apply.hotline.gg
Open in
urlscan Pro
2606:4700:3035::ac43:def0
Public Scan
Submission Tags: @phishunt_io
Submission: On November 22 via api from ES
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on July 7th 2020. Valid for: a year.
This is the only time apply.hotline.gg was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 2606:4700:303... 2606:4700:3035::ac43:def0 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 23.111.9.35 23.111.9.35 | 33438 (HIGHWINDS2) (HIGHWINDS2) | |
1 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 52.216.238.253 52.216.238.253 | 16509 (AMAZON-02) (AMAZON-02) | |
9 | 4 |
ASN16509 (AMAZON-02, US)
PTR: s3-1.amazonaws.com
s3.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
hotline.gg
apply.hotline.gg |
76 KB |
1 |
amazonaws.com
s3.amazonaws.com |
20 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
18 KB |
1 |
fontawesome.com
use.fontawesome.com |
401 KB |
9 | 4 |
Domain | Requested by | |
---|---|---|
6 | apply.hotline.gg |
apply.hotline.gg
|
1 | s3.amazonaws.com |
apply.hotline.gg
|
1 | cdnjs.cloudflare.com |
apply.hotline.gg
|
1 | use.fontawesome.com |
apply.hotline.gg
|
9 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-07-07 - 2021-07-07 |
a year | crt.sh |
*.fontawesome.com DigiCert TLS RSA SHA256 2020 CA1 |
2020-11-13 - 2021-12-14 |
a year | crt.sh |
s3.amazonaws.com DigiCert Baltimore CA-2 G2 |
2020-08-04 - 2021-08-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://apply.hotline.gg/
Frame ID: AC75587DE4BACE3626B9EDC721846958
Requests: 9 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
apply.hotline.gg/ |
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.js
apply.hotline.gg/_next/static/TTHlMkztUtrNDzEl1eust/pages/ |
14 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
_app.js
apply.hotline.gg/_next/static/TTHlMkztUtrNDzEl1eust/pages/ |
6 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
webpack-9178f7fb26bfceddf525.js
apply.hotline.gg/_next/static/runtime/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
commons.ee19e2e131370a598647.js
apply.hotline.gg/_next/static/chunks/ |
187 KB 58 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main-156d87a4bb0611d32a4f.js
apply.hotline.gg/_next/static/runtime/ |
21 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.js
use.fontawesome.com/releases/v5.3.1/js/ |
963 KB 401 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bulma.min.css
cdnjs.cloudflare.com/ajax/libs/bulma/0.7.2/css/ |
166 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
s3.amazonaws.com/discord-hotline-asset-bucket/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
17 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| webpackJsonP object| __NEXT_P object| __core-js_shared__ object| __NEXT_DATA__ object| next object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.hotline.gg/ | Name: __cfduid Value: d447325f7d33d28abc63ab73055bd399c1606069753 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=63072000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
apply.hotline.gg
cdnjs.cloudflare.com
s3.amazonaws.com
use.fontawesome.com
23.111.9.35
2606:4700:3035::ac43:def0
2606:4700::6810:135e
52.216.238.253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