URL: https://auth.alton.family/
Submission: On September 02 via automatic, source certstream-suspicious

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 8 HTTP transactions. The main IP is 51.89.248.126, located in London, United Kingdom and belongs to OVH, FR. The main domain is auth.alton.family.
TLS certificate: Issued by R3 on July 11th 2021. Valid for: 3 months.
This is the only time auth.alton.family was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
8 51.89.248.126 16276 (OVH)
8 1
Apex Domain
Subdomains
Transfer
8 alton.family
auth.alton.family
2 MB
8 1
Domain Requested by
8 auth.alton.family auth.alton.family
8 1

This site contains no links.

Subject Issuer Validity Valid
cloud.alton.family
R3
2021-07-11 -
2021-10-09
3 months crt.sh

This page contains 1 frames:

Primary Page: https://auth.alton.family/
Frame ID: 233A5DA2133E9F10B5C7970294E14112
Requests: 8 HTTP requests in this frame

Screenshot

Page Title

Bitwarden Web Vault

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

8
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1573 kB
Transfer

5818 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

8 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
auth.alton.family/
1 KB
1 KB
Document
General
Full URL
https://auth.alton.family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
51.89.248.126 London, United Kingdom, ASN16276 (OVH, FR),
Reverse DNS
cloud-nat.alton.family
Software
nginx /
Resource Hash
edeffb0106eb54f07dd526df7e5ea04beeb9768caac5e93ee6c6f987267d7415
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
auth.alton.family
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Server
nginx
Date
Thu, 02 Sep 2021 19:13:09 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Vary
Accept-Encoding
Last-Modified
Thu, 08 Jul 2021 04:27:59 GMT
ETag
W/"1d773b1a1b335e1"
Referrer-Policy
same-origin
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Security-Policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
X-Frame-Options
SAMEORIGIN
X-Robots-Tag
noindex, nofollow
Content-Encoding
gzip
main.432d5892f7c760eda0bb.css
auth.alton.family/app/
231 KB
45 KB
Stylesheet
General
Full URL
https://auth.alton.family/app/main.432d5892f7c760eda0bb.css
Requested by
Host: auth.alton.family
URL: https://auth.alton.family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
51.89.248.126 London, United Kingdom, ASN16276 (OVH, FR),
Reverse DNS
cloud-nat.alton.family
Software
nginx /
Resource Hash
d15bc454d993e82bb2f676b7c0dc343cb9153f3a9f4a56267d77f49036a87db1
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
auth.alton.family
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://auth.alton.family/
Connection
keep-alive
Referer
https://auth.alton.family/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 02 Sep 2021 19:13:09 GMT
Content-Encoding
gzip
Referrer-Policy
same-origin
Last-Modified
Thu, 08 Jul 2021 04:27:58 GMT
Server
nginx
ETag
W/"1d773b1a119074c"
X-Frame-Options
SAMEORIGIN
Content-Type
text/css
Cache-Control
max-age=1209600
Transfer-Encoding
chunked
X-Content-Type-Options
nosniff
Content-Security-Policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
X-Robots-Tag
noindex, nofollow
Vary
Accept-Encoding
X-XSS-Protection
1; mode=block
logo-dark@2x.png
auth.alton.family/images/
10 KB
11 KB
Image
General
Full URL
https://auth.alton.family/images/logo-dark@2x.png
Requested by
Host: auth.alton.family
URL: https://auth.alton.family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
51.89.248.126 London, United Kingdom, ASN16276 (OVH, FR),
Reverse DNS
cloud-nat.alton.family
Software
nginx /
Resource Hash
d03e60482dcc74b2fe7602f12617b07a2817f8d71b691d3ff9608fe4fa8c25a3
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
auth.alton.family
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://auth.alton.family/
Connection
keep-alive
Referer
https://auth.alton.family/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 02 Sep 2021 19:13:09 GMT
Referrer-Policy
same-origin
Last-Modified
Thu, 08 Jul 2021 04:27:58 GMT
Server
nginx
ETag
"1d773b1a11ab38c"
X-Frame-Options
SAMEORIGIN
Content-Type
image/png
Cache-Control
max-age=604800
X-Content-Type-Options
nosniff
Content-Security-Policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Accept-Ranges
bytes
X-Robots-Tag
noindex, nofollow
Content-Length
10380
X-XSS-Protection
1; mode=block
polyfills.432d5892f7c760eda0bb.js
auth.alton.family/app/
221 KB
73 KB
Script
General
Full URL
https://auth.alton.family/app/polyfills.432d5892f7c760eda0bb.js
Requested by
Host: auth.alton.family
URL: https://auth.alton.family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
51.89.248.126 London, United Kingdom, ASN16276 (OVH, FR),
Reverse DNS
cloud-nat.alton.family
Software
nginx /
Resource Hash
7a7c9c353f0bdade7ee693388ff7e2eb97e00561da1556d907148e76237b1ca0
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
auth.alton.family
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://auth.alton.family/
Connection
keep-alive
Referer
https://auth.alton.family/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 02 Sep 2021 19:13:09 GMT
Content-Encoding
gzip
Referrer-Policy
same-origin
Last-Modified
Thu, 08 Jul 2021 04:27:59 GMT
Server
nginx
ETag
W/"1d773b1a1b04473"
X-Frame-Options
SAMEORIGIN
Content-Type
application/javascript
Cache-Control
max-age=1209600
Transfer-Encoding
chunked
X-Content-Type-Options
nosniff
Content-Security-Policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
X-Robots-Tag
noindex, nofollow
Vary
Accept-Encoding
X-XSS-Protection
1; mode=block
vendor.432d5892f7c760eda0bb.js
auth.alton.family/app/
2 MB
834 KB
Script
General
Full URL
https://auth.alton.family/app/vendor.432d5892f7c760eda0bb.js
Requested by
Host: auth.alton.family
URL: https://auth.alton.family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
51.89.248.126 London, United Kingdom, ASN16276 (OVH, FR),
Reverse DNS
cloud-nat.alton.family
Software
nginx /
Resource Hash
d163aa3c49b7432f83e48bf71008478f7ddfd918d71949bf07b1b0c5be263abc
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
auth.alton.family
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://auth.alton.family/
Connection
keep-alive
Referer
https://auth.alton.family/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 02 Sep 2021 19:13:09 GMT
Content-Encoding
gzip
Referrer-Policy
same-origin
Last-Modified
Thu, 08 Jul 2021 04:27:59 GMT
Server
nginx
ETag
W/"1d773b1a1969892"
X-Frame-Options
SAMEORIGIN
Content-Type
application/javascript
Cache-Control
max-age=1209600
Transfer-Encoding
chunked
X-Content-Type-Options
nosniff
Content-Security-Policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
X-Robots-Tag
noindex, nofollow
Vary
Accept-Encoding
X-XSS-Protection
1; mode=block
main.432d5892f7c760eda0bb.js
auth.alton.family/app/
3 MB
477 KB
Script
General
Full URL
https://auth.alton.family/app/main.432d5892f7c760eda0bb.js
Requested by
Host: auth.alton.family
URL: https://auth.alton.family/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
51.89.248.126 London, United Kingdom, ASN16276 (OVH, FR),
Reverse DNS
cloud-nat.alton.family
Software
nginx /
Resource Hash
283a6802bb485258c2bd9d1e611501b2206a828634acd05ebd483240210f325d
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
auth.alton.family
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://auth.alton.family/
Connection
keep-alive
Referer
https://auth.alton.family/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 02 Sep 2021 19:13:09 GMT
Content-Encoding
gzip
Referrer-Policy
same-origin
Last-Modified
Thu, 08 Jul 2021 04:27:59 GMT
Server
nginx
ETag
W/"1d773b1a198cada"
X-Frame-Options
SAMEORIGIN
Content-Type
application/javascript
Cache-Control
max-age=1209600
Transfer-Encoding
chunked
X-Content-Type-Options
nosniff
Content-Security-Policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
X-Robots-Tag
noindex, nofollow
Vary
Accept-Encoding
X-XSS-Protection
1; mode=block
fontawesome-webfont.woff2
auth.alton.family/fonts/
75 KB
76 KB
Font
General
Full URL
https://auth.alton.family/fonts/fontawesome-webfont.woff2
Requested by
Host: auth.alton.family
URL: https://auth.alton.family/app/main.432d5892f7c760eda0bb.css
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
51.89.248.126 London, United Kingdom, ASN16276 (OVH, FR),
Reverse DNS
cloud-nat.alton.family
Software
nginx /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Origin
https://auth.alton.family
Accept-Encoding
gzip, deflate, br
Host
auth.alton.family
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Sec-Fetch-Mode
cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
font
Referer
https://auth.alton.family/app/main.432d5892f7c760eda0bb.css
Connection
keep-alive
Origin
https://auth.alton.family
Referer
https://auth.alton.family/app/main.432d5892f7c760eda0bb.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 02 Sep 2021 19:13:09 GMT
Referrer-Policy
same-origin
Last-Modified
Thu, 08 Jul 2021 04:27:59 GMT
Server
nginx
ETag
"1d773b1a1b21ce8"
X-Frame-Options
SAMEORIGIN
Content-Type
font/woff2
Cache-Control
max-age=1209600
X-Content-Type-Options
nosniff
Content-Security-Policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Accept-Ranges
bytes
X-Robots-Tag
noindex, nofollow
Content-Length
77160
X-XSS-Protection
1; mode=block
Open_Sans-normal-400.woff
auth.alton.family/fonts/
54 KB
55 KB
Font
General
Full URL
https://auth.alton.family/fonts/Open_Sans-normal-400.woff
Requested by
Host: auth.alton.family
URL: https://auth.alton.family/app/main.432d5892f7c760eda0bb.css
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
51.89.248.126 London, United Kingdom, ASN16276 (OVH, FR),
Reverse DNS
cloud-nat.alton.family
Software
nginx /
Resource Hash
3adc584fb0bef1fbf9b1c0ecddde5727643b4334c734db78b517ab112d92e1d8
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Origin
https://auth.alton.family
Accept-Encoding
gzip, deflate, br
Host
auth.alton.family
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Sec-Fetch-Mode
cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
font
Referer
https://auth.alton.family/app/main.432d5892f7c760eda0bb.css
Connection
keep-alive
Origin
https://auth.alton.family
Referer
https://auth.alton.family/app/main.432d5892f7c760eda0bb.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 02 Sep 2021 19:13:09 GMT
Referrer-Policy
same-origin
Last-Modified
Thu, 08 Jul 2021 04:27:59 GMT
Server
nginx
ETag
"1d773b1a1b3e99c"
X-Frame-Options
SAMEORIGIN
Content-Type
application/font-woff
Cache-Control
max-age=1209600
X-Content-Type-Options
nosniff
Content-Security-Policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Accept-Ranges
bytes
X-Robots-Tag
noindex, nofollow
Content-Length
55324
X-XSS-Protection
1; mode=block

Verdicts & Comments Add Verdict or Comment

157 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| setImmediate function| clearImmediate function| Zone function| __zone_symbol__Promise function| __zone_symbol__fetch function| __zone_symbol__legacyPatch function| __zone_symbol__queueMicrotask function| __zone_symbol__setTimeout function| __zone_symbol__clearTimeout function| __zone_symbol__setInterval function| __zone_symbol__clearInterval function| __zone_symbol__setImmediate function| __zone_symbol__clearImmediate function| __zone_symbol__requestAnimationFrame function| __zone_symbol__cancelAnimationFrame function| __zone_symbol__webkitRequestAnimationFrame function| __zone_symbol__webkitCancelAnimationFrame function| __zone_symbol__alert function| __zone_symbol__prompt function| __zone_symbol__confirm function| __zone_symbol__MutationObserver function| __zone_symbol__WebKitMutationObserver function| __zone_symbol__IntersectionObserver function| __zone_symbol__FileReader boolean| __zone_symbol__ononabortpatched boolean| __zone_symbol__ononanimationendpatched boolean| __zone_symbol__ononanimationiterationpatched boolean| __zone_symbol__ononauxclickpatched boolean| __zone_symbol__ononblurpatched boolean| __zone_symbol__ononcancelpatched boolean| __zone_symbol__ononcanplaypatched boolean| __zone_symbol__ononcanplaythroughpatched boolean| __zone_symbol__ononchangepatched boolean| __zone_symbol__ononcuechangepatched boolean| __zone_symbol__ononclickpatched boolean| __zone_symbol__ononclosepatched boolean| __zone_symbol__ononcontextmenupatched boolean| __zone_symbol__onondblclickpatched boolean| __zone_symbol__onondragpatched boolean| __zone_symbol__onondragendpatched boolean| __zone_symbol__onondragenterpatched boolean| __zone_symbol__onondragleavepatched boolean| __zone_symbol__onondragoverpatched boolean| __zone_symbol__onondroppatched boolean| __zone_symbol__onondurationchangepatched boolean| __zone_symbol__ononemptiedpatched boolean| __zone_symbol__ononendedpatched boolean| __zone_symbol__ononerrorpatched boolean| __zone_symbol__ononfocuspatched boolean| __zone_symbol__onongotpointercapturepatched boolean| __zone_symbol__ononinputpatched boolean| __zone_symbol__ononinvalidpatched boolean| __zone_symbol__ononkeydownpatched boolean| __zone_symbol__ononkeypresspatched boolean| __zone_symbol__ononkeyuppatched boolean| __zone_symbol__ononloadpatched boolean| __zone_symbol__ononloadstartpatched boolean| __zone_symbol__ononloadeddatapatched boolean| __zone_symbol__ononloadedmetadatapatched boolean| __zone_symbol__ononlostpointercapturepatched boolean| __zone_symbol__ononmousedownpatched boolean| __zone_symbol__ononmouseenterpatched boolean| __zone_symbol__ononmouseleavepatched boolean| __zone_symbol__ononmousemovepatched boolean| __zone_symbol__ononmouseoutpatched boolean| __zone_symbol__ononmouseoverpatched boolean| __zone_symbol__ononmouseuppatched boolean| __zone_symbol__ononmousewheelpatched boolean| __zone_symbol__ononpausepatched boolean| __zone_symbol__ononplaypatched boolean| __zone_symbol__ononplayingpatched boolean| __zone_symbol__ononpointercancelpatched boolean| __zone_symbol__ononpointerdownpatched boolean| __zone_symbol__ononpointerenterpatched boolean| __zone_symbol__ononpointerleavepatched boolean| __zone_symbol__ononpointermovepatched boolean| __zone_symbol__ononpointeroverpatched boolean| __zone_symbol__ononpointeruppatched boolean| __zone_symbol__ononprogresspatched boolean| __zone_symbol__ononratechangepatched boolean| __zone_symbol__ononresetpatched boolean| __zone_symbol__ononresizepatched boolean| __zone_symbol__ononscrollpatched boolean| __zone_symbol__ononseekedpatched boolean| __zone_symbol__ononseekingpatched boolean| __zone_symbol__ononselectpatched boolean| __zone_symbol__ononselectionchangepatched boolean| __zone_symbol__ononselectstartpatched boolean| __zone_symbol__ononstalledpatched boolean| __zone_symbol__ononsubmitpatched boolean| __zone_symbol__ononsuspendpatched boolean| __zone_symbol__onontimeupdatepatched boolean| __zone_symbol__ononvolumechangepatched boolean| __zone_symbol__onontransitioncancelpatched boolean| __zone_symbol__onontransitionendpatched boolean| __zone_symbol__ononwaitingpatched boolean| __zone_symbol__ononwheelpatched boolean| __zone_symbol__onontogglepatched boolean| __zone_symbol__ononafterprintpatched boolean| __zone_symbol__ononappinstalledpatched boolean| __zone_symbol__ononbeforeinstallpromptpatched boolean| __zone_symbol__ononbeforeprintpatched boolean| __zone_symbol__ononbeforeunloadpatched boolean| __zone_symbol__onondevicemotionpatched boolean| __zone_symbol__onondeviceorientationpatched boolean| __zone_symbol__onondeviceorientationabsolutepatched boolean| __zone_symbol__ononhashchangepatched boolean| __zone_symbol__ononlanguagechangepatched boolean| __zone_symbol__ononmessagepatched boolean| __zone_symbol__ononofflinepatched boolean| __zone_symbol__onononlinepatched boolean| __zone_symbol__ononpageshowpatched boolean| __zone_symbol__ononpagehidepatched boolean| __zone_symbol__ononpopstatepatched boolean| __zone_symbol__ononrejectionhandledpatched boolean| __zone_symbol__ononstoragepatched boolean| __zone_symbol__ononunhandledrejectionpatched boolean| __zone_symbol__ononunloadpatched boolean| __zone_symbol__onondragstartpatched boolean| __zone_symbol__ononanimationstartpatched boolean| __zone_symbol__ononsearchpatched boolean| __zone_symbol__onontransitionrunpatched boolean| __zone_symbol__onontransitionstartpatched boolean| __zone_symbol__ononwebkitanimationendpatched boolean| __zone_symbol__ononwebkitanimationiterationpatched boolean| __zone_symbol__ononwebkitanimationstartpatched boolean| __zone_symbol__ononwebkittransitionendpatched boolean| __zone_symbol__ononpointeroutpatched boolean| __zone_symbol__ononmessageerrorpatched object| thePicker object| webpackJsonp object| ngDevMode boolean| ngI18nClosureMode function| $localize object| __zone_symbol__loadfalse object| process object| bitwardenContainerService object| ng object| __zone_symbol__popstatefalse object| __zone_symbol__hashchangefalse function| __zone_symbol__addEventListener function| __zone_symbol__removeEventListener undefined| __zone_symbol__eventListeners undefined| __zone_symbol__removeAllListeners function| eventListeners function| removeAllListeners

0 Cookies

2 Console Messages

Source Level URL
Text
console-api error URL: https://auth.alton.family/app/vendor.432d5892f7c760eda0bb.js(Line 2)
Message:
ERROR TypeError: Cannot read property 'getItem' of null
console-api error URL: https://auth.alton.family/app/polyfills.432d5892f7c760eda0bb.js(Line 2)
Message:
Unhandled Promise rejection: Cannot read property 'getItem' of null ; Zone: <root> ; Task: Promise.then ; Value: TypeError: Cannot read property 'getItem' of null TypeError: Cannot read property 'getItem' of null at e.get (https://auth.alton.family/app/main.432d5892f7c760eda0bb.js:1:2539902) at e.<anonymous> (https://auth.alton.family/app/main.432d5892f7c760eda0bb.js:1:2539401) at https://auth.alton.family/app/main.432d5892f7c760eda0bb.js:1:2538352 at Object.next (https://auth.alton.family/app/main.432d5892f7c760eda0bb.js:1:2538457) at https://auth.alton.family/app/main.432d5892f7c760eda0bb.js:1:2537369 at new t (https://auth.alton.family/app/polyfills.432d5892f7c760eda0bb.js:2:142599) at r (https://auth.alton.family/app/main.432d5892f7c760eda0bb.js:1:2537114) at e.init (https://auth.alton.family/app/main.432d5892f7c760eda0bb.js:1:2539304) at Object.<anonymous> (https://auth.alton.family/app/main.432d5892f7c760eda0bb.js:1:2532221) at https://auth.alton.family/app/main.432d5892f7c760eda0bb.js:1:2529183 at Object.next (https://auth.alton.family/app/main.432d5892f7c760eda0bb.js:1:2529288) at https://auth.alton.family/app/main.432d5892f7c760eda0bb.js:1:2528200 at new t (https://auth.alton.family/app/polyfills.432d5892f7c760eda0bb.js:2:142599) at r (https://auth.alton.family/app/main.432d5892f7c760eda0bb.js:1:2527945) at Array.<anonymous> (https://auth.alton.family/app/main.432d5892f7c760eda0bb.js:1:2532107) at Xv.runInitializers (https://auth.alton.family/app/vendor.432d5892f7c760eda0bb.js:2:238124) at https://auth.alton.family/app/vendor.432d5892f7c760eda0bb.js:2:250334 at https://auth.alton.family/app/vendor.432d5892f7c760eda0bb.js:2:250138 at https://auth.alton.family/app/vendor.432d5892f7c760eda0bb.js:2:250287 at t.invoke (https://auth.alton.family/app/polyfills.432d5892f7c760eda0bb.js:2:131164) at Object.onInvoke (https://auth.alton.family/app/vendor.432d5892f7c760eda0bb.js:2:242071) at t.invoke (https://auth.alton.family/app/polyfills.432d5892f7c760eda0bb.js:2:131104) at e.run (https://auth.alton.family/app/polyfills.432d5892f7c760eda0bb.js:2:126260) at zk.run (https://auth.alton.family/app/vendor.432d5892f7c760eda0bb.js:2:242766) at aw.bootstrapModuleFactory (https://auth.alton.family/app/vendor.432d5892f7c760eda0bb.js:2:249745) at https://auth.alton.family/app/vendor.432d5892f7c760eda0bb.js:2:250543 at t.invoke (https://auth.alton.family/app/polyfills.432d5892f7c760eda0bb.js:2:131164) at e.run (https://auth.alton.family/app/polyfills.432d5892f7c760eda0bb.js:2:126260) at https://auth.alton.family/app/polyfills.432d5892f7c760eda0bb.js:2:142327 at t.invokeTask (https://auth.alton.family/app/polyfills.432d5892f7c760eda0bb.js:2:131848) at e.runTask (https://auth.alton.family/app/polyfills.432d5892f7c760eda0bb.js:2:126923) at m (https://auth.alton.family/app/polyfills.432d5892f7c760eda0bb.js:2:134188)

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.alton.family https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block