staging.identity.infectopharm.com
Open in
urlscan Pro
2a05:d014:275:cb02:66df:50b:6e56:a6bf
Public Scan
Submission: On December 15 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by R3 on December 15th 2021. Valid for: 3 months.
This is the only time staging.identity.infectopharm.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 2a05:d014:275... 2a05:d014:275:cb02:66df:50b:6e56:a6bf | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 54.73.53.134 54.73.53.134 | 16509 (AMAZON-02) (AMAZON-02) | |
11 | 2 |
ASN16509 (AMAZON-02, US)
staging.identity.infectopharm.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-54-73-53-134.eu-west-1.compute.amazonaws.com
infectopharm-user-backend.herokuapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
infectopharm.com
staging.identity.infectopharm.com |
426 KB |
2 |
herokuapp.com
infectopharm-user-backend.herokuapp.com |
653 B |
11 | 2 |
Domain | Requested by | |
---|---|---|
9 | staging.identity.infectopharm.com |
staging.identity.infectopharm.com
|
2 | infectopharm-user-backend.herokuapp.com |
staging.identity.infectopharm.com
|
11 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
infectopharm-webapp.thekey.technology R3 |
2021-12-15 - 2022-03-15 |
3 months | crt.sh |
*.herokuapp.com Amazon |
2021-06-01 - 2022-06-30 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://staging.identity.infectopharm.com/
Frame ID: 6D539E80E00A42E1265F7F6EC956EE07
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
staging.identity.infectopharm.com/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans.css
staging.identity.infectopharm.com/open-sans/css/ |
8 KB 600 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.21cd9c66.chunk.css
staging.identity.infectopharm.com/static/css/ |
512 KB 57 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.16e96940.chunk.css
staging.identity.infectopharm.com/static/css/ |
774 B 911 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.35933271.chunk.js
staging.identity.infectopharm.com/static/js/ |
1 MB 262 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.8570fd2e.chunk.js
staging.identity.infectopharm.com/static/js/ |
115 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H/1.1 |
graphql
infectopharm-user-backend.herokuapp.com/api/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
graphql
infectopharm-user-backend.herokuapp.com/api/ |
33 B 653 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-v27-latin-700.woff2
staging.identity.infectopharm.com/open-sans/fonts/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-v27-latin-regular.woff2
staging.identity.infectopharm.com/open-sans/fonts/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
primeicons.3a0d4a58.ttf
staging.identity.infectopharm.com/static/media/ |
56 KB 56 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler object| webpackJsonpinfectopharm-user-system-webapp object| regeneratorRuntime object| __SENTRY__0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
infectopharm-user-backend.herokuapp.com
staging.identity.infectopharm.com
2a05:d014:275:cb02:66df:50b:6e56:a6bf
54.73.53.134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