h1.nobbd.de
Open in
urlscan Pro
2a01:238:20a:202:1160::
Public Scan
Submission: On February 08 via manual from PT
Summary
This is the only time h1.nobbd.de was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 2a01:238:20a:... 2a01:238:20a:202:1160:: | 6724 (STRATO ST...) (STRATO STRATO AG) | |
1 | 2a00:1450:400... 2a00:1450:4001:81b::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2a00:1450:400... 2a00:1450:4001:814::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
2 | 2a00:1450:400... 2a00:1450:4001:824::200e | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2a00:1450:400... 2a00:1450:4001:819::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
12 | 5 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
nobbd.de
h1.nobbd.de |
25 KB |
2 |
google-analytics.com
www.google-analytics.com |
17 KB |
2 |
googleapis.com
fonts.googleapis.com ajax.googleapis.com |
34 KB |
1 |
gstatic.com
fonts.gstatic.com |
9 KB |
12 | 4 |
Domain | Requested by | |
---|---|---|
7 | h1.nobbd.de |
h1.nobbd.de
|
2 | www.google-analytics.com |
h1.nobbd.de
|
1 | fonts.gstatic.com |
ajax.googleapis.com
|
1 | ajax.googleapis.com |
h1.nobbd.de
|
1 | fonts.googleapis.com |
h1.nobbd.de
|
12 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
hackerone.com |
www.twitter.com |
twitter.com |
www.nobbd.de |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.google-analytics.com Google Internet Authority G3 |
2019-01-23 - 2019-04-17 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://h1.nobbd.de/
Frame ID: A621A7F9D1FB4B4F6A8973667745BB87
Requests: 12 HTTP requests in this frame
Screenshot
Detected technologies
UNIX (Operating Systems) ExpandDetected patterns
- headers server /Unix/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Google Analytics (Analytics) Expand
Detected patterns
- script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
- env /^gaGlobal$/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
65 Outgoing links
These are links going to different origins than the main page.
Title: bobrov
Search URL Search Domain Scan URL
Title: sp1d3rs
Search URL Search Domain Scan URL
Title: bigbear_
Search URL Search Domain Scan URL
Title: bl4de
Search URL Search Domain Scan URL
Title: jobert
Search URL Search Domain Scan URL
Title: guido
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: isox
Search URL Search Domain Scan URL
Title: geeknik
Search URL Search Domain Scan URL
Title: 4lemon
Search URL Search Domain Scan URL
Title: edio
Search URL Search Domain Scan URL
Title: Now on Twitter
Search URL Search Domain Scan URL
Title: GitLab
Search URL Search Domain Scan URL
Title: urztruzchitrz
Search URL Search Domain Scan URL
Title: Guests Will Disclose the Private Project Full Activity Via Project Activity Feeds
Search URL Search Domain Scan URL
Title: Uber
Search URL Search Domain Scan URL
Title: appsecure_in
Search URL Search Domain Scan URL
Title: Client secret, server tokens for developer applications returned by internal API
Search URL Search Domain Scan URL
Title: PayPal
Search URL Search Domain Scan URL
Title: alexbirsan
Search URL Search Domain Scan URL
Title: XSSI on refer.xoom.com allows stealing email addresses and posting to Twitter on behalf of victim
Search URL Search Domain Scan URL
Title: bagipro
Search URL Search Domain Scan URL
Title: [Venmo Android] Remote theft of user session
Search URL Search Domain Scan URL
Title: [PayPal Android] Remote theft of user session using push_notification_webview deeplink
Search URL Search Domain Scan URL
Title: Node.js third-party modules
Search URL Search Domain Scan URL
Title: skyn3t
Search URL Search Domain Scan URL
Title: [serve] Access unlisted internal files/folders revealing sensitive information
Search URL Search Domain Scan URL
Title: Twitter
Search URL Search Domain Scan URL
Title: bywalks
Search URL Search Domain Scan URL
Title: [dev.twitter.com] XSS and Open Redirect Protection Bypass
Search URL Search Domain Scan URL
Title: U.S. Dept Of Defense
Search URL Search Domain Scan URL
Title: archang31
Search URL Search Domain Scan URL
Title: Information Disclosure (can access all Army HRC RFOs) within AIM view RFO Portal
Search URL Search Domain Scan URL
Title: Ubiquiti Networks
Search URL Search Domain Scan URL
Title: csiete
Search URL Search Domain Scan URL
Title: UBNT Amplification DDOS Attack
Search URL Search Domain Scan URL
Title: Mail.ru
Search URL Search Domain Scan URL
Title: lincoln9932
Search URL Search Domain Scan URL
Title: ??????????? ????? ?? ????? ??????? https://pandao.ru/
Search URL Search Domain Scan URL
Title: jaykpatel
Search URL Search Domain Scan URL
Title: gitter.im virtually authentication bypass by abusing authorizing callback?code
Search URL Search Domain Scan URL
Title: hossammesbah21
Search URL Search Domain Scan URL
Title: ssl cookie without secure flag set
Search URL Search Domain Scan URL
Title: MariaDB
Search URL Search Domain Scan URL
Title: mik317
Search URL Search Domain Scan URL
Title: CRLF injection on https://buildbot.mariadb.org
Search URL Search Domain Scan URL
Title: dienpv
Search URL Search Domain Scan URL
Title: Prototype pollution attack (upmerge)
Search URL Search Domain Scan URL
Title: HackerOne
Search URL Search Domain Scan URL
Title: yashrs
Search URL Search Domain Scan URL
Title: Confidential data of users and limited metadata of programs and reports accessible via GraphQL
Search URL Search Domain Scan URL
Title: yoyobabaji
Search URL Search Domain Scan URL
Title: Open redirect vulnerability in index.php
Search URL Search Domain Scan URL
Title: RATELIMITED
Search URL Search Domain Scan URL
Title: sxw
Search URL Search Domain Scan URL
Title: Missing Protection Mechanism in Mail Servers allows malicious user to use staff.ratelimited.me email could lead to identity theft.
Search URL Search Domain Scan URL
Title: Nextcloud
Search URL Search Domain Scan URL
Title: tomk
Search URL Search Domain Scan URL
Title: Remote attacker can impersonate Social users via ActivityPub API
Search URL Search Domain Scan URL
Title: Starbucks
Search URL Search Domain Scan URL
Title: seytan6161
Search URL Search Domain Scan URL
Title: Information Exposure Through an Error Message at news.starbucks.com
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: IMPRESSUM
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 8- http://www.google-analytics.com/analytics.js HTTP 307
- https://www.google-analytics.com/analytics.js
- http://www.google-analytics.com/r/collect?v=1&_v=j73&aip=1&a=1104551478&t=pageview&_s=1&dl=http%3A%2F%2Fh1.nobbd.de%2F&ul=en-us&de=UTF-8&dt=The%20unofficial%20HackerOne%20disclosure%20Timeline&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=YEBAAAAB~&jid=1594975453&gjid=1619958012&cid=551618120.1549634460&tid=UA-42220340-5&_gid=2047628659.1549634460&_r=1&z=2097161539 HTTP 307
- https://www.google-analytics.com/r/collect?v=1&_v=j73&aip=1&a=1104551478&t=pageview&_s=1&dl=http%3A%2F%2Fh1.nobbd.de%2F&ul=en-us&de=UTF-8&dt=The%20unofficial%20HackerOne%20disclosure%20Timeline&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=YEBAAAAB~&jid=1594975453&gjid=1619958012&cid=551618120.1549634460&tid=UA-42220340-5&_gid=2047628659.1549634460&_r=1&z=2097161539
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
h1.nobbd.de/ |
24 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css
fonts.googleapis.com/ |
3 KB 1019 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
h1.nobbd.de/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.11.1/ |
94 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.js
h1.nobbd.de/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
t_.png
h1.nobbd.de/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
t.png
h1.nobbd.de/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
time.png
h1.nobbd.de/img/ |
547 B 829 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
followdisclosedh1.png
h1.nobbd.de/img/ |
13 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
analytics.js
www.google-analytics.com/ Redirect Chain
|
43 KB 17 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
TK3iWkUHHAIjg752GT8Gl-1PKw.woff2
fonts.gstatic.com/s/oswald/v16/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
collect
www.google-analytics.com/r/ Redirect Chain
|
35 B 111 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| debounce function| addInput function| filterLinks function| TOL function| S function| TL function| TS function| getSearchResults string| GoogleAnalyticsObject function| ga function| openTimeline object| google_tag_data object| gaplugins object| gaGlobal object| gaData3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.nobbd.de/ | Name: _gat Value: 1 |
|
.nobbd.de/ | Name: _gid Value: GA1.2.2047628659.1549634460 |
|
.nobbd.de/ | Name: _ga Value: GA1.2.551618120.1549634460 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
fonts.googleapis.com
fonts.gstatic.com
h1.nobbd.de
www.google-analytics.com
2a00:1450:4001:814::200a
2a00:1450:4001:819::2003
2a00:1450:4001:81b::200a
2a00:1450:4001:824::200e
2a01:238:20a:202:1160::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