acybersecurity.eu
Open in
urlscan Pro
2a02:c500:6:7::1
Public Scan
Submission: On July 16 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by R11 on July 16th 2024. Valid for: 3 months.
This is the only time acybersecurity.eu was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 2a02:c500:6:7::1 2a02:c500:6:7::1 | 199246 (TOPHOST) (TOPHOST) | |
1 | 2a00:1450:400... 2a00:1450:4001:829::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a00:1450:400... 2a00:1450:4001:813::2003 | 15169 (GOOGLE) (GOOGLE) | |
12 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
acybersecurity.eu
acybersecurity.eu |
942 KB |
2 |
gstatic.com
fonts.gstatic.com |
95 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 110 |
3 KB |
12 | 3 |
Domain | Requested by | |
---|---|---|
9 | acybersecurity.eu |
acybersecurity.eu
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
acybersecurity.eu
|
12 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
acybersecurity.eu R11 |
2024-07-16 - 2024-10-14 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-06-24 - 2024-09-16 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-06-24 - 2024-09-16 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://acybersecurity.eu/
Frame ID: 1C8047003A0BA217B63A2EA1DF19EBDB
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
A CyberSecurityDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
acybersecurity.eu/ |
2 KB 953 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
57 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
acybersecurity.eu/assets/vendor/bootstrap/css/ |
151 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap-icons.css
acybersecurity.eu/assets/vendor/bootstrap-icons/ |
63 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
acybersecurity.eu/assets/css/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js
acybersecurity.eu/assets/vendor/bootstrap/js/ |
79 KB 21 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
validate.js
acybersecurity.eu/assets/vendor/php-email-form/ |
3 KB 1002 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
acybersecurity.eu/assets/js/ |
1 KB 689 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hero-bg.jpg
acybersecurity.eu/assets/img/ |
866 KB 867 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1Ptug8zYS_SKggPNyC0ITw.woff2
fonts.gstatic.com/s/raleway/v34/ |
47 KB 47 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v40/ |
47 KB 48 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
acybersecurity.eu/ |
111 KB 22 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
number| uidEvent object| bootstrap0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
acybersecurity.eu
fonts.googleapis.com
fonts.gstatic.com
2a00:1450:4001:813::2003
2a00:1450:4001:829::200a
2a02:c500:6:7::1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