Submitted URL: http://zgp.org/pipermail/p2p-hackers/2001-September/000316.html
Effective URL: https://zgp.org/pipermail/p2p-hackers/2001-September/000316.html
Submission: On February 16 via manual from DE — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 3 HTTP transactions. The main IP is 45.79.72.254, located in Fremont, United States and belongs to LINODE-AP Linode, LLC, US. The main domain is zgp.org.
TLS certificate: Issued by R3 on January 5th 2022. Valid for: 3 months.
This is the only time zgp.org was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 3 45.79.72.254 63949 (LINODE-AP...)
3 2
Apex Domain
Subdomains
Transfer
3 zgp.org
zgp.org
5 KB
0 aloodo.com Failed
ad.aloodo.com Failed
3 2
Domain Requested by
3 zgp.org 1 redirects zgp.org
0 ad.aloodo.com Failed zgp.org
3 2

This site contains links to these domains. Also see Links.

Domain
tabinda.com
en.wikipedia.org
Subject Issuer Validity Valid
aloodo.org
R3
2022-01-05 -
2022-04-05
3 months crt.sh

This page contains 1 frames:

Primary Page: https://zgp.org/pipermail/p2p-hackers/2001-September/000316.html
Frame ID: 839FFE0AAE2A973FE7F299A27590BC13
Requests: 3 HTTP requests in this frame

Screenshot

Page Title

Welcome to the Home Page

Page URL History Show full URLs

  1. http://zgp.org/pipermail/p2p-hackers/2001-September/000316.html HTTP 301
    https://zgp.org/pipermail/p2p-hackers/2001-September/000316.html Page URL

Page Statistics

3
Requests

67 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

4 kB
Transfer

4 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://zgp.org/pipermail/p2p-hackers/2001-September/000316.html HTTP 301
    https://zgp.org/pipermail/p2p-hackers/2001-September/000316.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request 000316.html
zgp.org/pipermail/p2p-hackers/2001-September/
Redirect Chain
  • http://zgp.org/pipermail/p2p-hackers/2001-September/000316.html
  • https://zgp.org/pipermail/p2p-hackers/2001-September/000316.html
2 KB
2 KB
Document
General
Full URL
https://zgp.org/pipermail/p2p-hackers/2001-September/000316.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.72.254 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
mail.aloodo.org
Software
Apache/2.4.38 (Debian) /
Resource Hash
7861ef8868771a594227416332c632c4674ee35ae4fb98a853bb86486c3ed349

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Date
Wed, 16 Feb 2022 15:25:10 GMT
Server
Apache/2.4.38 (Debian)
Last-Modified
Wed, 06 Mar 2019 18:35:40 GMT
ETag
"86b-5837141b8f23a"
Accept-Ranges
bytes
Content-Length
2155
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html

Redirect headers

Date
Wed, 16 Feb 2022 15:25:10 GMT
Server
Apache/2.4.38 (Debian)
Location
https://zgp.org/pipermail/p2p-hackers/2001-September/000316.html
Content-Length
345
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1
1337loaf.jpeg
zgp.org/pipermail/p2p-hackers/2001-September/~dmarti/images/
2 KB
2 KB
Image
General
Full URL
https://zgp.org/pipermail/p2p-hackers/2001-September/~dmarti/images/1337loaf.jpeg
Requested by
Host: zgp.org
URL: https://zgp.org/pipermail/p2p-hackers/2001-September/000316.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
45.79.72.254 Fremont, United States, ASN63949 (LINODE-AP Linode, LLC, US),
Reverse DNS
mail.aloodo.org
Software
Apache/2.4.38 (Debian) /
Resource Hash
7861ef8868771a594227416332c632c4674ee35ae4fb98a853bb86486c3ed349

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://zgp.org/pipermail/p2p-hackers/2001-September/000316.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Wed, 16 Feb 2022 15:25:10 GMT
Last-Modified
Wed, 06 Mar 2019 18:35:40 GMT
Server
Apache/2.4.38 (Debian)
ETag
"86b-5837141b8f23a"
Content-Type
text/html
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
2155
ad.js
ad.aloodo.com/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
ad.aloodo.com
URL
http://ad.aloodo.com/ad.js

Verdicts & Comments Add Verdict or Comment

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| structuredClone

0 Cookies

3 Console Messages

Source Level URL
Text
network error URL: https://zgp.org/pipermail/p2p-hackers/2001-September/000316.html
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)
security error URL: https://zgp.org/pipermail/p2p-hackers/2001-September/000316.html
Message:
Mixed Content: The page at 'https://zgp.org/pipermail/p2p-hackers/2001-September/000316.html' was loaded over HTTPS, but requested an insecure script 'http://ad.aloodo.com/ad.js'. This request has been blocked; the content must be served over HTTPS.
network error URL: https://zgp.org/pipermail/p2p-hackers/2001-September/~dmarti/images/1337loaf.jpeg
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

ad.aloodo.com
zgp.org
ad.aloodo.com
45.79.72.254
7861ef8868771a594227416332c632c4674ee35ae4fb98a853bb86486c3ed349