vulndbdi.staging.riskbasedsecurity.net Open in urlscan Pro
23.21.210.229  Public Scan

Submitted URL: http://vulndbdi.staging.riskbasedsecurity.net/
Effective URL: https://vulndbdi.staging.riskbasedsecurity.net/account/login
Submission: On April 21 via api from US — Scanned from US

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 5 HTTP transactions. The main IP is 23.21.210.229, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is vulndbdi.staging.riskbasedsecurity.net.
TLS certificate: Issued by Amazon on March 19th 2022. Valid for: a year.
This is the only time vulndbdi.staging.riskbasedsecurity.net was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 6 23.21.210.229 14618 (AMAZON-AES)
1 2a04:4e42:200... 54113 (FASTLY)
5 2
Apex Domain
Subdomains
Transfer
6 riskbasedsecurity.net
vulndbdi.staging.riskbasedsecurity.net
402 KB
1 sentry-cdn.com
browser.sentry-cdn.com — Cisco Umbrella Rank: 4129
23 KB
5 2
Domain Requested by
6 vulndbdi.staging.riskbasedsecurity.net 2 redirects vulndbdi.staging.riskbasedsecurity.net
1 browser.sentry-cdn.com vulndbdi.staging.riskbasedsecurity.net
5 2

This site contains no links.

Subject Issuer Validity Valid
riskbasedsecurity.net
Amazon
2022-03-19 -
2023-04-17
a year crt.sh
*.sentry-cdn.com
GlobalSign Atlas R3 DV TLS CA H2 2021
2021-11-26 -
2022-12-28
a year crt.sh

This page contains 1 frames:

Primary Page: https://vulndbdi.staging.riskbasedsecurity.net/account/login
Frame ID: 75806C129047C2481AF04DC466AFB68E
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

VulnDB - Data Import

Page URL History Show full URLs

  1. http://vulndbdi.staging.riskbasedsecurity.net/ HTTP 301
    https://vulndbdi.staging.riskbasedsecurity.net/ HTTP 302
    https://vulndbdi.staging.riskbasedsecurity.net/account/login Page URL

Page Statistics

5
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

424 kB
Transfer

2023 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://vulndbdi.staging.riskbasedsecurity.net/ HTTP 301
    https://vulndbdi.staging.riskbasedsecurity.net/ HTTP 302
    https://vulndbdi.staging.riskbasedsecurity.net/account/login Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login
vulndbdi.staging.riskbasedsecurity.net/account/
Redirect Chain
  • http://vulndbdi.staging.riskbasedsecurity.net/
  • https://vulndbdi.staging.riskbasedsecurity.net/
  • https://vulndbdi.staging.riskbasedsecurity.net/account/login
4 KB
2 KB
Document
General
Full URL
https://vulndbdi.staging.riskbasedsecurity.net/account/login
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.21.210.229 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-23-21-210-229.compute-1.amazonaws.com
Software
nginx/1.15.8 + Phusion Passenger 6.0.2 / Phusion Passenger 6.0.2
Resource Hash
4da0edf07fa234f84442af76cfd3ccf37fd37b563c42ca7968c5cd8ad286d3dc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
accept-language
en-US,en;q=0.9

Response headers

cache-control
max-age=0, private, must-revalidate
content-encoding
gzip
content-type
text/html; charset=utf-8
date
Thu, 21 Apr 2022 12:10:44 GMT
etag
W/"6f7d7f6f7e4c10135117af4fc826ad62"
server
nginx/1.15.8 + Phusion Passenger 6.0.2
status
200 OK
vary
Origin
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-powered-by
Phusion Passenger 6.0.2
x-request-id
c01d71a2-48a7-49e5-8043-fed08fe30a0a
x-runtime
0.030565
x-xss-protection
1; mode=block

Redirect headers

cache-control
no-cache
content-type
text/html; charset=utf-8
date
Thu, 21 Apr 2022 12:10:44 GMT
location
https://vulndbdi.staging.riskbasedsecurity.net/account/login
server
nginx/1.15.8 + Phusion Passenger 6.0.2
status
302 Found
vary
Origin
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-powered-by
Phusion Passenger 6.0.2
x-request-id
f6eaf103-daf7-4766-b120-60b99e165cf5
x-runtime
0.009814
x-xss-protection
1; mode=block
application-78286adc8c2e8640dc87ed67b3c64fea451797a3c3e47289fabf6901f8498226.css
vulndbdi.staging.riskbasedsecurity.net/assets/
430 KB
62 KB
Stylesheet
General
Full URL
https://vulndbdi.staging.riskbasedsecurity.net/assets/application-78286adc8c2e8640dc87ed67b3c64fea451797a3c3e47289fabf6901f8498226.css
Requested by
Host: vulndbdi.staging.riskbasedsecurity.net
URL: https://vulndbdi.staging.riskbasedsecurity.net/account/login
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.21.210.229 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-23-21-210-229.compute-1.amazonaws.com
Software
nginx/1.15.8 + Phusion Passenger 6.0.2 / Phusion Passenger 6.0.2
Resource Hash
78286adc8c2e8640dc87ed67b3c64fea451797a3c3e47289fabf6901f8498226

Request headers

accept-language
en-US,en;q=0.9
Referer
https://vulndbdi.staging.riskbasedsecurity.net/account/login
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

x-runtime
0.001109
date
Thu, 21 Apr 2022 12:10:44 GMT
content-encoding
gzip
etag
W/"78286adc8c2e8640dc87ed67b3c64fea451797a3c3e47289fabf6901f8498226"
server
nginx/1.15.8 + Phusion Passenger 6.0.2
x-powered-by
Phusion Passenger 6.0.2
vary
Origin
content-type
text/css; charset=utf-8
status
200 OK
cache-control
public, max-age=31536000
x-request-id
88e228d2-6cb1-466a-aa8d-be0db7765a93
application-caf22e4a9f6177dec0bb893a2b8e6809baab20949eeaed0382f8966d2eacc0ca.js
vulndbdi.staging.riskbasedsecurity.net/assets/
1 MB
335 KB
Script
General
Full URL
https://vulndbdi.staging.riskbasedsecurity.net/assets/application-caf22e4a9f6177dec0bb893a2b8e6809baab20949eeaed0382f8966d2eacc0ca.js
Requested by
Host: vulndbdi.staging.riskbasedsecurity.net
URL: https://vulndbdi.staging.riskbasedsecurity.net/account/login
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.21.210.229 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-23-21-210-229.compute-1.amazonaws.com
Software
nginx/1.15.8 + Phusion Passenger 6.0.2 / Phusion Passenger 6.0.2
Resource Hash
caf22e4a9f6177dec0bb893a2b8e6809baab20949eeaed0382f8966d2eacc0ca

Request headers

accept-language
en-US,en;q=0.9
Referer
https://vulndbdi.staging.riskbasedsecurity.net/account/login
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

x-runtime
0.001886
date
Thu, 21 Apr 2022 12:10:44 GMT
content-encoding
gzip
etag
W/"caf22e4a9f6177dec0bb893a2b8e6809baab20949eeaed0382f8966d2eacc0ca"
server
nginx/1.15.8 + Phusion Passenger 6.0.2
x-powered-by
Phusion Passenger 6.0.2
vary
Origin
content-type
application/javascript
status
200 OK
cache-control
public, max-age=31536000
x-request-id
326da7e5-21b8-43ec-8819-483dde24926a
bundle.apm.min.js
browser.sentry-cdn.com/5.20.1/
73 KB
23 KB
Script
General
Full URL
https://browser.sentry-cdn.com/5.20.1/bundle.apm.min.js
Requested by
Host: vulndbdi.staging.riskbasedsecurity.net
URL: https://vulndbdi.staging.riskbasedsecurity.net/account/login
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42:200::729 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
Fastly /
Resource Hash
66b4f155099f02f2ccd25266f6770e61ff44d599dc8115e409cd42394617ad1d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://vulndbdi.staging.riskbasedsecurity.net/
Origin
https://vulndbdi.staging.riskbasedsecurity.net
accept-language
en-US,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 21 Apr 2022 12:10:44 GMT
content-encoding
gzip
last-modified
Fri, 24 Jul 2020 17:20:56 GMT
server
Fastly
age
1231477
etag
"43e5bd34537c0fc0a4c807f43377ffc5"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=31536000
strict-transport-security
max-age=31536000; includeSubDomains
accept-ranges
bytes
content-length
22802
expires
Fri, 07 Apr 2023 06:06:06 GMT
logo-new-ba3883333ea9dc8c870e2d617193238ad4f2c94bea3a42cb856bf2da213b16b6.svg
vulndbdi.staging.riskbasedsecurity.net/assets/
3 KB
2 KB
Image
General
Full URL
https://vulndbdi.staging.riskbasedsecurity.net/assets/logo-new-ba3883333ea9dc8c870e2d617193238ad4f2c94bea3a42cb856bf2da213b16b6.svg
Requested by
Host: vulndbdi.staging.riskbasedsecurity.net
URL: https://vulndbdi.staging.riskbasedsecurity.net/account/login
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.21.210.229 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-23-21-210-229.compute-1.amazonaws.com
Software
nginx/1.15.8 + Phusion Passenger 6.0.2 / Phusion Passenger 6.0.2
Resource Hash
ba3883333ea9dc8c870e2d617193238ad4f2c94bea3a42cb856bf2da213b16b6

Request headers

accept-language
en-US,en;q=0.9
Referer
https://vulndbdi.staging.riskbasedsecurity.net/account/login
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

x-runtime
0.001236
date
Thu, 21 Apr 2022 12:10:44 GMT
content-encoding
gzip
etag
W/"ba3883333ea9dc8c870e2d617193238ad4f2c94bea3a42cb856bf2da213b16b6"
server
nginx/1.15.8 + Phusion Passenger 6.0.2
x-powered-by
Phusion Passenger 6.0.2
vary
Origin
content-type
image/svg+xml
status
200 OK
cache-control
public, max-age=31536000
x-request-id
357ce3e6-1bf8-4c06-9a7e-f0dcb378fa03

Verdicts & Comments Add Verdict or Comment

43 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| structuredClone object| oncontextlost object| oncontextrestored function| getScreenDetails function| allow_checkbox_range function| handleResponse function| sendRequestForCvrfDetails function| renderCvrfDetails function| buildAndAppendDiv function| addCloseButtonToContainer function| addLoadingMessage function| removeLoadingMessage function| parserFailure function| map_response_to_v3_fields function| ajax_helper function| cpe_ajax_helper function| cpe_row_string function| cpe_with_confirmation function| format_cpe_name function| findMavenCoordinateValues function| validate_maven_response function| addMavenRow function| maven_row_string function| maven_with_confirmation function| maven_ajax_helper function| validate_ids function| findPackageCoordinateValues function| validate_package_response function| addPackageRow function| package_row_string function| package_with_confirmation function| package_ajax_helper function| setIntervalWithTurbolinks object| Turbolinks function| _ function| $ function| jQuery object| jQuery112405362327334979446 object| Helpers object| bulmaExtensions object| Sentry object| __SENTRY__ object| timer

1 Cookies

Domain/Path Name / Value
vulndbdi.staging.riskbasedsecurity.net/ Name: _vuln_dbdi_session
Value: fbacdc03ebbd8e4efb0d37313cbdf56b

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block