testing.payungnegeri.ac.id
Open in
urlscan Pro
223.130.22.165
Public Scan
Effective URL: https://testing.payungnegeri.ac.id/
Submission: On December 21 via api from US — Scanned from US
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on December 5th 2022. Valid for: a year.
This is the only time testing.payungnegeri.ac.id was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 9 | 223.130.22.165 223.130.22.165 | 9422 (SOLNET-ID...) (SOLNET-ID PT SOLNET INDONESIA) | |
1 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 2 |
ASN9422 (SOLNET-ID PT SOLNET INDONESIA, ID)
PTR: FAST-INTERNET-223-130-22-165.solnet.net.id
testing.payungnegeri.ac.id |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
payungnegeri.ac.id
1 redirects
testing.payungnegeri.ac.id |
104 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 2384 |
7 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
9 | testing.payungnegeri.ac.id |
1 redirects
testing.payungnegeri.ac.id
|
1 | stackpath.bootstrapcdn.com |
testing.payungnegeri.ac.id
|
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.payungnegeri.ac.id Sectigo RSA Domain Validation Secure Server CA |
2022-12-05 - 2023-12-11 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-01-29 - 2023-01-29 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://testing.payungnegeri.ac.id/
Frame ID: 84F5DEDE7BDDD1DFD600EADF8774BEEF
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
IMT ProjectPage URL History Show full URLs
-
http://testing.payungnegeri.ac.id/
HTTP 302
https://testing.payungnegeri.ac.id/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://testing.payungnegeri.ac.id/
HTTP 302
https://testing.payungnegeri.ac.id/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
testing.payungnegeri.ac.id/ Redirect Chain
|
4 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
testing.payungnegeri.ac.id/frontend/css/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
testing.payungnegeri.ac.id/frontend/css/ |
150 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.slim.min.js
testing.payungnegeri.ac.id/frontend/js/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
testing.payungnegeri.ac.id/frontend/js/ |
54 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
play.svg
testing.payungnegeri.ac.id/frontend/svg/ |
903 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
undraw_wireframing_nxyi.svg
testing.payungnegeri.ac.id/frontend/svg/ |
31 KB 32 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
smooth-scroll.js
testing.payungnegeri.ac.id/frontend/js/ |
19 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange function| $ function| jQuery object| bootstrap function| SmoothScroll2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
testing.payungnegeri.ac.id/ | Name: XSRF-TOKEN Value: eyJpdiI6IldtYTZyZzlYZ3RHZnRDSWdrUmk3YkE9PSIsInZhbHVlIjoidVE1Y3JMaWRZUkpjVklKd3hnT2YyamdJT3g3TlZ4UWtKaDVqZjhSWDlHeU5XNUUxbTJsZUJ0MlZ4VjdxK1Nobnh3cHZDT0tNYnJCdVZVb1hjQkp6K3F1QjMyZnIvZms3NzhTamxPWE5YYmc1TXN0eHl3NjlzN0o4R2lFVVk2TkIiLCJtYWMiOiIxNTliZjg0YzJkYTJiYTg4MDc0ZDZmNjMzODE3NjVkYmNlZDQ5ZjEwMzAzNmQ1ZmNkNzgzNDY2MzlhN2Q3N2ZjIiwidGFnIjoiIn0%3D |
|
testing.payungnegeri.ac.id/ | Name: imt_project_session Value: eyJpdiI6ImxkM3FrK1NoNVVLUHgwcHBsbmI4eEE9PSIsInZhbHVlIjoiNEZFT05vNmJaaUVpY3UxRDlHc3BwYkRHdklQYWFyQ0htbStoZjA2VWFUdUh0ZmdwcWZDdGlUQU1HTjFsc3ovZGlSRjY2N3puSjFROUZyaGVjcHhoUHBUVjhnNzZvZ0hsd2wxUU1WVktoWmFKZ05wcitKZ2JweW1vZjRyRkZkNWIiLCJtYWMiOiI1MzFjNjQ2Njg0ZWE3NzU0ZDcwNGQ4YTgzNmFjNjMxYjc3MGI5NTFhMTJiZWQwYTQ1YjdhYjFlOWNjODY4MjMzIiwidGFnIjoiIn0%3D |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
stackpath.bootstrapcdn.com
testing.payungnegeri.ac.id
223.130.22.165
2606:4700::6812:acf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