epasscovid19.pais.net.in
Open in
urlscan Pro
13.233.221.137
Public Scan
Effective URL: https://epasscovid19.pais.net.in/
Submission: On March 27 via manual from GB
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on March 26th 2020. Valid for: 3 months.
This is the only time epasscovid19.pais.net.in was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 12 | 13.233.221.137 13.233.221.137 | 16509 (AMAZON-02) (AMAZON-02) | |
5 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:1a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2606:4700::68... 2606:4700::6810:5714 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
17 | 3 |
ASN16509 (AMAZON-02, US)
PTR: ec2-13-233-221-137.ap-south-1.compute.amazonaws.com
epasscovid19.pais.net.in |
ASN20446 (HIGHWINDS3, US)
stackpath.bootstrapcdn.com | |
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
pais.net.in
1 redirects
epasscovid19.pais.net.in |
217 KB |
3 |
jquery.com
code.jquery.com |
161 KB |
2 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
39 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net |
8 KB |
17 | 4 |
Domain | Requested by | |
---|---|---|
12 | epasscovid19.pais.net.in |
1 redirects
epasscovid19.pais.net.in
code.jquery.com |
3 | code.jquery.com |
epasscovid19.pais.net.in
|
2 | stackpath.bootstrapcdn.com |
epasscovid19.pais.net.in
|
1 | cdn.jsdelivr.net |
epasscovid19.pais.net.in
|
17 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
epasscovid19.pais.net.in Let's Encrypt Authority X3 |
2020-03-26 - 2020-06-24 |
3 months | crt.sh |
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2019-09-14 - 2020-10-13 |
a year | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
ssl363648.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2020-02-22 - 2020-08-30 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://epasscovid19.pais.net.in/
Frame ID: 5A29AD26C313D62A54FF37E8D6768258
Requests: 17 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://epasscovid19.pais.net.in/
HTTP 301
https://epasscovid19.pais.net.in/ Page URL
Detected technologies
Python (Programming Languages) ExpandDetected patterns
- html /(?:powered by <a[^>]+>Django ?([\d.]+)?<\/a>|<input[^>]*name=["']csrfmiddlewaretoken["'][^>]*>)/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Django (Web Frameworks) Expand
Detected patterns
- html /(?:powered by <a[^>]+>Django ?([\d.]+)?<\/a>|<input[^>]*name=["']csrfmiddlewaretoken["'][^>]*>)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
- script /([\d.]+)\/jquery-ui(?:\.min)?\.js/i
- script /jquery-ui.*\.js/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /([\d.]+)\/jquery-ui(?:\.min)?\.js/i
- script /jquery-ui.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://epasscovid19.pais.net.in/
HTTP 301
https://epasscovid19.pais.net.in/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
epasscovid19.pais.net.in/ Redirect Chain
|
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/ |
156 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
iziToast.min.css
epasscovid19.pais.net.in/static/styles/preloads/ |
41 KB 41 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
iziToast.min.js
epasscovid19.pais.net.in/static/scripts/preloads/ |
18 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.css
epasscovid19.pais.net.in/static/styles/preloads/ |
73 KB 73 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
muliFont.css
epasscovid19.pais.net.in/static/styles/preloads/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui.css
code.jquery.com/ui/1.12.1/themes/base/ |
35 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
epasscovid19.pais.net.in/static/styles/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.4.1.min.js
code.jquery.com/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.js
epasscovid19.pais.net.in/static/scripts/ |
6 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
punjabpolicelogo.png
epasscovid19.pais.net.in/static/assets/images/ |
68 KB 68 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui.js
code.jquery.com/ui/1.12.1/ |
509 KB 122 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdn.jsdelivr.net/npm/popper.js@1.16.0/dist/umd/ |
21 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.4.1/js/ |
59 KB 16 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
districts
epasscovid19.pais.net.in/ |
1 KB 1 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
categories
epasscovid19.pais.net.in/ |
674 B 906 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sub-categories
epasscovid19.pais.net.in/ |
272 B 504 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
25 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| iziToast function| $ function| jQuery object| idTypes function| getIdProofType function| verifySlot function| bookSlot function| getCookie function| fillInfo function| getDistricts function| getCategoies function| getSubCategoies function| getPS function| getSlot function| showOtpInput function| resetOtpBtn function| showResult function| printPdf function| getFormData function| validateForm function| customAlert function| Popper object| bootstrap1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
epasscovid19.pais.net.in/ | Name: csrftoken Value: j5ElwiXF4f1buNjVMiQ1KaXRZZA8Vc9mvBIr4JQ7rDxNS2GpISgW6LSRORys138p |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
code.jquery.com
epasscovid19.pais.net.in
stackpath.bootstrapcdn.com
13.233.221.137
2001:4de0:ac19::1:b:1a
2606:4700::6810:5714
070ec592a8c82d300dd2a0e5ae0016a96f032a2cd41d219011f3ce7278ad0e38
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
20b2776eaee552defc7c9b25bfef14a891f0dd4a12ac7320d689d749e1ca0fa7
2ff5b959fa9f6b4b1d04d20a37d706e90039176ab1e2a202994d9580baeebfd6
30da5d5a53ef017e11a247d640fdaded0bf5a53a67a93b507288e1e4606f8774
44f8a56d427917b5fa0dd7933ba545679be5e6b3b93099e64a4e29c2159f57c0
4f455eb2ddf2094ee969f470f6bfac7adb4c057e8990a374e9da819e943c777d
5548c1ae3434fe4f5d9668ef559631a636f9ecf6fceafc18702524d9b4328f04
5aa53525abc5c5200c70b3f6588388f86076cd699284c23cda64e92c372a1548
7c5e13217ddb4997692b43784999325b0c3cb2ce5be7a0844b248e14ea6a3ef5
83b04c00d673ba7245ec6c80723a3feb769d6207e694676e43c796aab55b17d2
95b055321d8486b93abd0b108751eb42b02cefd61f0d9d2de96af1737154dbd7
ac860be79a4cfe434ea68f002638f79371d9a85a3b045a1aaf10dc98df551497
bc6b7e7d47308e7e640f5253fb8e1d601b64b89eb6005459e497f9104939803c
c00e09c2b7c82edd0301e566d2b6929f19743cb2d5617e187ea6e4afe0fe3366
c776195ad46333c6c9a9fe3c74502ffea9a02faf122388ea3567922cc65a3060
f003af680b73ab719a83fdfc7cd39e82dd5d88b10e263005a823e26f49745a4c