docs.google.com
Open in
urlscan Pro
2a00:1450:4001:831::200e
Public Scan
Effective URL: https://docs.google.com/spreadsheets/d/e/2PACX-1vR7A3yzpo7LAgSiLOBEzJXacUZac1Svjymq54fs83Qr_mwTlmdYfR7oogMJN7OojXgeQGerp...
Submission: On August 29 via automatic, source certstream-suspicious — Scanned from NL
Summary
TLS certificate: Issued by GTS CA 1C3 on August 7th 2023. Valid for: 3 months.
This is the only time docs.google.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a12:5240::1 2a12:5240::1 | 209626 (ENFLOW) (ENFLOW) | |
2 | 2a00:1450:400... 2a00:1450:4001:831::200e | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a00:1450:400... 2a00:1450:4001:831::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:830::2011 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:811::2003 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:827::2003 | 15169 (GOOGLE) (GOOGLE) | |
7 | 5 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
gstatic.com
ssl.gstatic.com fonts.gstatic.com |
30 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 45 |
2 KB |
2 |
google.com
docs.google.com — Cisco Umbrella Rank: 170 |
370 KB |
1 |
withgoogle.com
csp.withgoogle.com — Cisco Umbrella Rank: 675 |
|
1 |
foundationsecurity.org
1 redirects
example.foundationsecurity.org |
279 B |
7 | 5 |
Domain | Requested by | |
---|---|---|
2 | fonts.googleapis.com |
docs.google.com
|
2 | docs.google.com |
docs.google.com
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | ssl.gstatic.com |
docs.google.com
|
1 | csp.withgoogle.com |
docs.google.com
|
1 | example.foundationsecurity.org | 1 redirects |
7 | 6 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.google.com |
drive.google.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.google.com GTS CA 1C3 |
2023-08-07 - 2023-10-30 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-08-07 - 2023-10-30 |
3 months | crt.sh |
*.appspot.com GTS CA 1C3 |
2023-07-31 - 2023-10-23 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-08-07 - 2023-10-30 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://docs.google.com/spreadsheets/d/e/2PACX-1vR7A3yzpo7LAgSiLOBEzJXacUZac1Svjymq54fs83Qr_mwTlmdYfR7oogMJN7OojXgeQGerpWb_HLgP/pubhtml
Frame ID: 3B6DDB2D7E2AB289B49B58FAE26020AE
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
Example - Foundation Cyber Security - Google DrivePage URL History Show full URLs
-
https://example.foundationsecurity.org/
HTTP 302
https://docs.google.com/spreadsheets/d/e/2PACX-1vR7A3yzpo7LAgSiLOBEzJXacUZac1Svjymq54fs83Qr_mwTlmdYf... Page URL
Page Statistics
44 Outgoing links
These are links going to different origins than the main page.
Title: www.foundationsecurity.org
Search URL Search Domain Scan URL
Title: https://www.drwilliammckenzie.com/blog/ten-steps-to-brushing-your-teeth
Search URL Search Domain Scan URL
Title: Cybersecurity Capability Maturity Model to NIST Cybersecurity Framework Mapping
Search URL Search Domain Scan URL
Title: Essential Eight Assessment Process Guide | Cyber.gov.au
Search URL Search Domain Scan URL
Title: NIST SP 800-12: Chapter 3 Roles & Responsibilities
Search URL Search Domain Scan URL
Title: Guidelines for Cyber Security Roles | Cyber.gov.au
Search URL Search Domain Scan URL
Title: How to Develop Effective Risk Documentation
Search URL Search Domain Scan URL
Title: Guide to Getting Started with a Cybersecurity Risk Assessment
Search URL Search Domain Scan URL
Title: Victorian Government IT Asset Management Guidance
Search URL Search Domain Scan URL
Title: Designing and maintaining an information asset register | naa.gov.au
Search URL Search Domain Scan URL
Title: Assets Tracking | Free Excel Templates and Dashboards
Search URL Search Domain Scan URL
Title: Victorian Government IT Asset Management Guidance
Search URL Search Domain Scan URL
Title: Designing and maintaining an information asset register | naa.gov.au
Search URL Search Domain Scan URL
Title: Assets Tracking | Free Excel Templates and Dashboards
Search URL Search Domain Scan URL
Title: How To Use Power Automate And SharePoint List For Employee Onboarding And Offboarding? - Intranetbee
Search URL Search Domain Scan URL
Title: The 10-step guide to onboarding and offboarding on Google Workspace | Cobry
Search URL Search Domain Scan URL
Title: Best practices for securely onboarding and offboarding employees
Search URL Search Domain Scan URL
Title: Cyber Security Awareness Training for Employees | Wizer
Search URL Search Domain Scan URL
Title: Cyber Security Awareness Toolkit
Search URL Search Domain Scan URL
Title: Recognise and report scams | Cyber.gov.au
Search URL Search Domain Scan URL
Title: Need to know: Five key things about backup testing | Computer Weekly
Search URL Search Domain Scan URL
Title: What Is Backup Validation?
Search URL Search Domain Scan URL
Title: Restricting Administrative Privileges | Cyber.gov.au
Search URL Search Domain Scan URL
Title: Principle of Least Privilege
Search URL Search Domain Scan URL
Title: least privilege - Glossary | CSRC
Search URL Search Domain Scan URL
Title: How to Perform User Access Review - PCI DSS GUIDE
Search URL Search Domain Scan URL
Title: User Access Review: How to Keep Privileges in Check
Search URL Search Domain Scan URL
Title: Guidelines for Personnel Security | Cyber.gov.au
Search URL Search Domain Scan URL
Title: Dashlane
Search URL Search Domain Scan URL
Title: LastPass
Search URL Search Domain Scan URL
Title: 1Password
Search URL Search Domain Scan URL
Title: Mac Virus Scan | 2023 Mac Antivirus and Anti-Malware
Search URL Search Domain Scan URL
Title: Microsoft Defender for Endpoint
Search URL Search Domain Scan URL
Title: The Role of Physical Security in Maintaining Network Security | EC-Council
Search URL Search Domain Scan URL
Title: Think logically about “logical separation”
Search URL Search Domain Scan URL
Title: 5 useful open source log analysis tools
Search URL Search Domain Scan URL
Title: Automated Log Checking with LOG_CHECK.SAS
Search URL Search Domain Scan URL
Title: Practice your cyber incident response | Victorian Government
Search URL Search Domain Scan URL
Title: What is BCDR? (Business Continuity and Disaster Recovery)
Search URL Search Domain Scan URL
Title: 16 Business Continuity Plan Templates For Every Business
Search URL Search Domain Scan URL
Title: https://cdn2.hubspot.net/hubfs/5196934/BCP%20Docs/BCP%20Template.docx
Search URL Search Domain Scan URL
Title: Why senior leaders are the front line against cyberattacks | McKinsey
Search URL Search Domain Scan URL
Title: 6 steps to make senior management prioritise cyber security - Information Age
Search URL Search Domain Scan URL
Title: Report Abuse
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://example.foundationsecurity.org/
HTTP 302
https://docs.google.com/spreadsheets/d/e/2PACX-1vR7A3yzpo7LAgSiLOBEzJXacUZac1Svjymq54fs83Qr_mwTlmdYfR7oogMJN7OojXgeQGerpWb_HLgP/pubhtml Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
pubhtml
docs.google.com/spreadsheets/d/e/2PACX-1vR7A3yzpo7LAgSiLOBEzJXacUZac1Svjymq54fs83Qr_mwTlmdYfR7oogMJN7OojXgeQGerpWb_HLgP/ Redirect Chain
|
444 KB 52 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1729656077-waffle_k_ltr.css
docs.google.com/static/spreadsheets2/client/css/ |
2 MB 318 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 842 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
7 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
docs-tt
csp.withgoogle.com/csp/ |
0 0 |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
waffle_sprite53.png
ssl.gstatic.com/docs/spreadsheets/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4Ua_rENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iqcsih3SAyH6cAwhX9RFD48TE63OOYKtrwEIJllpyk.woff2
fonts.gstatic.com/s/googlesans/v58/ |
21 KB 21 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture string| activeSheetId function| switchToSheet function| init object| _docs_flag_initialData string| _docs_flag_cek1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.google.com/ | Name: NID Value: 511=oSYtWcahUNknl0-ch88ZtP3_wVlcY5EaHgIGYUfpiZIGXCzpdYHgM_Hp5UL3OoPRSTKlqNvqs3LRZbcVXptqTLMg0PbjAxr28PfgO94fKHnch3ryuofa_TqKpYAi9QdJPURIW0hJCwbpeYCUa87vMuH-_3XAHq3E81PtKc6yKcE |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | require-trusted-types-for 'script';report-uri https://csp.withgoogle.com/csp/docs-tt base-uri 'self';object-src 'self';report-uri https://docs.google.com/spreadsheets/cspreport;script-src 'report-sample' 'nonce-0vjdCNkc9BzaVQFleXpsaQ' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';worker-src 'self' blob: |
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
csp.withgoogle.com
docs.google.com
example.foundationsecurity.org
fonts.googleapis.com
fonts.gstatic.com
ssl.gstatic.com
2a00:1450:4001:811::2003
2a00:1450:4001:827::2003
2a00:1450:4001:830::2011
2a00:1450:4001:831::200a
2a00:1450:4001:831::200e
2a12:5240::1
2728b4afdbd020140571a3b01217f977e7699ff7a9f85d249cd772a49e0d4737
34ecf9d30bb80ec9db2e364a017f9438dc50042d3b3648c1ece70bf7747d17f1
3fd13aa5309882955edefa1157aab289e1542b6cac5b258f7a486ef88ed1d876
5b2f8581f3db2de166cbcbadf3e4256167ffb43d897d22e327840f9cd1d16405
98ea92621a1e03efc11987fba7aff5dae88cd39ffa85960a627b7c8c7b002e8e
b775d1e8a8874f926738f6c62f9cbaf49dd42e8f0526979cda9d8dec81400c53
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855