Submitted URL: https://webmail.example.mn/
Effective URL: https://example.mail.mn/
Submission: On August 05 via api from US — Scanned from CA

Summary

This website contacted 1 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 172.66.41.16, located in United States and belongs to CLOUDFLARENET, US. The main domain is example.mail.mn.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on April 12th 2024. Valid for: a year.
This is the only time example.mail.mn was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 69.28.212.213 13768 (COGECO-PEER1)
2 172.66.41.16 13335 (CLOUDFLAR...)
2 1
Apex Domain
Subdomains
Transfer
2 mail.mn
example.mail.mn
472 B
1 example.mn
webmail.example.mn
94 B
2 2
Domain Requested by
2 example.mail.mn
1 webmail.example.mn 1 redirects
2 2

This site contains no links.

Subject Issuer Validity Valid
*.mail.mn
Sectigo RSA Domain Validation Secure Server CA
2024-04-12 -
2025-04-26
a year crt.sh

This page contains 1 frames:

Primary Page: https://example.mail.mn/
Frame ID: CDA7B4D3DA9C1789C8EF7A9A1AE3FBEB
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

403 Forbidden

Page URL History Show full URLs

  1. https://webmail.example.mn/ HTTP 302
    https://example.mail.mn/ Page URL

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

1
IPs

2
Countries

0 kB
Transfer

1 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://webmail.example.mn/ HTTP 302
    https://example.mail.mn/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
example.mail.mn/
Redirect Chain
  • https://webmail.example.mn/
  • https://example.mail.mn/
548 B
274 B
Document
General
Full URL
https://example.mail.mn/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.66.41.16 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
25fb23868ebf48348f9e438e00cb9b9d9b3a054f32482a781c762cc4f9cc6393

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

cf-cache-status
DYNAMIC
cf-ray
8ae86df98da4abc4-YYZ
content-encoding
br
content-type
text/html
date
Mon, 05 Aug 2024 17:15:30 GMT
server
cloudflare
vary
Accept-Encoding

Redirect headers

content-type
text/html; charset=UTF-8
date
Mon, 05 Aug 2024 17:15:29 GMT
location
https://example.mail.mn/
server
nginx
favicon.ico
example.mail.mn/
548 B
198 B
Other
General
Full URL
https://example.mail.mn/favicon.ico
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.66.41.16 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
25fb23868ebf48348f9e438e00cb9b9d9b3a054f32482a781c762cc4f9cc6393

Request headers

Referer
https://example.mail.mn/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

date
Mon, 05 Aug 2024 17:15:30 GMT
content-encoding
br
cf-cache-status
BYPASS
server
cloudflare
cf-ray
8ae86dfca8ceabc4-YYZ
vary
Accept-Encoding
content-type
text/html

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

2 Console Messages

Source Level URL
Text
network error URL: https://example.mail.mn/
Message:
Failed to load resource: the server responded with a status of 403 ()
network error URL: https://example.mail.mn/favicon.ico
Message:
Failed to load resource: the server responded with a status of 403 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

example.mail.mn
webmail.example.mn
172.66.41.16
69.28.212.213
25fb23868ebf48348f9e438e00cb9b9d9b3a054f32482a781c762cc4f9cc6393