almoxarifado.cajamar.sp.gov.br
Open in
urlscan Pro
138.117.63.181
Public Scan
Effective URL: https://almoxarifado.cajamar.sp.gov.br/login.aspx?ReturnUrl=%2fasp%2fdefault.aspx
Submission: On October 08 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by R10 on October 8th 2024. Valid for: 3 months.
This is the only time almoxarifado.cajamar.sp.gov.br was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 7 | 138.117.63.181 138.117.63.181 | 264223 (MULTIPLIC...) (MULTIPLIC COMUNICACAO E TECNOLOGIA LTDA -ME) | |
5 | 1 |
ASN264223 (MULTIPLIC COMUNICACAO E TECNOLOGIA LTDA -ME, BR)
PTR: 138-117-63-181.rev.multiplicnet.com.br
almoxarifado.cajamar.sp.gov.br |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
cajamar.sp.gov.br
2 redirects
almoxarifado.cajamar.sp.gov.br |
39 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
7 | almoxarifado.cajamar.sp.gov.br |
2 redirects
almoxarifado.cajamar.sp.gov.br
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
almoxarifado.cajamar.sp.gov.br R10 |
2024-10-08 - 2025-01-06 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://almoxarifado.cajamar.sp.gov.br/login.aspx?ReturnUrl=%2fasp%2fdefault.aspx
Frame ID: 24B8A7D61C25BDE82898631EF006FB3F
Requests: 5 HTTP requests in this frame
Screenshot
Page Title
:: ALMOXARIFADO WEB ::Page URL History Show full URLs
-
https://almoxarifado.cajamar.sp.gov.br/
HTTP 302
https://almoxarifado.cajamar.sp.gov.br/asp/default.aspx HTTP 302
https://almoxarifado.cajamar.sp.gov.br/login.aspx?ReturnUrl=%2fasp%2fdefault.aspx Page URL
Detected technologies
Microsoft ASP.NET (Web Frameworks) ExpandDetected patterns
- \.aspx?(?:$|\?)
- <input[^>]+name="__VIEWSTATE
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://almoxarifado.cajamar.sp.gov.br/
HTTP 302
https://almoxarifado.cajamar.sp.gov.br/asp/default.aspx HTTP 302
https://almoxarifado.cajamar.sp.gov.br/login.aspx?ReturnUrl=%2fasp%2fdefault.aspx Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.aspx
almoxarifado.cajamar.sp.gov.br/ Redirect Chain
|
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jscript.js
almoxarifado.cajamar.sp.gov.br/App_Themes/skinaw/js/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
WebResource.axd
almoxarifado.cajamar.sp.gov.br/ |
23 KB 6 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
WebResource.axd
almoxarifado.cajamar.sp.gov.br/ |
26 KB 7 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cecam.ico
almoxarifado.cajamar.sp.gov.br/ |
21 KB 21 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
81 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| EnterTab function| soNumeros function| comprovanteRequisicao function| FormatarCampo object| theForm function| __doPostBack function| WebForm_PostBackOptions function| WebForm_DoPostBackWithOptions object| __pendingCallbacks number| __synchronousCallBackIndex function| WebForm_DoCallback function| WebForm_CallbackComplete function| WebForm_ExecuteCallback function| WebForm_FillFirstAvailableSlot boolean| __nonMSDOMBrowser object| __theFormPostCollection object| __callbackTextTypes function| WebForm_InitCallback function| WebForm_InitCallbackAddField function| WebForm_EncodeCallback object| __disabledControlArray function| WebForm_ReEnableControls function| WebForm_ReDisableControls function| WebForm_SimulateClick function| WebForm_FireDefaultButton function| WebForm_GetScrollX function| WebForm_GetScrollY function| WebForm_SaveScrollPositionSubmit function| WebForm_SaveScrollPositionOnSubmit function| WebForm_RestoreScrollPosition function| WebForm_TextBoxKeyHandler function| WebForm_TrimString function| WebForm_AppendToClassName function| WebForm_RemoveClassName function| WebForm_GetElementById function| WebForm_GetElementByTagName function| WebForm_GetElementsByTagName function| WebForm_GetElementDir function| WebForm_GetElementPosition function| WebForm_GetParentByTagName function| WebForm_SetElementHeight function| WebForm_SetElementWidth function| WebForm_SetElementX function| WebForm_SetElementY string| Page_ValidationVer boolean| Page_IsValid object| Page_TextTypes function| ValidatorUpdateDisplay function| ValidatorUpdateIsValid function| AllValidatorsValid function| ValidatorHookupControlID function| ValidatorHookupControl function| ValidatorHookupEvent function| ValidatorGetValue function| ValidatorGetValueRecursive function| Page_ClientValidate function| ValidatorCommonOnSubmit function| ValidatorEnable function| ValidatorOnChange function| ValidatedTextBoxOnKeyPress function| ValidatedControlOnBlur function| ValidatorValidate function| ValidatorSetFocus function| IsInVisibleContainer function| IsValidationGroupMatch function| ValidatorOnLoad function| ValidatorConvert function| ValidatorCompare function| CompareValidatorEvaluateIsValid function| CustomValidatorEvaluateIsValid function| RegularExpressionValidatorEvaluateIsValid function| ValidatorTrim function| RequiredFieldValidatorEvaluateIsValid function| RangeValidatorEvaluateIsValid function| ValidationSummaryOnSubmit function| WebForm_OnSubmit object| Page_Validators object| UserNameRequired object| PasswordRequired boolean| Page_ValidationActive function| ValidatorOnSubmit1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
almoxarifado.cajamar.sp.gov.br/ | Name: ASP.NET_SessionId Value: oy4aymti5jhrssq4wcbtfndt |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
almoxarifado.cajamar.sp.gov.br
138.117.63.181
2743c41e28782cbd936007ffe5f5c3c1f52f7977d5b2581a0163d78286591bb1
40732e9dcfa704cf615e4691bb07aecfd1cc5e063220a46e4a7ff6560c77f5db
63f29a65eb3537694ac90b17eb10d67af43eec0687ca849893e680a24bde72fb
6e1e7902bb56c28e3808ada4c12fbfd18fa810f8ad7de3aff2aa3c83745d0cc7
ef9453f74b2617d43dcef4242cf5845101fcfb57289c81bceb20042b0023a192