d1d5-103-77-233-36.in.ngrok.io Open in urlscan Pro
2406:da1a:e91:9300::6e:0  Public Scan

Submitted URL: http://cutt.ly/bTIqX5C
Effective URL: https://d1d5-103-77-233-36.in.ngrok.io/
Submission: On November 20 via manual from IN — Scanned from DE

Summary

This website contacted 1 IPs in 2 countries across 2 domains to perform 1 HTTP transactions. The main IP is 2406:da1a:e91:9300::6e:0, located in Mumbai, India and belongs to AMAZON-02, US. The main domain is d1d5-103-77-233-36.in.ngrok.io.
TLS certificate: Issued by R3 on November 3rd 2021. Valid for: 3 months.
This is the only time d1d5-103-77-233-36.in.ngrok.io was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 2 2606:4700:10:... 13335 (CLOUDFLAR...)
1 2406:da1a:e91... 16509 (AMAZON-02)
1 1
Apex Domain
Subdomains
Transfer
2 cutt.ly
cutt.ly
967 B
1 ngrok.io
d1d5-103-77-233-36.in.ngrok.io
126 B
1 2
Domain Requested by
2 cutt.ly 2 redirects
1 d1d5-103-77-233-36.in.ngrok.io
1 2

This site contains no links.

Subject Issuer Validity Valid
*.in.ngrok.io
R3
2021-11-03 -
2022-02-01
3 months crt.sh

This page contains 1 frames:

Primary Page: https://d1d5-103-77-233-36.in.ngrok.io/
Frame ID: 40380A09C676009259ED1DD7DC140BB7
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://cutt.ly/bTIqX5C HTTP 301
    https://cutt.ly/bTIqX5C HTTP 301
    https://d1d5-103-77-233-36.in.ngrok.io/ Page URL

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

2
Domains

2
Subdomains

1
IPs

2
Countries

0 kB
Transfer

0 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://cutt.ly/bTIqX5C HTTP 301
    https://cutt.ly/bTIqX5C HTTP 301
    https://d1d5-103-77-233-36.in.ngrok.io/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
d1d5-103-77-233-36.in.ngrok.io/
Redirect Chain
  • http://cutt.ly/bTIqX5C
  • https://cutt.ly/bTIqX5C
  • https://d1d5-103-77-233-36.in.ngrok.io/
67 B
126 B
Document
General
Full URL
https://d1d5-103-77-233-36.in.ngrok.io/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2406:da1a:e91:9300::6e:0 Mumbai, India, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
47b6222612baf778034d6628537a18077f07fb4a809ec6555f0b10a20a307726

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

content-type
text/plain
content-length
67
date
Sat, 20 Nov 2021 09:11:03 GMT

Redirect headers

date
Sat, 20 Nov 2021 09:11:03 GMT
content-type
text/html; charset=UTF-8
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-cache, no-store, must-revalidate
pragma
no-cache
location
https://d1d5-103-77-233-36.in.ngrok.io/
vary
Accept-Encoding
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
6b108c742a0f4eda-FRA
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400

Verdicts & Comments Add Verdict or Comment

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler

1 Cookies

Domain/Path Name / Value
cutt.ly/ Name: PHPSESSID
Value: h298f5fd0q48kr9tesuu5qihm2

1 Console Messages

Source Level URL
Text
network error URL: https://d1d5-103-77-233-36.in.ngrok.io/
Message:
Failed to load resource: the server responded with a status of 404 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

cutt.ly
d1d5-103-77-233-36.in.ngrok.io
2406:da1a:e91:9300::6e:0
2606:4700:10::6816:1e8
47b6222612baf778034d6628537a18077f07fb4a809ec6555f0b10a20a307726