URL: https://firexqld.com.au/shortsale.html
Submission: On December 20 via manual from US — Scanned from AU

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 3 HTTP transactions. The main IP is 103.20.202.177, located in Australia and belongs to DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU. The main domain is firexqld.com.au.
TLS certificate: Issued by R3 on December 7th 2023. Valid for: 3 months.
This is the only time firexqld.com.au was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 103.20.202.177 38719 (DREAMSCAP...)
1 18.67.111.66 16509 (AMAZON-02)
1 67.231.157.248 22843 (PROOFPOIN...)
3 3
Apex Domain
Subdomains
Transfer
1 veteransunited.com
securemail.veteransunited.com
2 KB
1 pitchbook.com
image.pitchbook.com — Cisco Umbrella Rank: 96915
7 KB
1 firexqld.com.au
firexqld.com.au
18 KB
3 3
Domain Requested by
1 securemail.veteransunited.com firexqld.com.au
1 image.pitchbook.com firexqld.com.au
1 firexqld.com.au
3 3

This site contains links to these domains. Also see Links.

Domain
securemail.veteransunited.com
Subject Issuer Validity Valid
cpanel.pyroscience.com.au
R3
2023-12-07 -
2024-03-06
3 months crt.sh
pitchbook.com
Amazon RSA 2048 M01
2023-06-26 -
2024-07-24
a year crt.sh
securemail.veteransunited.com
DigiCert Global G2 TLS RSA SHA256 2020 CA1
2023-05-31 -
2024-06-30
a year crt.sh

This page contains 1 frames:

Primary Page: https://firexqld.com.au/shortsale.html
Frame ID: 4116F9643A3AD60371162D3FD08EECD5
Requests: 3 HTTP requests in this frame

Screenshot

Page Title

Proofpoint Encryption

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

3
IPs

2
Countries

28 kB
Transfer

34 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request shortsale.html
firexqld.com.au/
25 KB
18 KB
Document
General
Full URL
https://firexqld.com.au/shortsale.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
103.20.202.177 , Australia, ASN38719 (DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU),
Reverse DNS
server-4x-r67.ipv4.syd02.ds.network
Software
nginx /
Resource Hash
46bd4a1e64a7d19353a884a0e9a343ecea6dbdc781823b2224d591422bd3f913

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.109 Safari/537.36
accept-language
en-AU,en;q=0.9

Response headers

accept-ranges
bytes
content-encoding
gzip
content-type
text/html
date
Wed, 20 Dec 2023 15:31:41 GMT
last-modified
Mon, 30 Oct 2023 15:26:58 GMT
server
nginx
vary
Accept-Encoding
RqCUsRcrx8K15aGSpHowP4kdwKN1586236914541_200x200
image.pitchbook.com/
7 KB
7 KB
Image
General
Full URL
https://image.pitchbook.com/RqCUsRcrx8K15aGSpHowP4kdwKN1586236914541_200x200
Requested by
Host: firexqld.com.au
URL: https://firexqld.com.au/shortsale.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.67.111.66 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-67-111-66.syd62.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
5becd75d164aaa865c598dae97c2e5d1fc663a79a4214330a11178965b4588d0
Security Headers
Name Value
Content-Security-Policy default-src 'self'; font-src data: 'self'
Strict-Transport-Security max-age=63072000; includeSubdomains; preload
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

accept-language
en-AU,en;q=0.9
Referer
https://firexqld.com.au/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.109 Safari/537.36

Response headers

date
Wed, 20 Dec 2023 15:31:43 GMT
x-amz-version-id
null
x-content-type-options
nosniff
strict-transport-security
max-age=63072000; includeSubdomains; preload
via
1.1 bc177ce25ddc555a7d303bc4d290a6ec.cloudfront.net (CloudFront)
content-security-policy
default-src 'self'; font-src data: 'self'
x-amz-cf-pop
SYD62-P2
x-cache
Miss from cloudfront
content-length
6892
x-xss-protection
1; mode=block
referrer-policy
same-origin
last-modified
Tue, 07 Apr 2020 05:21:55 GMT
server
AmazonS3
etag
"c8ca24e789ad70582037ae3f50d17f31"
x-frame-options
sameorigin
content-type
image/png
accept-ranges
bytes
x-amz-cf-id
AV7CzleKkTVwAEG8lktfDmnAc1FDPJs8S535l1zjkKiFNqV-TOsVgg==
Image
securemail.veteransunited.com/securereader/
2 KB
2 KB
Image
General
Full URL
https://securemail.veteransunited.com/securereader/Image?c=lock&b=1&rnd=6.33636027138881
Requested by
Host: firexqld.com.au
URL: https://firexqld.com.au/shortsale.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
67.231.157.248 , United States, ASN22843 (PROOFPOINT-ASN-US-EAST, US),
Reverse DNS
mx0b-001f8101.pphosted.com
Software
/
Resource Hash
4234c8947994f3e0ee8831357fe39b0a7c27b82356abfa3c075b46fa7b37d541
Security Headers
Name Value
Content-Security-Policy script-src 'self' 'unsafe-inline' 'unsafe-eval'; object-src 'self'
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
en-AU,en;q=0.9
Referer
https://firexqld.com.au/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.109 Safari/537.36

Response headers

Expires
Fri, 19 Jan 2024 15:31:43 GMT
Date
Wed, 20 Dec 2023 15:31:43 GMT
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
Content-Security-Policy
script-src 'self' 'unsafe-inline' 'unsafe-eval'; object-src 'self'
Server
Expect-CT
max-age=86400, enforce
X-Frame-Options
SAMEORIGIN
Transfer-Encoding
chunked
Content-Type
image/gif
Cache-Control
max-age=2592000
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
X-XSS-Protection
1; mode=block
X-UA-Compatible
IE=edge

Verdicts & Comments Add Verdict or Comment

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| documentPictureInPicture

0 Cookies