URL: https://img.peytzmail.com/image/upload/c_fill
Submission: On December 22 via api from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2a04:4e42:1b::604, located in Ascension Island and belongs to FASTLY, US. The main domain is img.peytzmail.com.
TLS certificate: Issued by GlobalSign CloudSSL CA - SHA256 - G3 on December 11th 2020. Valid for: 7 months.
This is the only time img.peytzmail.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2a04:4e42:1b:... 54113 (FASTLY)
1 1
Apex Domain
Subdomains
Transfer
1 peytzmail.com
img.peytzmail.com
486 B
1 1
Domain Requested by
1 img.peytzmail.com
1 1

This site contains no links.

Subject Issuer Validity Valid
s2-cloudinary-pin-sni.map.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2020-12-11 -
2021-07-17
7 months crt.sh

This page contains 1 frames:

Primary Page: https://img.peytzmail.com/image/upload/c_fill
Frame ID: DFCC9AF605EEAD15CE30C120616AD4FF
Requests: 1 HTTP requests in this frame

Screenshot


Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request c_fill
img.peytzmail.com/image/upload/
0
486 B
Document
General
Full URL
https://img.peytzmail.com/image/upload/c_fill
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:1b::604 , Ascension Island, ASN54113 (FASTLY, US),
Reverse DNS
Software
Cloudinary /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

:method
GET
:authority
img.peytzmail.com
:scheme
https
:path
/image/upload/c_fill
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-disposition
inline
content-transfer-encoding
binary
content-type
image/gif
x-cld-error
Resource not found - c_fill
x-request-id
03df334cab6b09e7438f2341971c9741
date
Tue, 22 Dec 2020 09:52:40 GMT
strict-transport-security
max-age=604800
pragma
no-cache
cache-control
private, no-transform, max-age=0, no-cache
server-timing
fastly;dur=123;cpu=0;start=2020-12-22T09:52:40.117Z;desc=miss,rtt;dur=5,cloudinary;dur=33;start=2020-12-22T09:52:40.162Z,cld-id;desc=03df334cab6b09e7438f2341971c9741,cld-error;desc="Resource not found - c_fill"
server
Cloudinary
timing-allow-origin
*
access-control-allow-origin
*
access-control-expose-headers
X-Cld-Error,Content-Length,Content-Disposition,Server-Timing
accept-ranges
bytes
content-length
0

Verdicts & Comments Add Verdict or Comment

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=604800

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

img.peytzmail.com
2a04:4e42:1b::604
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855