URL: https://exchange.hackmybankaccount.com/
Submission: On August 14 via automatic, source certstream-suspicious — Scanned from DE

Summary

This website contacted 6 IPs in 2 countries across 6 domains to perform 12 HTTP transactions. The main IP is 185.53.179.170, located in Germany and belongs to TEAMINTERNET-AS, DE. The main domain is exchange.hackmybankaccount.com.
TLS certificate: Issued by R10 on August 14th 2024. Valid for: 3 months.
This is the only time exchange.hackmybankaccount.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

Apex Domain
Subdomains
Transfer
5 hackmybankaccount.com
exchange.hackmybankaccount.com
7 KB
3 syndicatedsearch.goog
syndicatedsearch.goog — Cisco Umbrella Rank: 6209
722 B
1 googleadservices.com
partner.googleadservices.com — Cisco Umbrella Rank: 5754
269 B
1 google.com
www.google.com — Cisco Umbrella Rank: 10
54 KB
1 cloudfront.net
d38psrni17bvxu.cloudfront.net
11 KB
0 parkingcrew.net Failed
c.parkingcrew.net Failed
12 6
Domain Requested by
5 exchange.hackmybankaccount.com exchange.hackmybankaccount.com
3 syndicatedsearch.goog www.google.com
1 partner.googleadservices.com www.google.com
1 www.google.com exchange.hackmybankaccount.com
1 d38psrni17bvxu.cloudfront.net exchange.hackmybankaccount.com
0 c.parkingcrew.net Failed exchange.hackmybankaccount.com
12 6

This site contains links to these domains. Also see Links.

Domain
domainnamesales.com
Subject Issuer Validity Valid
exchange.hackmybankaccount.com
R10
2024-08-14 -
2024-11-12
3 months crt.sh
*.cloudfront.net
Amazon RSA 2048 M01
2024-07-30 -
2025-07-03
a year crt.sh
*.google.com
WR2
2024-07-30 -
2024-10-22
3 months crt.sh
*.googleadservices.com
WR2
2024-07-30 -
2024-10-22
3 months crt.sh
syndicatedsearch.goog
WR2
2024-07-30 -
2024-10-22
3 months crt.sh

This page contains 2 frames:

Primary Page: https://exchange.hackmybankaccount.com/
Frame ID: D75398F0F53244BC12B6ACD1650D6595
Requests: 11 HTTP requests in this frame

Frame: https://syndicatedsearch.goog/afs/ads?adtest=off&psid=7840396037&pcsa=false&channel=000001%2C000003%2C%2Cbucket011&client=dp-mobile-teaminternet01&r=m&hl=de&ivt=0&rpbu=http%3A%2F%2Fexchange.hackmybankaccount.com%2F%3Fts%3DfENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTF8fHx8fHw2NmJjMTIyNzJjMmNmfHx8MTcyMzYwMTQ0Ny4yMnxkYzMxNDMyYzcwMWUzMjI3NmUyMzM5OWJkMzdkZjMwMzM0Nzc0MTMwfHx8fHwxfHwwfDB8fHx8MXx8fHx8MHwwfHx8fHx8fHx8fDB8MHx8MHx8fDB8MHxXMTA9fHwxfFcxMD18MmNiOGJmYjk4MTVhZjcxNWYzNWNlODVhZGM3YzI3OTdiOGFmZWM5MHwwfGRwLW1vYmlsZS10ZWFtaW50ZXJuZXQwMXwwfDB8fHw%253D&max_radlink_len=40&type=3&uiopt=true&swp=as-drid-oo-1808423912321928&oe=UTF-8&ie=UTF-8&fexp=21404%2C17301437%2C17301439%2C17301442%2C17301511%2C17301516%2C17301266&format=r3%7Cs&nocache=3241723601447517&num=0&output=afd_ads&domain_name=exchange.hackmybankaccount.com&v=3&bsl=8&pac=0&u_his=2&u_tz=120&dt=1723601447518&u_w=1600&u_h=1200&biw=1600&bih=1200&psw=1600&psh=789&frm=0&uio=--&cont=tc&drt=0&jsid=caf&nfp=1&jsv=659524724&rurl=https%3A%2F%2Fexchange.hackmybankaccount.com%2F
Frame ID: 77E6654B9536CF6DB94380AA181FD180
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

hackmybankaccount.com

Page Statistics

12
Requests

92 %
HTTPS

80 %
IPv6

6
Domains

6
Subdomains

6
IPs

2
Countries

74 kB
Transfer

178 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

12 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
exchange.hackmybankaccount.com/
16 KB
7 KB
Document
General
Full URL
https://exchange.hackmybankaccount.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.53.179.170 , Germany, ASN61969 (TEAMINTERNET-AS, DE),
Reverse DNS
Software
Caddy nginx /
Resource Hash
319c7044a20dc97ff674508d91f41517d338790b7c0986eda19c1f436031224a

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

accept-ch
viewport-width dpr device-memory rtt downlink ect ua ua-full-version ua-platform ua-platform-version ua-arch ua-model ua-mobile
accept-ch-lifetime
30
alt-svc
h3=":8443"; ma=2592000
content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Wed, 14 Aug 2024 02:10:47 GMT
host
{http.reverse_proxy.upstream.hostport}
server
Caddy nginx
vary
Accept-Encoding
x-adblock-key
MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBALquDFETXRn0Hr05fUP7EJT77xYnPmRbpMy4vk8KYiHnkNpednjOANJcaXDXcKQJN0nXKZJL7TciJD8AoHXK158CAwEAAQ==_oARVvYjv8lMtO2n0M7DCBF8pOR4GDsjAlJ7KFqLyoPefjpIEf73QgKHBeMTtsWPH9Y7JSCZhk19Id7G4HEeD3w==
x-buckets
bucket011
x-domain
hackmybankaccount.com
x-forwarded-host
exchange.hackmybankaccount.com
x-language
german
x-ssl-c
v1
x-ssl-proxy
v2
x-subdomain
exchange
x-template
tpl_CleanPeppermintBlack_twoclick
sale_form.js
c.parkingcrew.net/scripts/
0
0

track.php
exchange.hackmybankaccount.com/
0
96 B
XHR
General
Full URL
https://exchange.hackmybankaccount.com/track.php?domain=hackmybankaccount.com&toggle=browserjs&uid=MTcyMzYwMTQ0Ny4xODE6NGQyYzIzYmFmODk5MGRkOGE3ZmVmZWJjY2UyZmNlNjExMDMwMGQ2YzdmNjFhNjRmMWVkODRlYjExYzU1NWU1Mzo2NmJjMTIyNzJjMzFm
Requested by
Host: exchange.hackmybankaccount.com
URL: https://exchange.hackmybankaccount.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.53.179.170 , Germany, ASN61969 (TEAMINTERNET-AS, DE),
Reverse DNS
Software
Caddy, nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

device-memory
8
rtt
50
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
viewport-width
1600
Referer
https://exchange.hackmybankaccount.com/
dpr
1
downlink
10
ect
4g

Response headers

date
Wed, 14 Aug 2024 02:10:47 GMT
content-encoding
gzip
x-ssl-proxy
v2
accept-ch
viewport-width, dpr, device-memory, rtt, downlink, ect, ua, ua-full-version, ua-platform, ua-platform-version, ua-arch, ua-model, ua-mobile
host
{http.reverse_proxy.upstream.hostport}
server
Caddy, nginx
x-custom-track
browserjs
vary
Accept-Encoding
accept-ch-lifetime
30
content-type
text/html; charset=UTF-8
access-control-allow-origin
*
x-forwarded-host
exchange.hackmybankaccount.com
x-ssl-c
v1
alt-svc
h3=":8443"; ma=2592000
arrows.png
d38psrni17bvxu.cloudfront.net/themes/cleanPeppermintBlack_657d9013/img/
11 KB
11 KB
Image
General
Full URL
https://d38psrni17bvxu.cloudfront.net/themes/cleanPeppermintBlack_657d9013/img/arrows.png
Requested by
Host: exchange.hackmybankaccount.com
URL: https://exchange.hackmybankaccount.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2165:a000:1d:4618:5c80:21 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
67dff0aad873050f12609885f2264417ccdd0d438311000a704c89f0865f7865

Request headers

Referer
https://exchange.hackmybankaccount.com/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

date
Tue, 13 Aug 2024 17:27:24 GMT
via
1.1 0ef755569b0bb31a32a90b7cdddb6f18.cloudfront.net (CloudFront)
last-modified
Thu, 21 Mar 2024 11:48:11 GMT
server
nginx
x-amz-cf-pop
MUC50-P6
age
31403
etag
"65fc1e7b-2c6f"
x-cache
Hit from cloudfront
content-type
image/png
accept-ranges
bytes
content-length
11375
x-amz-cf-id
u2UGb1JGMCPxZqR4oZZxRGkUmNfEQ6R9IUfrZi9ptzlyEHiYi_dXTQ==
ls.php
exchange.hackmybankaccount.com/
16 B
370 B
XHR
General
Full URL
https://exchange.hackmybankaccount.com/ls.php?t=66bc1227&token=2cb8bfb9815af715f35ce85adc7c2797b8afec90
Requested by
Host: exchange.hackmybankaccount.com
URL: https://exchange.hackmybankaccount.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.53.179.170 , Germany, ASN61969 (TEAMINTERNET-AS, DE),
Reverse DNS
Software
Caddy, nginx /
Resource Hash
c955e57777ec0d73639dca6748560d00aa5eb8e12f13ebb2ed9656add3908f97

Request headers

device-memory
8
rtt
50
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
viewport-width
1600
Referer
https://exchange.hackmybankaccount.com/
dpr
1
downlink
10
ect
4g

Response headers

date
Wed, 14 Aug 2024 02:10:47 GMT
x-adblock-key
MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBALquDFETXRn0Hr05fUP7EJT77xYnPmRbpMy4vk8KYiHnkNpednjOANJcaXDXcKQJN0nXKZJL7TciJD8AoHXK158CAwEAAQ==_iNZtiBssqF6CF7flArF4cKQpg347Gwy/i1gel4bEc0AKlv3O4Nxn9gw93cdDVm9wrgW7Ipiwj26HwAbMEyV7rg==
x-ssl-c
v1
alt-svc
h3=":8443"; ma=2592000
x-ssl-proxy
v2
accept-ch
viewport-width, dpr, device-memory, rtt, downlink, ect, ua, ua-full-version, ua-platform, ua-platform-version, ua-arch, ua-model, ua-mobile
host
{http.reverse_proxy.upstream.hostport}
server
Caddy, nginx
access-control-max-age
86400
access-control-allow-methods
POST, OPTIONS
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
accept-ch-lifetime
30
charset
utf-8
x-forwarded-host
exchange.hackmybankaccount.com
x-log-success
66bc1227d4312604b7065128
caf.js
www.google.com/adsense/domains/
151 KB
54 KB
Script
General
Full URL
https://www.google.com/adsense/domains/caf.js?abp=1&adsdeli=true
Requested by
Host: exchange.hackmybankaccount.com
URL: https://exchange.hackmybankaccount.com/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ed97801c59162f320d3832c1c7a3f3d21650b8c366f647f855b80b3fe7e1acc9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://exchange.hackmybankaccount.com/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

date
Wed, 14 Aug 2024 02:10:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/ads-afs-ui
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="ads-afs-ui"
etag
"1786532570361771909"
vary
Accept-Encoding
report-to
{"group":"ads-afs-ui","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-afs-ui"}]}
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
accept-ranges
bytes
link
<https://syndicatedsearch.goog>; rel="preconnect"
expires
Wed, 14 Aug 2024 02:10:47 GMT
cookie.js
partner.googleadservices.com/gampad/
396 B
269 B
Script
General
Full URL
https://partner.googleadservices.com/gampad/cookie.js?domain=exchange.hackmybankaccount.com&client=dp-mobile-teaminternet01&product=SAS&callback=__sasCookie
Requested by
Host: www.google.com
URL: https://www.google.com/adsense/domains/caf.js?abp=1&adsdeli=true
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
dc7a4440bd8646235aadc8ae0ac7801dd0fbb35ddd931934a44428a3de9c3b00
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://exchange.hackmybankaccount.com/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

date
Wed, 14 Aug 2024 02:10:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-type
text/javascript; charset=UTF-8
cache-control
private
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
247
x-xss-protection
0
ads
syndicatedsearch.goog/afs/ Frame 77E6
0
0
Document
General
Full URL
https://syndicatedsearch.goog/afs/ads?adtest=off&psid=7840396037&pcsa=false&channel=000001%2C000003%2C%2Cbucket011&client=dp-mobile-teaminternet01&r=m&hl=de&ivt=0&rpbu=http%3A%2F%2Fexchange.hackmybankaccount.com%2F%3Fts%3DfENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTF8fHx8fHw2NmJjMTIyNzJjMmNmfHx8MTcyMzYwMTQ0Ny4yMnxkYzMxNDMyYzcwMWUzMjI3NmUyMzM5OWJkMzdkZjMwMzM0Nzc0MTMwfHx8fHwxfHwwfDB8fHx8MXx8fHx8MHwwfHx8fHx8fHx8fDB8MHx8MHx8fDB8MHxXMTA9fHwxfFcxMD18MmNiOGJmYjk4MTVhZjcxNWYzNWNlODVhZGM3YzI3OTdiOGFmZWM5MHwwfGRwLW1vYmlsZS10ZWFtaW50ZXJuZXQwMXwwfDB8fHw%253D&max_radlink_len=40&type=3&uiopt=true&swp=as-drid-oo-1808423912321928&oe=UTF-8&ie=UTF-8&fexp=21404%2C17301437%2C17301439%2C17301442%2C17301511%2C17301516%2C17301266&format=r3%7Cs&nocache=3241723601447517&num=0&output=afd_ads&domain_name=exchange.hackmybankaccount.com&v=3&bsl=8&pac=0&u_his=2&u_tz=120&dt=1723601447518&u_w=1600&u_h=1200&biw=1600&bih=1200&psw=1600&psh=789&frm=0&uio=--&cont=tc&drt=0&jsid=caf&nfp=1&jsv=659524724&rurl=https%3A%2F%2Fexchange.hackmybankaccount.com%2F
Requested by
Host: www.google.com
URL: https://www.google.com/adsense/domains/caf.js?abp=1&adsdeli=true
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
gws /
Resource Hash
Security Headers
Name Value
Content-Security-Policy object-src 'none';base-uri 'self';script-src 'nonce-ljIBKnCblzT1wU7wbu9TfQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other
X-Xss-Protection 0

Request headers

Referer
https://exchange.hackmybankaccount.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
cache-control
private, max-age=3600
content-disposition
inline
content-encoding
br
content-length
3051
content-security-policy
object-src 'none';base-uri 'self';script-src 'nonce-ljIBKnCblzT1wU7wbu9TfQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other
content-type
text/html; charset=UTF-8
cross-origin-opener-policy
same-origin-allow-popups; report-to="gws"
date
Wed, 14 Aug 2024 02:10:47 GMT
expires
Wed, 14 Aug 2024 02:10:47 GMT
report-to
{"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/other"}]}
server
gws
x-xss-protection
0
track.php
exchange.hackmybankaccount.com/
0
85 B
XHR
General
Full URL
https://exchange.hackmybankaccount.com/track.php?domain=hackmybankaccount.com&caf=1&toggle=answercheck&answer=yes&uid=MTcyMzYwMTQ0Ny4xODE6NGQyYzIzYmFmODk5MGRkOGE3ZmVmZWJjY2UyZmNlNjExMDMwMGQ2YzdmNjFhNjRmMWVkODRlYjExYzU1NWU1Mzo2NmJjMTIyNzJjMzFm
Requested by
Host: exchange.hackmybankaccount.com
URL: https://exchange.hackmybankaccount.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.53.179.170 , Germany, ASN61969 (TEAMINTERNET-AS, DE),
Reverse DNS
Software
Caddy, nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

device-memory
8
rtt
50
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
viewport-width
1600
Referer
https://exchange.hackmybankaccount.com/
dpr
1
downlink
10
ect
4g

Response headers

date
Wed, 14 Aug 2024 02:10:47 GMT
content-encoding
gzip
x-ssl-proxy
v2
accept-ch
viewport-width, dpr, device-memory, rtt, downlink, ect, ua, ua-full-version, ua-platform, ua-platform-version, ua-arch, ua-model, ua-mobile
host
{http.reverse_proxy.upstream.hostport}
server
Caddy, nginx
x-custom-track
answercheck
vary
Accept-Encoding
accept-ch-lifetime
30
content-type
text/html; charset=UTF-8
access-control-allow-origin
*
x-forwarded-host
exchange.hackmybankaccount.com
x-ssl-c
v1
alt-svc
h3=":8443"; ma=2592000
favicon.ico
exchange.hackmybankaccount.com/
0
74 B
Other
General
Full URL
https://exchange.hackmybankaccount.com/favicon.ico
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.53.179.170 , Germany, ASN61969 (TEAMINTERNET-AS, DE),
Reverse DNS
Software
Caddy, nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

device-memory
8
rtt
50
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
viewport-width
1600
Referer
https://exchange.hackmybankaccount.com/
dpr
1
downlink
10
ect
4g

Response headers

date
Wed, 14 Aug 2024 02:10:47 GMT
x-ssl-proxy
v2
last-modified
Mon, 12 Aug 2024 12:22:56 GMT
server
Caddy, nginx
host
{http.reverse_proxy.upstream.hostport}
x-forwarded-host
exchange.hackmybankaccount.com
etag
"66b9fea0-0"
content-type
image/x-icon
x-ssl-c
v1
accept-ranges
bytes
alt-svc
h3=":8443"; ma=2592000
content-length
0
gen_204
syndicatedsearch.goog/afs/
0
509 B
Image
General
Full URL
https://syndicatedsearch.goog/afs/gen_204?client=dp-mobile-teaminternet01&output=uds_ads_only&zx=ll4xfkm0vtf0&aqid=JxK8Zt7nJf7LjuwP-NHz8AE&psid=7840396037&pbt=bs&adbx=535&adby=128&adbh=496&adbw=530&adbah=160%2C160%2C160&adbn=master-1&eawp=partner-dp-mobile-teaminternet01&errv=659524724&csala=5%7C0%7C164%7C67%7C68&lle=0&ifv=1&hpt=1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
gws /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy object-src 'none';base-uri 'self';script-src 'nonce-eJKEpQQ4E53z1OPza7quDA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://exchange.hackmybankaccount.com/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

content-security-policy
object-src 'none';base-uri 'self';script-src 'nonce-eJKEpQQ4E53z1OPza7quDA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other
date
Wed, 14 Aug 2024 02:10:49 GMT
server
gws
cross-origin-opener-policy
same-origin-allow-popups; report-to="gws"
x-frame-options
SAMEORIGIN
report-to
{"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/other"}]}
content-type
text/html; charset=UTF-8
permissions-policy
unload=()
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
x-xss-protection
0
gen_204
syndicatedsearch.goog/afs/
0
213 B
Image
General
Full URL
https://syndicatedsearch.goog/afs/gen_204?client=dp-mobile-teaminternet01&output=uds_ads_only&zx=ckm1mqd92shw&aqid=JxK8Zt7nJf7LjuwP-NHz8AE&psid=7840396037&pbt=bv&adbx=535&adby=128&adbh=496&adbw=530&adbah=160%2C160%2C160&adbn=master-1&eawp=partner-dp-mobile-teaminternet01&errv=659524724&csala=5%7C0%7C164%7C67%7C68&lle=0&ifv=1&hpt=1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
gws /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy object-src 'none';base-uri 'self';script-src 'nonce-qXPGaTYFqyn97I0ydJkAXw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://exchange.hackmybankaccount.com/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

content-security-policy
object-src 'none';base-uri 'self';script-src 'nonce-qXPGaTYFqyn97I0ydJkAXw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other
date
Wed, 14 Aug 2024 02:10:49 GMT
server
gws
cross-origin-opener-policy
same-origin-allow-popups; report-to="gws"
x-frame-options
SAMEORIGIN
report-to
{"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/other"}]}
content-type
text/html; charset=UTF-8
permissions-policy
unload=()
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
x-xss-protection
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
c.parkingcrew.net
URL
http://c.parkingcrew.net/scripts/sale_form.js

Verdicts & Comments Add Verdict or Comment

14 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| tcblock object| searchboxBlock function| getXMLhttp function| ajaxQuery function| ajaxBackfill function| loadFeed object| xmlHttp function| ls function| getLoadFeedArguments number| googleNDT_ number| googleAltLoader object| google function| __sasCookie

1 Cookies

Domain/Path Name / Value
.hackmybankaccount.com/ Name: __gsas
Value: ID=83e92e71a80b3153:T=1723601447:RT=1723601447:S=ALNI_MYbF8BkzFa_82YazbHCiIc9qRu6XQ

1 Console Messages

Source Level URL
Text
security error URL: https://exchange.hackmybankaccount.com/
Message:
Mixed Content: The page at 'https://exchange.hackmybankaccount.com/' was loaded over HTTPS, but requested an insecure script 'http://c.parkingcrew.net/scripts/sale_form.js'. This request has been blocked; the content must be served over HTTPS.