virtuellefiliale.sdirekt-serviceportal.de
Open in
urlscan Pro
94.101.40.215
Public Scan
Effective URL: https://virtuellefiliale.sdirekt-serviceportal.de//filiale.php?p=saalesparkasse
Submission: On August 25 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by GeoTrust EV RSA CA 2018 on September 1st 2020. Valid for: a year.
This is the only time virtuellefiliale.sdirekt-serviceportal.de was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 11 | 94.101.40.215 94.101.40.215 | 16097 (HLKOMM 04...) (HLKOMM 04107 Leipzig) | |
8 | 85.214.52.15 85.214.52.15 | 6724 (STRATO ST...) (STRATO STRATO AG) | |
18 | 2 |
ASN16097 (HLKOMM 04107 Leipzig, DE)
virtuellefiliale.sdirekt-serviceportal.de |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
sdirekt-serviceportal.de
1 redirects
virtuellefiliale.sdirekt-serviceportal.de |
204 KB |
8 |
melaphone.de
www.melaphone.de |
675 KB |
18 | 2 |
Domain | Requested by | |
---|---|---|
11 | virtuellefiliale.sdirekt-serviceportal.de |
1 redirects
virtuellefiliale.sdirekt-serviceportal.de
|
8 | www.melaphone.de |
virtuellefiliale.sdirekt-serviceportal.de
|
18 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.saalesparkasse.de |
Subject Issuer | Validity | Valid | |
---|---|---|---|
web3.sdirekt-serviceportal.de GeoTrust EV RSA CA 2018 |
2020-09-01 - 2021-09-02 |
a year | crt.sh |
melaphone.de R3 |
2021-06-26 - 2021-09-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://virtuellefiliale.sdirekt-serviceportal.de//filiale.php?p=saalesparkasse
Frame ID: 899F1D826B804F1692EA0C8BB76A5383
Requests: 18 HTTP requests in this frame
Screenshot
Page Title
Onlinefiliale - SaalesparkassePage URL History Show full URLs
-
https://virtuellefiliale.sdirekt-serviceportal.de/
HTTP 302
https://virtuellefiliale.sdirekt-serviceportal.de//filiale.php?p=saalesparkasse Page URL
Detected technologies
Node.js (Programming Languages) ExpandDetected patterns
- script /socket\.io.*\.js/i
Raphael (JavaScript Graphics) Expand
Detected patterns
- script /raphael(?:-([\d.]+))?(?:\.min)?\.js/i
AngularJS (JavaScript Frameworks) Expand
Detected patterns
- script /angular.*\.js/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Socket.io (JavaScript Frameworks) Expand
Detected patterns
- script /socket\.io.*\.js/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Sicherheits- und Datenschutzinformationen
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://virtuellefiliale.sdirekt-serviceportal.de/
HTTP 302
https://virtuellefiliale.sdirekt-serviceportal.de//filiale.php?p=saalesparkasse Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
filiale.php
virtuellefiliale.sdirekt-serviceportal.de// Redirect Chain
|
43 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
internetfiliale.css
virtuellefiliale.sdirekt-serviceportal.de//if6/ |
236 KB 35 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
socket.io.js
www.melaphone.de/socket.io/ |
71 KB 71 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
adapter.js
www.melaphone.de/scripts/webrtc-adapter/out/ |
170 KB 170 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.11.1.min.js
www.melaphone.de/jquery/ |
94 KB 94 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
raphael.js
www.melaphone.de/raphael/ |
91 KB 91 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
angular.min.js
www.melaphone.de/angular/ |
151 KB 151 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
angular-scrollable-table.js
www.melaphone.de/scrollableTable/ |
18 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
melaphone.js
www.melaphone.de/js/ |
69 KB 69 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mpsketchpad.js
www.melaphone.de/js/ |
10 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dominion.css
virtuellefiliale.sdirekt-serviceportal.de//css/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
virtuellefiliale.sdirekt-serviceportal.de//css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
virtuellefiliale.sdirekt-serviceportal.de//css/font-awesome-4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_saalesparkasse.png
virtuellefiliale.sdirekt-serviceportal.de//img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
%7B%7BmelaphoneModel.owner.presence.conference[0].master.photo%7D%7D
virtuellefiliale.sdirekt-serviceportal.de// |
196 B 196 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Sparkasse_web_Rg.woff
virtuellefiliale.sdirekt-serviceportal.de//if6/internetfiliale/fonts/ |
39 KB 39 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pictos-if.woff
virtuellefiliale.sdirekt-serviceportal.de//if6/internetfiliale/fonts/ |
32 KB 32 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
virtuellefiliale.sdirekt-serviceportal.de//css/font-awesome-4.7.0/fonts/ |
75 KB 76 KB |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| io object| adapter function| $ function| jQuery function| eve function| Raphael object| angular string| mpSigServDominionUrl object| mpConfigParams1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
virtuellefiliale.sdirekt-serviceportal.de/ | Name: PHPSESSID Value: nfhkg2icdbdhp18bm0r43ru2r3 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=15552000; includeSubDomains |
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
virtuellefiliale.sdirekt-serviceportal.de
www.melaphone.de
85.214.52.15
94.101.40.215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