cybersecurity.synology.me
Open in
urlscan Pro
93.171.66.153
Public Scan
Submission: On November 02 via automatic, source certstream-suspicious — Scanned from US
Summary
TLS certificate: Issued by E6 on November 2nd 2024. Valid for: 3 months.
This is the only time cybersecurity.synology.me was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 93.171.66.153 93.171.66.153 | 41124 (BTCOM) (BTCOM) | |
1 | 2607:f8b0:400... 2607:f8b0:400d:c09::5f | 15169 (GOOGLE) (GOOGLE) | |
4 | 173.194.204.94 173.194.204.94 | 15169 (GOOGLE) (GOOGLE) | |
12 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
synology.me
cybersecurity.synology.me |
9 KB |
4 |
gstatic.com
fonts.gstatic.com |
56 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 30 |
1 KB |
12 | 3 |
Domain | Requested by | |
---|---|---|
7 | cybersecurity.synology.me |
cybersecurity.synology.me
|
4 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
cybersecurity.synology.me
|
12 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cybersecurity.synology.me E6 |
2024-11-02 - 2025-01-31 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-10-07 - 2024-12-30 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-10-07 - 2024-12-30 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://cybersecurity.synology.me/
Frame ID: 256BD40D98626EC79C4D815E6DDB7734
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
Информационная Безопасность - ГлавнаяDetected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
cybersecurity.synology.me/ |
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.css
cybersecurity.synology.me/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
security-audit.jpg
cybersecurity.synology.me/images/ |
50 B 50 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
penetration-test.jpg
cybersecurity.synology.me/images/ |
52 B 52 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
monitoring.jpg
cybersecurity.synology.me/images/ |
46 B 46 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hero-background.jpg
cybersecurity.synology.me/images/ |
51 B 51 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
fonts.gstatic.com/s/roboto/v32/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
KFOmCnqEu92Fr1Mu5mxKOzY.woff2
fonts.gstatic.com/s/roboto/v32/ |
10 KB 10 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v32/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
KFOlCnqEu92Fr1MmWUlfABc4EsA.woff2
fonts.gstatic.com/s/roboto/v32/ |
10 KB 10 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
cybersecurity.synology.me/ |
3 KB 3 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cybersecurity.synology.me
fonts.googleapis.com
fonts.gstatic.com
173.194.204.94
2607:f8b0:400d:c09::5f
93.171.66.153
1875838494f57622b943e58a5bd44647bb98d542f02661287af4a203e7dc7a91
4576cf89af83ae7c65f46672ea1b96a1ac6db5126bb1b52238f17f68fb7136df
4d539033909dd344ae868f1c72bd0fc3d5ee082c9a76882448849481fd8ed857
78c28598797d89c046dcfc7ce63a729ba019b0504944ecec91cad98b40630b33
89978e658e840b927dddb5cb3a835c7d8526ece79933bd9f3096b301fe1a8571
9f226239b7cb86705238ec5a036a05bdb8fa187630f9c686db7c52ad53b64482
c3e3d7e0bce6022ae66381d04eb4742252d577ba15c5f9cceb49cb14c9eb90b1
d9bada3a44bb2ffa66dec5cc781cafc9ef17ed876cd9b0c5f7ef18228b63cebb
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855