.net
techb2bsolutions.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
techb2bsolutions.com
techb2bsolutions.com — Cisco Umbrella Rank: 432498 |
311 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1139 |
32 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 363 |
31 KB |
8 | 3 |
Domain | Requested by | |
---|---|---|
5 | techb2bsolutions.com |
techb2bsolutions.com
|
2 | maxcdn.bootstrapcdn.com |
techb2bsolutions.com
|
1 | ajax.googleapis.com |
techb2bsolutions.com
|
8 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.splunk.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
techb2bsolutions.com Go Daddy Secure Certificate Authority - G2 |
2023-10-21 - 2024-11-18 |
a year | crt.sh |
bootstrapcdn.com GTS CA 1P5 |
2024-03-27 - 2024-06-25 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2024-04-08 - 2024-07-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://techb2bsolutions.com/April22/An%20Empirically%20Comparative%20Analysis%20of%20Ransomware%20Binaries/index.html?utm_source=BenchmarkEmail&utm_campaign=Splunk_Content_Syndication_AMS_SID_slot_3&utm_medium=email
Frame ID: A2425DAB168DEBB7078257EA42C8F72C
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
An Empirically Comparative Analysis of Ransomware BinariesDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Splunk Website Terms & Conditions of Use
Search URL Search Domain Scan URL
Title: Splunk Privacy Policy
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.html
techb2bsolutions.com/April22/An%20Empirically%20Comparative%20Analysis%20of%20Ransomware%20Binaries/ |
25 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.4.1/css/ |
119 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.4.1/ |
86 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/3.4.1/js/ |
39 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
techb2bsolutions.com/April22/An%20Empirically%20Comparative%20Analysis%20of%20Ransomware%20Binaries/ |
2 KB 634 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Capture.PNG
techb2bsolutions.com/April22/An%20Empirically%20Comparative%20Analysis%20of%20Ransomware%20Binaries/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Capture1.PNG
techb2bsolutions.com/April22/An%20Empirically%20Comparative%20Analysis%20of%20Ransomware%20Binaries/ |
301 KB 301 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
techb2bsolutions.com/ |
2 KB 734 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
maxcdn.bootstrapcdn.com
techb2bsolutions.com
104.18.11.207
184.168.112.170
2404:6800:4003:c01::5f
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
6d92dfc1700fd38cd130ad818e23bc8aef697f815b2ea5face2b5dfad22f2e11
9ee2fcff6709e4d0d24b09ca0fc56aade12b4961ed9c43fd13b03248bfb57afe
b55f922980251bb097e6027301e1940d3f7a20e4583d19c854b67fb900a69d4f
c69d6e675bd6da0184f545b4c6b37c0dad632f0f14a6c9ecdf0762fe9e1f7d03
c7bccca4fae276fb3ab935a641d9c551010104e77f60ac569f2b9c3c8949db30
cdc8b52c9402b72ef9c698027c0d2ea63058ed98b832a31d3ac57c9e7f8b35ed
ed78200c7541b23a785d6bc49dc1cee46b536e604d62848df339f0a68c6993a0