security-consulting.cz
Open in
urlscan Pro
2a00:4b40:aaaa:2005::5
Public Scan
Effective URL: https://security-consulting.cz/
Submission: On August 25 via automatic, source certstream-suspicious — Scanned from CA
Summary
TLS certificate: Issued by R11 on August 23rd 2024. Valid for: 3 months.
This is the only time security-consulting.cz was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 2a00:4b40:aaa... 2a00:4b40:aaaa:2005::5 | 51013 (WEBSUPPOR...) (WEBSUPPORT-SRO-SK-AS) | |
4 | 37.9.175.164 37.9.175.164 | 51013 (WEBSUPPOR...) (WEBSUPPORT-SRO-SK-AS) | |
14 | 3 |
ASN51013 (WEBSUPPORT-SRO-SK-AS, SK)
www.security-consulting.cz | |
security-consulting.cz |
ASN51013 (WEBSUPPORT-SRO-SK-AS, SK)
PTR: ing.r3.websupport.sk
security-consulting.cz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
security-consulting.cz
1 redirects
www.security-consulting.cz security-consulting.cz |
109 KB |
0 |
active24.cz
Failed
security-consulting.cz.uvirt60.active24.cz Failed |
|
14 | 2 |
Domain | Requested by | |
---|---|---|
13 | security-consulting.cz |
security-consulting.cz
|
1 | www.security-consulting.cz | 1 redirects |
0 | security-consulting.cz.uvirt60.active24.cz Failed |
security-consulting.cz
|
14 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
wordpress.org |
themegrill.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
security-consulting.cz R11 |
2024-08-23 - 2024-11-21 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://security-consulting.cz/
Frame ID: 7965B69BEA23AB9F5CCA595C633A93C3
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
David Fiedler – Security & ConsultingPage URL History Show full URLs
-
https://www.security-consulting.cz/
HTTP 301
https://security-consulting.cz/ Page URL
Detected technologies
WordPress (CMS) ExpandDetected patterns
- <link rel=["']stylesheet["'] [^>]+/wp-(?:content|includes)/
- /wp-(?:content|includes)/
- wp-embed\.min\.js\?ver=([\d.]+)
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery Migrate (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]migrate(?:-([\d.]+))?(?:\.min)?\.js(?:\?ver=([\d.]+))?
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: WordPress
Search URL Search Domain Scan URL
Title: ThemeGrill
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.security-consulting.cz/
HTTP 301
https://security-consulting.cz/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
security-consulting.cz/ Redirect Chain
|
12 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.min.css
security-consulting.cz/wp-includes/css/dist/block-library/ |
25 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
security-consulting.cz/wp-content/themes/esteem/ |
33 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
responsive.css
security-consulting.cz/wp-content/themes/esteem/css/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.css
security-consulting.cz/wp-content/themes/esteem/fontawesome/css/ |
27 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
security-consulting.cz/wp-includes/js/jquery/ |
95 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-migrate.min.js
security-consulting.cz/wp-includes/js/jquery/ |
10 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
esteem-custom.js
security-consulting.cz/wp-content/themes/esteem/js/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
cropped-surveillance2.png
security-consulting.cz.uvirt60.active24.cz/wp-content/uploads/2019/04/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
navigation.js
security-consulting.cz/wp-content/themes/esteem/js/ |
4 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
wp-embed.min.js
security-consulting.cz/wp-includes/js/ |
1 KB 870 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
wp-emoji-release.min.js
security-consulting.cz/wp-includes/js/ |
12 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fontawesome-webfont.woff
security-consulting.cz/wp-content/themes/esteem/fontawesome/font/ |
43 KB 43 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
security-consulting.cz/ |
0 120 B |
Other
image/vnd.microsoft.icon |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- security-consulting.cz.uvirt60.active24.cz
- URL
- https://security-consulting.cz.uvirt60.active24.cz/wp-content/uploads/2019/04/cropped-surveillance2.png
Verdicts & Comments Add Verdict or Comment
5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| _wpemojiSettings function| jQuery object| jQuery112403235089734342249 object| wp object| twemoji0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | upgrade-insecure-requests |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
security-consulting.cz
security-consulting.cz.uvirt60.active24.cz
www.security-consulting.cz
security-consulting.cz.uvirt60.active24.cz
2a00:4b40:aaaa:2005::5
37.9.175.164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