Submitted URL: http://peoc4i.navy.mil/tightvnc-jviewer.jar
Effective URL: https://www.public.navy.mil/navwar/PEOC4IandSpace/Pages/default.aspxtightvnc-jviewer.jar
Submission: On September 22 via api from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 34.195.196.137, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is www.public.navy.mil.
TLS certificate: Issued by DigiCert SHA2 Secure Server CA on February 12th 2020. Valid for: 2 years.
This is the only time www.public.navy.mil was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 2001:480:d:10... 668 (DNIC-AS-0...)
1 2 34.195.196.137 14618 (AMAZON-AES)
1 1
Apex Domain
Subdomains
Transfer
3 navy.mil
peoc4i.navy.mil
www.public.navy.mil
2 KB
1 1
Domain Requested by
2 www.public.navy.mil 1 redirects
1 peoc4i.navy.mil 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid
*.navy.mil
DigiCert SHA2 Secure Server CA
2020-02-12 -
2022-05-11
2 years crt.sh

This page contains 1 frames:

Primary Page: https://www.public.navy.mil/navwar/PEOC4IandSpace/Pages/default.aspxtightvnc-jviewer.jar
Frame ID: 47A0FD5F1C527C42242EB64CC0850DB6
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://peoc4i.navy.mil/tightvnc-jviewer.jar HTTP 301
    http://www.public.navy.mil/navwar/PEOC4IandSpace/Pages/default.aspxtightvnc-jviewer.jar HTTP 302
    https://www.public.navy.mil/navwar/PEOC4IandSpace/Pages/default.aspxtightvnc-jviewer.jar Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

1
Requests

100 %
HTTPS

50 %
IPv6

1
Domains

2
Subdomains

1
IPs

1
Countries

1 kB
Transfer

0 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://peoc4i.navy.mil/tightvnc-jviewer.jar HTTP 301
    http://www.public.navy.mil/navwar/PEOC4IandSpace/Pages/default.aspxtightvnc-jviewer.jar HTTP 302
    https://www.public.navy.mil/navwar/PEOC4IandSpace/Pages/default.aspxtightvnc-jviewer.jar Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request default.aspxtightvnc-jviewer.jar
www.public.navy.mil/navwar/PEOC4IandSpace/Pages/
Redirect Chain
  • http://peoc4i.navy.mil/tightvnc-jviewer.jar
  • http://www.public.navy.mil/navwar/PEOC4IandSpace/Pages/default.aspxtightvnc-jviewer.jar
  • https://www.public.navy.mil/navwar/PEOC4IandSpace/Pages/default.aspxtightvnc-jviewer.jar
315 B
610 B
Document
General
Full URL
https://www.public.navy.mil/navwar/PEOC4IandSpace/Pages/default.aspxtightvnc-jviewer.jar
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
34.195.196.137 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-195-196-137.compute-1.amazonaws.com
Software
Apache /
Resource Hash
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Frame-Options SAMEORIGIN

Request headers

Host
www.public.navy.mil
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
AWSELB=FBD1AFDAA41D34350956416BD71CB145ADD20C0162EFBF2CB63A8C56493F22E7342B42C553ABD3E81C282D4CBF203A64D377FE4C9A43F238AE7A7EC9DE61106C027BD936
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 22 Sep 2020 09:48:21 GMT
Server
Apache
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Length
315
Keep-Alive
timeout=15, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1

Redirect headers

Cache-control
no-cache="set-cookie"
Content-Type
text/html; charset=iso-8859-1
Date
Tue, 22 Sep 2020 09:48:21 GMT
Location
https://www.public.navy.mil/navwar/PEOC4IandSpace/Pages/default.aspxtightvnc-jviewer.jar
Server
Apache
Set-Cookie
AWSELB=FBD1AFDAA41D34350956416BD71CB145ADD20C0162EFBF2CB63A8C56493F22E7342B42C553ABD3E81C282D4CBF203A64D377FE4C9A43F238AE7A7EC9DE61106C027BD936;PATH=/
X-Frame-Options
SAMEORIGIN
Content-Length
272
Connection
keep-alive

Verdicts & Comments Add Verdict or Comment

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes

1 Cookies

Domain/Path Name / Value
www.public.navy.mil/ Name: AWSELB
Value: FBD1AFDAA41D34350956416BD71CB145ADD20C0162EFBF2CB63A8C56493F22E7342B42C553ABD3E81C282D4CBF203A64D377FE4C9A43F238AE7A7EC9DE61106C027BD936

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Frame-Options SAMEORIGIN

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

peoc4i.navy.mil
www.public.navy.mil
2001:480:d:10::10
34.195.196.137
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3