keycloak.webeng.virtuallab.dev
Open in
urlscan Pro
194.171.202.186
Public Scan
Effective URL: https://keycloak.webeng.virtuallab.dev/realms/2024-2025-Web-Engineering/protocol/openid-connect/auth?approval_prompt=force&client_id=we...
Submission: On December 22 via api from US — Scanned from NL
Summary
TLS certificate: Issued by R11 on December 20th 2024. Valid for: 3 months.
This is the only time keycloak.webeng.virtuallab.dev was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 4 | 194.171.202.186 194.171.202.186 | 1103 (SURFNET-N...) (SURFNET-NL SURF B.V.) | |
1 | 2a00:1450:400... 2a00:1450:4001:81c::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 142.250.186.67 142.250.186.67 | 15169 (GOOGLE) (GOOGLE) | |
5 | 3 |
ASN1103 (SURFNET-NL SURF B.V., NL)
PTR: bateleur118.hpc.rug.nl
backend.group3.webeng.virtuallab.dev | |
keycloak.webeng.virtuallab.dev |
ASN15169 (GOOGLE, US)
PTR: fra24s05-in-f3.1e100.net
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
virtuallab.dev
1 redirects
backend.group3.webeng.virtuallab.dev keycloak.webeng.virtuallab.dev |
488 KB |
1 |
gstatic.com
fonts.gstatic.com |
18 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 29 |
927 B |
5 | 3 |
Domain | Requested by | |
---|---|---|
3 | keycloak.webeng.virtuallab.dev |
keycloak.webeng.virtuallab.dev
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
keycloak.webeng.virtuallab.dev
|
1 | backend.group3.webeng.virtuallab.dev | 1 redirects |
5 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
keycloak.webeng.virtuallab.dev R11 |
2024-12-20 - 2025-03-20 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-12-02 - 2025-02-24 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-12-02 - 2025-02-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://keycloak.webeng.virtuallab.dev/realms/2024-2025-Web-Engineering/protocol/openid-connect/auth?approval_prompt=force&client_id=web-eng-oauth2&redirect_uri=https%3A%2F%2Foauth2-proxy.webeng.virtuallab.dev%2Foauth2%2Fcallback&response_type=code&scope=openid+email+profile&state=Ew75-4TjxrcVRjA36wz9qIF1pLz5TJI3B138et-eXiE%3Ahttps%3A%2F%2Fbackend.group3.webeng.virtuallab.dev%2F
Frame ID: F7AA3C523FB7DDDDCE29240C0D4630AB
Requests: 5 HTTP requests in this frame
Screenshot
Page Title
Sign in to 2024-2025-Web-EngineeringPage URL History Show full URLs
-
https://backend.group3.webeng.virtuallab.dev/
HTTP 302
https://keycloak.webeng.virtuallab.dev/realms/2024-2025-Web-Engineering/protocol/openid-connect/auth?approval_promp... Page URL
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://backend.group3.webeng.virtuallab.dev/
HTTP 302
https://keycloak.webeng.virtuallab.dev/realms/2024-2025-Web-Engineering/protocol/openid-connect/auth?approval_prompt=force&client_id=web-eng-oauth2&redirect_uri=https%3A%2F%2Foauth2-proxy.webeng.virtuallab.dev%2Foauth2%2Fcallback&response_type=code&scope=openid+email+profile&state=Ew75-4TjxrcVRjA36wz9qIF1pLz5TJI3B138et-eXiE%3Ahttps%3A%2F%2Fbackend.group3.webeng.virtuallab.dev%2F Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
auth
keycloak.webeng.virtuallab.dev/realms/2024-2025-Web-Engineering/protocol/openid-connect/ Redirect Chain
|
3 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.css
keycloak.webeng.virtuallab.dev/resources/16p54/login/mo-rug/css/ |
3 KB 1006 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
1 KB 927 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rug-logo.png
keycloak.webeng.virtuallab.dev/resources/16p54/login/mo-rug/img/ |
481 KB 481 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
7Aulp_0qiz-aVz7u3PJLcUMYOFnOkEk30eg.woff2
fonts.gstatic.com/s/muli/v29/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
keycloak.webeng.virtuallab.dev/realms/2024-2025-Web-Engineering/ | Name: AUTH_SESSION_ID Value: 6b72023a-fbcf-4ba3-8440-0994276f35a6.fd6d28643d7c-25677 |
|
keycloak.webeng.virtuallab.dev/realms/2024-2025-Web-Engineering/ | Name: KC_RESTART Value: eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..d13dJ9E8nnunoMTyo_4kHQ.9S2VTnd61-OZeWQOtv0MVvLabDfNvTmcktEekP3BQZI6ZTr1zY6lz-4MUKlw9oUBU4JsCmF4offWOV3CGgrdqPCAmTmJlbGBEANQ4UK9WBwZ8cU2lNhNKo41mPGN-DTKhOM1dZpa_E729P9_mzyg7-Qa66W3Cp-0-X1QqS_9YPCNXkY4PaqVUWXCxEWFNzTgiG5CE3xPMnTG5ZHTE-q_uMi-kBpY6vEvCGBQs3gaOl05gGHUr16G8T4zo-6N8T5TFoJzDN0zoNSdFdpQAbrs6GUYLHkmeLHic5iaJW_aLQgo95eoiCv3tueH_zwpwNkAV-5ScvMd3Gn9VF-Qa7Lw2sp74KSGln06UQR3UoKah-ciETFI6tM_B8y0ow3IqUH1FzzDp5b3H5rQt-hgu2y_Ziq2ZKZOJH10Na_N39Fepx1fij4C7noRlRqDS2G0-JW9yZEVJp0OSW5tTZeSWVhMKm53Rj5KcEsSD9BVkkT--IM4b5nuTuJxRzlPdvMAadi58Is-YSkx95L1agbjcnt9nsi_RSndJIy8YVYgf8Lx8EIoyjANFQ9icRsNbsemk3CABkj6ciCJ_1iQUn-iAHEEu9xtLe0891UOpt9Z9siBHXy33jc5VzMzIgJlcgj6bBEhkBAGGVawXCUa5QtHd54r_AuR4ilE45MB913z2mffRaaMWEPbX9FYEr1xho4GqYRAO6LlLQqSplsk8E0dGSOuCmHL7TusICgc7qL20iAz7i2v7gZ2k2EmkRdrxlTg9KQ048oPBKyJvFG9kQqDKsyT--bTHoMJuRqZl-8JwXlYidgc-0A5D8cciy89d81_Y5lK_IOd8NQGVYoMPx5E8qJsNYyCDlCjlg9AktoSp6GjHpwvYUDbb19158gx20J-4ngvM97v5_1VXYezkyR1fzak9rv3jyw5pvpGg7ywUFCt6F_LXcEn7Mz3PDYkcbPdvZVtQKONnGFsBFFClgwBC5oD-0675wylQKkUTCqgAqFg05G_NctsJV16ZK5UFA2teLT-fYUeI9T7bWJ4w2i1AtKRuYsFt-7pHhPSetaHiWyTcvp8upAVdWyH1XV3PWTvzo_bbHbPe-A6yKQ5O4oyJVoFFz6PzGQCLu9lKAhq_fKswe40Exl1o5wBBj5wWdVViVuO.UXfNyAp3S5f3CvRQ7G0wBA |
|
.webeng.virtuallab.dev/ | Name: _oauth2_proxy_Ew75-4Tj_csrf Value: EykwSZJ0U12iS3RxBHa2fM0IladS2EZAh6dvDqEV4-9Q3hdfTPki6Gh45UhpsbDftl3MP6PbngqP08QT4usl9X9D2aEcaqSdMjNisK7ONOQCppt1azMueTQ=|1734829400|MToSLtXqBZ4RB0sMcgJMTZrmlJh_igyf3cgQkUsxKeA= |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | frame-src 'self'; frame-ancestors 'self'; object-src 'none'; |
Strict-Transport-Security | max-age=31536000; includeSubDomains |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
backend.group3.webeng.virtuallab.dev
fonts.googleapis.com
fonts.gstatic.com
keycloak.webeng.virtuallab.dev
142.250.186.67
194.171.202.186
2a00:1450:4001:81c::200a
1dc63423918383d7f27feb55fab5e72d73df5d101b239572ec4f5ffd01258c29
40036404abd8f34773249cd4f13d1e9435590bd9bc45612170155f86def2c9c3
7bd8414df0623881bc30e92e9b3852497ca1cc125af1c74c359f03c107240205
a954f9767e4903ace4c1f443340b8cb25e31aa7c67362a89e7df6cf7e089ae5e
bcb3c99616a6b90084e82690ab8519141a78fea94c0ab3a3a5ca7611c0d77e4c