whoami-noauth.tmware.de Open in urlscan Pro
2a06:98c1:3121::9  Public Scan

URL: https://whoami-noauth.tmware.de/
Submission: On September 03 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Hostname: 4ea04a2fe59d
IP: 127.0.0.1
IP: ::1
IP: 10.201.23.33
RemoteAddr: 10.201.23.19:53352
GET / HTTP/1.1
Host: whoami-noauth.tmware.de
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, br
Accept-Language: de-DE,de;q=0.9
Cdn-Loop: cloudflare; loops=1
Cf-Connecting-Ip: 2a02:6ea0:c71b:0:1012:62c4:1295:1448
Cf-Ipcountry: DE
Cf-Ray: 8bd983f3cdc566f7-AMS
Cf-Visitor: {"scheme":"https"}
Priority: u=0, i
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
Upgrade-Insecure-Requests: 1
X-Forwarded-For: 2a02:6ea0:c71b:0:1012:62c4:1295:1448, 172.71.99.127
X-Forwarded-Host: whoami-noauth.tmware.de
X-Forwarded-Port: 443
X-Forwarded-Proto: https
X-Forwarded-Server: traefik
X-Frame-Options: SAMEORIGIN
X-Is-Trusted: yes
X-Real-Ip: 2a02:6ea0:c71b:0:1012:62c4:1295:1448