vulntrack-staging.auth.us-east-1.amazoncognito.com
Open in
urlscan Pro
2600:1f18:257:8002:4a05:fd97:c3fb:4166
Public Scan
Effective URL: https://vulntrack-staging.auth.us-east-1.amazoncognito.com/login?response_type=code&client_id=6hhgd31eb3f5dc8inm79qq5ebc&redirect_uri=https%3A//xi-vulntrac...
Submission: On February 23 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by Amazon on February 27th 2022. Valid for: a year.
This is the only time vulntrack-staging.auth.us-east-1.amazoncognito.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 8 | 23.21.208.246 23.21.208.246 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2600:1f18:257... 2600:1f18:257:8002:4a05:fd97:c3fb:4166 | 14618 (AMAZON-AES) (AMAZON-AES) | |
6 | 2600:9000:223... 2600:9000:223d:9e00:6:8de6:8640:21 | 16509 (AMAZON-02) (AMAZON-02) | |
15 | 4 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-23-21-208-246.compute-1.amazonaws.com
xi-vulntrack-staging.exodusintel.com |
ASN14618 (AMAZON-AES, US)
vulntrack-staging.auth.us-east-1.amazoncognito.com |
ASN16509 (AMAZON-02, US)
d3oia8etllorh5.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
exodusintel.com
1 redirects
xi-vulntrack-staging.exodusintel.com |
850 KB |
6 |
cloudfront.net
d3oia8etllorh5.cloudfront.net |
481 KB |
1 |
amazoncognito.com
vulntrack-staging.auth.us-east-1.amazoncognito.com |
9 KB |
15 | 3 |
Domain | Requested by | |
---|---|---|
8 | xi-vulntrack-staging.exodusintel.com |
1 redirects
xi-vulntrack-staging.exodusintel.com
|
6 | d3oia8etllorh5.cloudfront.net |
vulntrack-staging.auth.us-east-1.amazoncognito.com
|
1 | vulntrack-staging.auth.us-east-1.amazoncognito.com |
xi-vulntrack-staging.exodusintel.com
|
15 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
xi-vulntrack-staging.exodusintel.com Amazon |
2022-06-17 - 2023-07-16 |
a year | crt.sh |
*.auth.us-east-1.amazoncognito.com Amazon |
2022-02-27 - 2023-03-28 |
a year | crt.sh |
*.cloudfront.net Amazon RSA 2048 M01 |
2022-12-08 - 2023-12-07 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://vulntrack-staging.auth.us-east-1.amazoncognito.com/login?response_type=code&client_id=6hhgd31eb3f5dc8inm79qq5ebc&redirect_uri=https%3A//xi-vulntrack-staging.exodusintel.com/api/auth/cognito/signin&state=03de4f716fc086a576878f53f88ae1c2
Frame ID: 03B9A8ADF218A993AEF5719C99A72186
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
SigninPage URL History Show full URLs
- https://xi-vulntrack-staging.exodusintel.com/ Page URL
-
https://xi-vulntrack-staging.exodusintel.com/api/auth/fusionauth-login-redirect
HTTP 302
https://vulntrack-staging.auth.us-east-1.amazoncognito.com/login?response_type=code&client_id=6hhgd31eb3f5dc8inm79qq5ebc&redirect_uri=h... Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://xi-vulntrack-staging.exodusintel.com/ Page URL
-
https://xi-vulntrack-staging.exodusintel.com/api/auth/fusionauth-login-redirect
HTTP 302
https://vulntrack-staging.auth.us-east-1.amazoncognito.com/login?response_type=code&client_id=6hhgd31eb3f5dc8inm79qq5ebc&redirect_uri=https%3A//xi-vulntrack-staging.exodusintel.com/api/auth/cognito/signin&state=03de4f716fc086a576878f53f88ae1c2 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
xi-vulntrack-staging.exodusintel.com/ |
662 B 481 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.9eeb6f2b.css
xi-vulntrack-staging.exodusintel.com/css/ |
313 B 372 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.93b24d90.css
xi-vulntrack-staging.exodusintel.com/css/ |
835 KB 112 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.21d61478.js
xi-vulntrack-staging.exodusintel.com/js/ |
89 KB 22 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.1c47a7da.js
xi-vulntrack-staging.exodusintel.com/js/ |
2 MB 651 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
authenticated
xi-vulntrack-staging.exodusintel.com/api/ |
5 B 98 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto-Light.d26871e8.woff2
xi-vulntrack-staging.exodusintel.com/fonts/ |
63 KB 63 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
logout
xi-vulntrack-staging.exodusintel.com/api/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login
vulntrack-staging.auth.us-east-1.amazoncognito.com/ Redirect Chain
|
8 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
d3oia8etllorh5.cloudfront.net/20221014152150/css/ |
118 KB 119 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cognito-login.css
d3oia8etllorh5.cloudfront.net/20221014152150/css/ |
6 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
custom-css.css
d3oia8etllorh5.cloudfront.net/us-east-1_UiPotJs5P/6hhgd31eb3f5dc8inm79qq5ebc/20220629182535/assets/CSS/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
amazon-cognito-advanced-security-data.min.js
d3oia8etllorh5.cloudfront.net/20221014152150/js/ |
262 KB 263 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
image.jpg
d3oia8etllorh5.cloudfront.net/us-east-1_UiPotJs5P/6hhgd31eb3f5dc8inm79qq5ebc/20220629182535/assets/images/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.js
d3oia8etllorh5.cloudfront.net/20221014152150/js/ |
87 KB 88 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- xi-vulntrack-staging.exodusintel.com
- URL
- https://xi-vulntrack-staging.exodusintel.com/api/logout
Verdicts & Comments Add Verdict or Comment
16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| oncontentvisibilityautostatechange boolean| __fwcimLoaded object| AWSCognitoContextData object| _crypto function| setImmediate function| clearImmediate object| AmazonCognitoAdvancedSecurityData function| Zepto function| $ function| getAdvancedSecurityData function| getUrlParameter function| onSubmit function| jQuery object| $inputs object| fwcim1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
vulntrack-staging.auth.us-east-1.amazoncognito.com/ | Name: XSRF-TOKEN Value: bb6ab607-80e2-445d-873c-0d173dc98eef |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
d3oia8etllorh5.cloudfront.net
vulntrack-staging.auth.us-east-1.amazoncognito.com
xi-vulntrack-staging.exodusintel.com
xi-vulntrack-staging.exodusintel.com
23.21.208.246
2600:1f18:257:8002:4a05:fd97:c3fb:4166
2600:9000:223d:9e00:6:8de6:8640:21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