URL: https://pass.nsoservice.com/
Submission: On September 29 via automatic, source certstream-suspicious — Scanned from FR

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 16 HTTP transactions. The main IP is 51.83.107.186, located in France and belongs to OVH, FR. The main domain is pass.nsoservice.com.
TLS certificate: Issued by R10 on September 29th 2024. Valid for: 3 months.
This is the only time pass.nsoservice.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
16 51.83.107.186 16276 (OVH)
16 1
Apex Domain
Subdomains
Transfer
16 nsoservice.com
pass.nsoservice.com
6 MB
16 1
Domain Requested by
16 pass.nsoservice.com pass.nsoservice.com
16 1

This site contains no links.

Subject Issuer Validity Valid
pass.nsoservice.com
R10
2024-09-29 -
2024-12-28
3 months crt.sh

This page contains 1 frames:

Primary Page: https://pass.nsoservice.com/
Frame ID: 6DA228AFF198955F1529DE5C1CD94370
Requests: 16 HTTP requests in this frame

Screenshot

Page Title

Bitwarden Web vault

Page Statistics

16
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

6470 kB
Transfer

7171 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

16 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
pass.nsoservice.com/
1 KB
1 KB
Document
General
Full URL
https://pass.nsoservice.com/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
c941e03acdd1211c4d237e534ba5c783cc949b53ec2bc5c372358a5e98ca1ae5
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36

Response headers

content-encoding
gzip
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
content-type
text/html
date
Sun, 29 Sep 2024 13:02:12 GMT
etag
W/"1db0963fa1a4212"
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
referrer-policy
same-origin
server
nginx
strict-transport-security
max-age=15768000
vary
Accept-Encoding
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-robots-tag
noindex, nofollow
x-xss-protection
1; mode=block
theme_head.4cb181fc19f2a308ba73.js
pass.nsoservice.com/
541 B
1 KB
Script
General
Full URL
https://pass.nsoservice.com/theme_head.4cb181fc19f2a308ba73.js
Requested by
Host: pass.nsoservice.com
URL: https://pass.nsoservice.com/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
c1ee01918c87b5e02f38bc5c6edc44213fd1ff45a6e60bc7fbd5cdf47b2e4b9f
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://pass.nsoservice.com/

Response headers

strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
etag
"1db0963fa1a451d"
referrer-policy
same-origin
x-content-type-options
nosniff
accept-ranges
bytes
content-length
541
date
Sun, 29 Sep 2024 13:02:12 GMT
x-xss-protection
1; mode=block
content-type
text/javascript
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
server
nginx
x-frame-options
SAMEORIGIN
styles.34e783d9b55ccb829eb0.css
pass.nsoservice.com/
263 KB
44 KB
Stylesheet
General
Full URL
https://pass.nsoservice.com/styles.34e783d9b55ccb829eb0.css
Requested by
Host: pass.nsoservice.com
URL: https://pass.nsoservice.com/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
28fbb36bc1cacd69a6c659413dc3931fb2dc59a0d0a6b530ad096bf4c7fc298b
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://pass.nsoservice.com/

Response headers

strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
content-encoding
gzip
etag
W/"1db0963fa1e5a76"
referrer-policy
same-origin
x-content-type-options
nosniff
date
Sun, 29 Sep 2024 13:02:12 GMT
x-xss-protection
1; mode=block
content-type
text/css
vary
Accept-Encoding
server
nginx
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
x-frame-options
SAMEORIGIN
polyfills.29df99c3b4cce310c87a.js
pass.nsoservice.com/app/
209 KB
209 KB
Script
General
Full URL
https://pass.nsoservice.com/app/polyfills.29df99c3b4cce310c87a.js
Requested by
Host: pass.nsoservice.com
URL: https://pass.nsoservice.com/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
646839edff3e54a6338c2724b918dab6d7c6500173085fc687b9d2708d687368
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://pass.nsoservice.com/

Response headers

strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
cache-control
max-age=1209600
etag
"1db0963fa190577"
referrer-policy
same-origin
x-content-type-options
nosniff
accept-ranges
bytes
content-length
213623
date
Sun, 29 Sep 2024 13:02:12 GMT
x-xss-protection
1; mode=block
content-type
text/javascript
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
server
nginx
x-frame-options
SAMEORIGIN
vendor.f727a94b672294991721.js
pass.nsoservice.com/app/
2 MB
2 MB
Script
General
Full URL
https://pass.nsoservice.com/app/vendor.f727a94b672294991721.js
Requested by
Host: pass.nsoservice.com
URL: https://pass.nsoservice.com/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
b35a60caa729c295843dac2f1bac64f93285dd1610b8bfc1dc6f66896f8a3c70
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://pass.nsoservice.com/

Response headers

strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
cache-control
max-age=1209600
etag
"1db0963fa3d34d2"
referrer-policy
same-origin
x-content-type-options
nosniff
accept-ranges
bytes
content-length
2585554
date
Sun, 29 Sep 2024 13:02:12 GMT
x-xss-protection
1; mode=block
content-type
text/javascript
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
server
nginx
x-frame-options
SAMEORIGIN
main.ac1304238f89e704bed5.js
pass.nsoservice.com/app/
3 MB
3 MB
Script
General
Full URL
https://pass.nsoservice.com/app/main.ac1304238f89e704bed5.js
Requested by
Host: pass.nsoservice.com
URL: https://pass.nsoservice.com/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
01b602f6c7519d6fef0223862fcbcc1a9a08440c3c35c235c7875858197be23b
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://pass.nsoservice.com/

Response headers

strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
cache-control
max-age=1209600
etag
"1db0963fa2f7398"
referrer-policy
same-origin
x-content-type-options
nosniff
accept-ranges
bytes
content-length
3486872
date
Sun, 29 Sep 2024 13:02:12 GMT
x-xss-protection
1; mode=block
content-type
text/javascript
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
server
nginx
x-frame-options
SAMEORIGIN
styles.31d6cfe0d16ae931b73c.js
pass.nsoservice.com/
0
600 B
Script
General
Full URL
https://pass.nsoservice.com/styles.31d6cfe0d16ae931b73c.js
Requested by
Host: pass.nsoservice.com
URL: https://pass.nsoservice.com/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://pass.nsoservice.com/

Response headers

strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
etag
"1db0963fa1a4700"
referrer-policy
same-origin
x-content-type-options
nosniff
accept-ranges
bytes
content-length
0
date
Sun, 29 Sep 2024 13:02:12 GMT
x-xss-protection
1; mode=block
content-type
text/javascript
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
server
nginx
x-frame-options
SAMEORIGIN
logo.svg
pass.nsoservice.com/images/
6 KB
3 KB
Image
General
Full URL
https://pass.nsoservice.com/images/logo.svg
Requested by
Host: pass.nsoservice.com
URL: https://pass.nsoservice.com/styles.34e783d9b55ccb829eb0.css
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
14411138ce9ca3630d9e049751a483c5ab9dc489122f574da3bf02f3d8935c1e
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://pass.nsoservice.com/styles.34e783d9b55ccb829eb0.css

Response headers

strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
cache-control
max-age=604800
content-encoding
gzip
etag
W/"1db0963fa1a51ca"
referrer-policy
same-origin
x-content-type-options
nosniff
date
Sun, 29 Sep 2024 13:02:12 GMT
x-xss-protection
1; mode=block
content-type
image/svg+xml
vary
Accept-Encoding
server
nginx
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
x-frame-options
SAMEORIGIN
bwi-font.b934f3d3f42f13942a9d.ttf
pass.nsoservice.com/fonts/
77 KB
40 KB
Font
General
Full URL
https://pass.nsoservice.com/fonts/bwi-font.b934f3d3f42f13942a9d.ttf
Requested by
Host: pass.nsoservice.com
URL: https://pass.nsoservice.com/styles.34e783d9b55ccb829eb0.css
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
3be4c2aed126537de2404d407c42edd35c001799580012c61777d678b1a07b79
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Origin
https://pass.nsoservice.com
Referer
https://pass.nsoservice.com/styles.34e783d9b55ccb829eb0.css

Response headers

strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
cache-control
max-age=1209600
content-encoding
gzip
etag
W/"1db0963fa1b72a8"
referrer-policy
same-origin
x-content-type-options
nosniff
date
Sun, 29 Sep 2024 13:02:12 GMT
x-xss-protection
1; mode=block
content-type
application/x-font-ttf
vary
Accept-Encoding
server
nginx
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
x-frame-options
SAMEORIGIN
Open_Sans-normal-400.8465030b62273715c99d.woff
pass.nsoservice.com/fonts/
54 KB
55 KB
Font
General
Full URL
https://pass.nsoservice.com/fonts/Open_Sans-normal-400.8465030b62273715c99d.woff
Requested by
Host: pass.nsoservice.com
URL: https://pass.nsoservice.com/styles.34e783d9b55ccb829eb0.css
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
3adc584fb0bef1fbf9b1c0ecddde5727643b4334c734db78b517ab112d92e1d8
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Origin
https://pass.nsoservice.com
Referer
https://pass.nsoservice.com/styles.34e783d9b55ccb829eb0.css

Response headers

strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
cache-control
max-age=1209600
etag
"1db0963fa1a9f1c"
referrer-policy
same-origin
x-content-type-options
nosniff
accept-ranges
bytes
content-length
55324
date
Sun, 29 Sep 2024 13:02:12 GMT
x-xss-protection
1; mode=block
content-type
application/font-woff
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
server
nginx
x-frame-options
SAMEORIGIN
messages.json
pass.nsoservice.com/locales/fr/
301 KB
64 KB
Fetch
General
Full URL
https://pass.nsoservice.com/locales/fr/messages.json?cache=52wnv
Requested by
Host: pass.nsoservice.com
URL: https://pass.nsoservice.com/app/polyfills.29df99c3b4cce310c87a.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
9f2656ecc397527ab4669764f75715224890ae33fec0e3f6e6d5383823f462a3
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://pass.nsoservice.com/

Response headers

strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
cache-control
max-age=1209600
content-encoding
gzip
etag
W/"1db0963fa1ef5b1"
referrer-policy
same-origin
x-content-type-options
nosniff
date
Sun, 29 Sep 2024 13:02:13 GMT
x-xss-protection
1; mode=block
content-type
application/json
vary
Accept-Encoding
server
nginx
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
x-frame-options
SAMEORIGIN
messages.json
pass.nsoservice.com/locales/en/
271 KB
55 KB
Fetch
General
Full URL
https://pass.nsoservice.com/locales/en/messages.json?cache=52wnv
Requested by
Host: pass.nsoservice.com
URL: https://pass.nsoservice.com/app/polyfills.29df99c3b4cce310c87a.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
39de0292afa401535bd45fafa1d31a039c847564bfaee7912a77d8ae80e77b6d
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://pass.nsoservice.com/

Response headers

strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
cache-control
max-age=1209600
content-encoding
gzip
etag
W/"1db0963fa1e7ba2"
referrer-policy
same-origin
x-content-type-options
nosniff
date
Sun, 29 Sep 2024 13:02:13 GMT
x-xss-protection
1; mode=block
content-type
application/json
vary
Accept-Encoding
server
nginx
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
x-frame-options
SAMEORIGIN
favicon-32x32.png
pass.nsoservice.com/images/
434 B
1 KB
Other
General
Full URL
https://pass.nsoservice.com/images/favicon-32x32.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
42389d5ac4f75a12089f5c27422214243f22431f144096ee60cf088a6f8b7dc4
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://pass.nsoservice.com/

Response headers

strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
cache-control
max-age=604800
etag
"1db0963fa1a46b2"
referrer-policy
same-origin
x-content-type-options
nosniff
accept-ranges
bytes
content-length
434
date
Sun, 29 Sep 2024 13:02:13 GMT
x-xss-protection
1; mode=block
content-type
image/png
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
server
nginx
x-frame-options
SAMEORIGIN
config
pass.nsoservice.com/api/
433 B
538 B
Fetch
General
Full URL
https://pass.nsoservice.com/api/config
Requested by
Host: pass.nsoservice.com
URL: https://pass.nsoservice.com/app/polyfills.29df99c3b4cce310c87a.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
ea927a0f4ef4bb396c3115d6ebce8cc0e93a55955e4ae42045b9f6fc69354202
Security Headers
Name Value
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff, nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block, 1; mode=block

Request headers

Bitwarden-Client-Version
2024.9.1
Cache-Control
no-store
Referer
https://pass.nsoservice.com/
device-type
9
Pragma
no-cache
Bitwarden-Client-Name
web
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
accept
application/json

Response headers

strict-transport-security
max-age=15768000
content-encoding
gzip
server-version
2024.9.1
x-content-type-options
nosniff, nosniff
referrer-policy
same-origin
date
Sun, 29 Sep 2024 13:02:13 GMT
x-xss-protection
1; mode=block, 1; mode=block
content-type
application/json; charset=utf-8
vary
Accept-Encoding
server
nginx
x-frame-options
SAMEORIGIN
Open_Sans-normal-600.7f2861051b34a8ecd9f2.woff
pass.nsoservice.com/fonts/
56 KB
57 KB
Font
General
Full URL
https://pass.nsoservice.com/fonts/Open_Sans-normal-600.7f2861051b34a8ecd9f2.woff
Requested by
Host: pass.nsoservice.com
URL: https://pass.nsoservice.com/styles.34e783d9b55ccb829eb0.css
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
9448f7c3bd336008d83d3e4730ac005be651a3a39ade1d36ebb29b5be9201235
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Origin
https://pass.nsoservice.com
Referer
https://pass.nsoservice.com/styles.34e783d9b55ccb829eb0.css

Response headers

strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
cache-control
max-age=1209600
etag
"1db0963fa1aa690"
referrer-policy
same-origin
x-content-type-options
nosniff
accept-ranges
bytes
content-length
57744
date
Sun, 29 Sep 2024 13:02:14 GMT
x-xss-protection
1; mode=block
content-type
application/font-woff
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
server
nginx
x-frame-options
SAMEORIGIN
favicon-32x32.png
pass.nsoservice.com/images/
434 B
0
Other
General
Full URL
https://pass.nsoservice.com/images/favicon-32x32.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.83.107.186 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
nginx /
Resource Hash
42389d5ac4f75a12089f5c27422214243f22431f144096ee60cf088a6f8b7dc4
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://pass.nsoservice.com/

Response headers

x-robots-tag
noindex, nofollow
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
cache-control
max-age=604800
etag
"1db0963fa1a46b2"
referrer-policy
same-origin
x-content-type-options
nosniff
accept-ranges
bytes
content-length
434
date
Sun, 29 Sep 2024 13:02:13 GMT
x-xss-protection
1; mode=block
content-type
image/png
last-modified
Wed, 18 Sep 2024 00:44:54 GMT
server
nginx
x-frame-options
SAMEORIGIN

Verdicts & Comments Add Verdict or Comment

171 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 function| clearImmediate function| setImmediate function| Zone function| __zone_symbol__Promise function| __zone_symbol__fetch function| __zone_symbol__setTimeout function| __zone_symbol__clearTimeout function| __zone_symbol__setInterval function| __zone_symbol__clearInterval function| __zone_symbol__setImmediate function| __zone_symbol__clearImmediate function| __zone_symbol__requestAnimationFrame function| __zone_symbol__cancelAnimationFrame function| __zone_symbol__webkitRequestAnimationFrame function| __zone_symbol__webkitCancelAnimationFrame function| __zone_symbol__alert function| __zone_symbol__prompt function| __zone_symbol__confirm function| __zone_symbol__MutationObserver function| __zone_symbol__WebKitMutationObserver function| __zone_symbol__IntersectionObserver function| __zone_symbol__FileReader boolean| __zone_symbol__ononsearchpatched boolean| __zone_symbol__ononappinstalledpatched boolean| __zone_symbol__ononbeforeinstallpromptpatched boolean| __zone_symbol__ononbeforexrselectpatched boolean| __zone_symbol__ononabortpatched boolean| __zone_symbol__ononbeforeinputpatched boolean| __zone_symbol__ononbeforematchpatched boolean| __zone_symbol__ononbeforetogglepatched boolean| __zone_symbol__ononblurpatched boolean| __zone_symbol__ononcancelpatched boolean| __zone_symbol__ononcanplaypatched boolean| __zone_symbol__ononcanplaythroughpatched boolean| __zone_symbol__ononchangepatched boolean| __zone_symbol__ononclickpatched boolean| __zone_symbol__ononclosepatched boolean| __zone_symbol__ononcontentvisibilityautostatechangepatched boolean| __zone_symbol__ononcontextlostpatched boolean| __zone_symbol__ononcontextmenupatched boolean| __zone_symbol__ononcontextrestoredpatched boolean| __zone_symbol__ononcuechangepatched boolean| __zone_symbol__onondblclickpatched boolean| __zone_symbol__onondragpatched boolean| __zone_symbol__onondragendpatched boolean| __zone_symbol__onondragenterpatched boolean| __zone_symbol__onondragleavepatched boolean| __zone_symbol__onondragoverpatched boolean| __zone_symbol__onondragstartpatched boolean| __zone_symbol__onondroppatched boolean| __zone_symbol__onondurationchangepatched boolean| __zone_symbol__ononemptiedpatched boolean| __zone_symbol__ononendedpatched boolean| __zone_symbol__ononerrorpatched boolean| __zone_symbol__ononfocuspatched boolean| __zone_symbol__ononformdatapatched boolean| __zone_symbol__ononinputpatched boolean| __zone_symbol__ononinvalidpatched boolean| __zone_symbol__ononkeydownpatched boolean| __zone_symbol__ononkeypresspatched boolean| __zone_symbol__ononkeyuppatched boolean| __zone_symbol__ononloadpatched boolean| __zone_symbol__ononloadeddatapatched boolean| __zone_symbol__ononloadedmetadatapatched boolean| __zone_symbol__ononloadstartpatched boolean| __zone_symbol__ononmousedownpatched boolean| __zone_symbol__ononmouseenterpatched boolean| __zone_symbol__ononmouseleavepatched boolean| __zone_symbol__ononmousemovepatched boolean| __zone_symbol__ononmouseoutpatched boolean| __zone_symbol__ononmouseoverpatched boolean| __zone_symbol__ononmouseuppatched boolean| __zone_symbol__ononmousewheelpatched boolean| __zone_symbol__ononpausepatched boolean| __zone_symbol__ononplaypatched boolean| __zone_symbol__ononplayingpatched boolean| __zone_symbol__ononprogresspatched boolean| __zone_symbol__ononratechangepatched boolean| __zone_symbol__ononresetpatched boolean| __zone_symbol__ononresizepatched boolean| __zone_symbol__ononscrollpatched boolean| __zone_symbol__ononsecuritypolicyviolationpatched boolean| __zone_symbol__ononseekedpatched boolean| __zone_symbol__ononseekingpatched boolean| __zone_symbol__ononselectpatched boolean| __zone_symbol__ononslotchangepatched boolean| __zone_symbol__ononstalledpatched boolean| __zone_symbol__ononsubmitpatched boolean| __zone_symbol__ononsuspendpatched boolean| __zone_symbol__onontimeupdatepatched boolean| __zone_symbol__onontogglepatched boolean| __zone_symbol__ononvolumechangepatched boolean| __zone_symbol__ononwaitingpatched boolean| __zone_symbol__ononwebkitanimationendpatched boolean| __zone_symbol__ononwebkitanimationiterationpatched boolean| __zone_symbol__ononwebkitanimationstartpatched boolean| __zone_symbol__ononwebkittransitionendpatched boolean| __zone_symbol__ononwheelpatched boolean| __zone_symbol__ononauxclickpatched boolean| __zone_symbol__onongotpointercapturepatched boolean| __zone_symbol__ononlostpointercapturepatched boolean| __zone_symbol__ononpointerdownpatched boolean| __zone_symbol__ononpointermovepatched boolean| __zone_symbol__ononpointerrawupdatepatched boolean| __zone_symbol__ononpointeruppatched boolean| __zone_symbol__ononpointercancelpatched boolean| __zone_symbol__ononpointeroverpatched boolean| __zone_symbol__ononpointeroutpatched boolean| __zone_symbol__ononpointerenterpatched boolean| __zone_symbol__ononpointerleavepatched boolean| __zone_symbol__ononselectstartpatched boolean| __zone_symbol__ononselectionchangepatched boolean| __zone_symbol__ononanimationendpatched boolean| __zone_symbol__ononanimationiterationpatched boolean| __zone_symbol__ononanimationstartpatched boolean| __zone_symbol__onontransitionrunpatched boolean| __zone_symbol__onontransitionstartpatched boolean| __zone_symbol__onontransitionendpatched boolean| __zone_symbol__onontransitioncancelpatched boolean| __zone_symbol__ononafterprintpatched boolean| __zone_symbol__ononbeforeprintpatched boolean| __zone_symbol__ononbeforeunloadpatched boolean| __zone_symbol__ononhashchangepatched boolean| __zone_symbol__ononlanguagechangepatched boolean| __zone_symbol__ononmessagepatched boolean| __zone_symbol__ononmessageerrorpatched boolean| __zone_symbol__ononofflinepatched boolean| __zone_symbol__onononlinepatched boolean| __zone_symbol__ononpagehidepatched boolean| __zone_symbol__ononpageshowpatched boolean| __zone_symbol__ononpopstatepatched boolean| __zone_symbol__ononrejectionhandledpatched boolean| __zone_symbol__ononstoragepatched boolean| __zone_symbol__ononunhandledrejectionpatched boolean| __zone_symbol__ononunloadpatched boolean| __zone_symbol__onondevicemotionpatched boolean| __zone_symbol__onondeviceorientationpatched boolean| __zone_symbol__onondeviceorientationabsolutepatched boolean| __zone_symbol__ononpageswappatched boolean| __zone_symbol__ononpagerevealpatched boolean| __zone_symbol__ononscrollendpatched boolean| __zone_symbol__ononscrollsnapchangepatched boolean| __zone_symbol__ononscrollsnapchangingpatched function| __zone_symbol__queueMicrotask object| webpackChunk_bitwarden_web_vault object| __zone_symbol__loadfalse object| bitwardenContainerService object| __zone_symbol__popstatefalse object| __zone_symbol__hashchangefalse object| __zone_symbol__resizefalse object| __zone_symbol__orientationchangefalse function| getAngularTestability function| getAllAngularTestabilities function| getAllAngularRootElements object| frameworkStabilizers function| __zone_symbol__ON_PROPERTYmousemove object| __zone_symbol__mousemovefalse function| __zone_symbol__ON_PROPERTYmousedown object| __zone_symbol__mousedownfalse function| ontouchstart function| __zone_symbol__ON_PROPERTYclick object| __zone_symbol__clickfalse function| __zone_symbol__ON_PROPERTYscroll object| __zone_symbol__scrollfalse function| __zone_symbol__ON_PROPERTYkeypress object| __zone_symbol__keypressfalse function| __zone_symbol__addEventListener function| __zone_symbol__removeEventListener function| eventListeners function| removeAllListeners

0 Cookies

2 Console Messages

Source Level URL
Text
security warning URL: https://pass.nsoservice.com/app/vendor.f727a94b672294991721.js(Line 1)
Message:
An iframe which has both allow-scripts and allow-same-origin for its sandbox attribute can escape its sandboxing.
recommendation verbose URL: https://pass.nsoservice.com/#/login
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://pass.nsoservice.com https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block