www.zhongxinwanka.com
Open in
urlscan Pro
116.62.51.184
Public Scan
Submission Tags: @phishunt_io
Submission: On June 01 via api from DE
Summary
TLS certificate: Issued by Encryption Everywhere DV TLS CA - G1 on September 11th 2020. Valid for: a year.
This is the only time www.zhongxinwanka.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 11 | 116.62.51.184 116.62.51.184 | 37963 (CNNIC-ALI...) (CNNIC-ALIBABA-CN-NET-AP Hangzhou Alibaba Advertising Co.) | |
10 | 1 |
ASN37963 (CNNIC-ALIBABA-CN-NET-AP Hangzhou Alibaba Advertising Co.,Ltd., CN)
www.zhongxinwanka.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
zhongxinwanka.com
1 redirects
www.zhongxinwanka.com |
899 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
11 | www.zhongxinwanka.com |
1 redirects
www.zhongxinwanka.com
|
10 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
apps.apple.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.zhongxinwanka.com Encryption Everywhere DV TLS CA - G1 |
2020-09-11 - 2021-09-12 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.zhongxinwanka.com/download/
Frame ID: 27C2A5105F12A26DF95EECEC7ABD1860
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://www.zhongxinwanka.com/download
HTTP 301
https://www.zhongxinwanka.com/download/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: 确定
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.zhongxinwanka.com/download
HTTP 301
https://www.zhongxinwanka.com/download/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.zhongxinwanka.com/download/ Redirect Chain
|
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iosdownlead.css
www.zhongxinwanka.com/download/css/ |
9 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.8.3.min.js
www.zhongxinwanka.com/download/js/ |
91 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common.js
www.zhongxinwanka.com/download/js/ |
2 KB 889 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ioslead01.png
www.zhongxinwanka.com/download/images/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
step00.png
www.zhongxinwanka.com/download/images/ |
261 KB 261 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
step01.png
www.zhongxinwanka.com/download/images/ |
265 KB 266 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
step02.png
www.zhongxinwanka.com/download/images/ |
126 KB 127 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
step03.png
www.zhongxinwanka.com/download/images/ |
119 KB 120 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
step04.png
www.zhongxinwanka.com/download/images/ |
82 KB 82 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery object| bdd_common boolean| isiOS string| ua boolean| isWeixin object| iosTips object| iosTips_marker function| downloadapp0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=15768000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.zhongxinwanka.com
116.62.51.184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