Submitted URL: http://192.3.95.197/421/unc.exe
Effective URL: https://192.3.95.197/421/unc.exe
Submission Tags: falconsandbox
Submission: On November 28 via api from US — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 0 domains to perform 2 HTTP transactions. The main IP is 192.3.95.197, located in Buffalo, United States and belongs to AS-COLOCROSSING, US. The main domain is 192.3.95.197.
TLS certificate: Issued by localhost on November 10th 2009. Valid for: 10 years.
This is the only time 192.3.95.197 was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 192.3.95.197 36352 (AS-COLOCR...)
2 1
Apex Domain
Subdomains
Transfer
2 0
Domain Requested by
2 0

This site contains no links.

Subject Issuer Validity Valid
localhost
localhost
2009-11-10 -
2019-11-08
10 years crt.sh

This page contains 1 frames:

Primary Page: https://192.3.95.197/421/unc.exe
Frame ID: AC240D740FA9B00B30AC4E1868DBE1ED
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

404 Not Found

Page URL History Show full URLs

  1. http://192.3.95.197/421/unc.exe HTTP 307
    https://192.3.95.197/421/unc.exe Page URL

Page Statistics

2
Requests

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

1
IPs

1
Countries

31 kB
Transfer

30 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://192.3.95.197/421/unc.exe HTTP 307
    https://192.3.95.197/421/unc.exe Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request unc.exe
192.3.95.197/421/
Redirect Chain
  • http://192.3.95.197/421/unc.exe
  • https://192.3.95.197/421/unc.exe
299 B
540 B
Document
General
Full URL
https://192.3.95.197/421/unc.exe
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
192.3.95.197 Buffalo, United States, ASN36352 (AS-COLOCROSSING, US),
Reverse DNS
192-3-95-197-host.colocrossing.com
Software
Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12 /
Resource Hash
592ecd7bdbcb4c29912160b7c2f6b7b2e5ded3645fc85a4f890e74da2661d49f

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36

Response headers

Connection
Keep-Alive
Content-Length
299
Content-Type
text/html; charset=iso-8859-1
Date
Thu, 28 Nov 2024 07:16:22 GMT
Keep-Alive
timeout=5, max=100
Server
Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12

Redirect headers

Location
https://192.3.95.197/421/unc.exe
Non-Authoritative-Reason
HttpsUpgrades
favicon.ico
192.3.95.197/
30 KB
30 KB
Other
General
Full URL
https://192.3.95.197/favicon.ico
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
192.3.95.197 Buffalo, United States, ASN36352 (AS-COLOCROSSING, US),
Reverse DNS
192-3-95-197-host.colocrossing.com
Software
Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12 /
Resource Hash
1d7c95c5eea00a8083a95810f902682f9e26e7fbb7876b022a403642d776d0c9

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer
https://192.3.95.197/421/unc.exe

Response headers

ETag
"78ae-51affc7a4c400"
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
30894
Keep-Alive
timeout=5, max=99
Date
Thu, 28 Nov 2024 07:16:22 GMT
Last-Modified
Thu, 16 Jul 2015 15:32:32 GMT
Content-Type
image/x-icon
Server
Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://192.3.95.197/421/unc.exe
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

192.3.95.197
1d7c95c5eea00a8083a95810f902682f9e26e7fbb7876b022a403642d776d0c9
592ecd7bdbcb4c29912160b7c2f6b7b2e5ded3645fc85a4f890e74da2661d49f