URL: https://staging.bankfraud.claims/
Submission: On July 22 via api from US — Scanned from DE

Summary

This website contacted 5 IPs in 2 countries across 5 domains to perform 12 HTTP transactions. The main IP is 199.59.243.226, located in United States and belongs to AMAZON-02, US. The main domain is staging.bankfraud.claims.
TLS certificate: Issued by R10 on July 22nd 2024. Valid for: 3 months.
This is the only time staging.bankfraud.claims was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
4 199.59.243.226 16509 (AMAZON-02)
1 216.58.206.36 15169 (GOOGLE)
1 216.58.206.66 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
3 2600:3c02:1::... 63949 (AKAMAI-LI...)
12 5
Apex Domain
Subdomains
Transfer
4 bankfraud.claims
staging.bankfraud.claims
42 KB
3 parklogic.com
parking3.parklogic.com — Cisco Umbrella Rank: 171891
50 KB
3 syndicatedsearch.goog
syndicatedsearch.goog — Cisco Umbrella Rank: 6209
722 B
1 googleadservices.com
partner.googleadservices.com — Cisco Umbrella Rank: 5754
265 B
1 google.com
www.google.com — Cisco Umbrella Rank: 10
76 KB
12 5
Domain Requested by
4 staging.bankfraud.claims staging.bankfraud.claims
3 parking3.parklogic.com staging.bankfraud.claims
parking3.parklogic.com
3 syndicatedsearch.goog www.google.com
1 partner.googleadservices.com www.google.com
1 www.google.com staging.bankfraud.claims
12 5

This site contains no links.

Subject Issuer Validity Valid
staging.bankfraud.claims
R10
2024-07-22 -
2024-10-20
3 months crt.sh
*.google.com
WR2
2024-06-24 -
2024-09-16
3 months crt.sh
*.googleadservices.com
WR2
2024-06-24 -
2024-09-16
3 months crt.sh
syndicatedsearch.goog
WR2
2024-06-24 -
2024-09-16
3 months crt.sh
*.parklogic.com
Sectigo RSA Domain Validation Secure Server CA
2024-01-20 -
2025-02-19
a year crt.sh

This page contains 3 frames:

Primary Page: https://staging.bankfraud.claims/
Frame ID: 9655C9557F6FCF523366C4D7F605FE09
Requests: 8 HTTP requests in this frame

Frame: https://syndicatedsearch.goog/afs/ads?adtest=off&psid=3113057640&pcsa=false&channel=pid-bodis-gcontrol47%2Cpid-bodis-gcontrol312%2Cpid-bodis-gcontrol450%2Cpid-bodis-gcontrol151%2Cpid-bodis-gcontrol202&client=dp-bodis30_3ph&r=m&hl=de&ivt=0&rpbu=https%3A%2F%2Fstaging.bankfraud.claims%2F%3Fcaf%3D1%26bpt%3D345&max_radlink_len=50&type=3&uiopt=false&swp=as-drid-2442788251544177&oe=UTF-8&ie=UTF-8&fexp=21404%2C17300002%2C17301431%2C17301433%2C17301436%2C17301511%2C17301516%2C17301266&format=r3&nocache=8501721652203378&num=0&output=afd_ads&domain_name=staging.bankfraud.claims&v=3&bsl=8&pac=2&u_his=1&u_tz=120&dt=1721652203378&u_w=1600&u_h=1200&biw=1600&bih=1200&psw=1600&psh=1080&frm=0&uio=-&cont=rs&drt=0&jsid=caf&nfp=1&jsv=652824369&rurl=https%3A%2F%2Fstaging.bankfraud.claims%2F
Frame ID: 47C72BBAC44579FE54AB211032906843
Requests: 1 HTTP requests in this frame

Frame: https://parking3.parklogic.com/page/enhance.js?pcId=7&pId=1129&domain=bankfraud.claims
Frame ID: DEC5C3466F6C44E5FB4FBD990EF7E2FF
Requests: 3 HTTP requests in this frame

Screenshot

Page Title

bankfraud.claims

Page URL History Show full URLs

  1. https://staging.bankfraud.claims/ HTTP 307
    https://staging.bankfraud.claims/ Page URL

Page Statistics

12
Requests

100 %
HTTPS

40 %
IPv6

5
Domains

5
Subdomains

5
IPs

2
Countries

168 kB
Transfer

286 kB
Size

2
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://staging.bankfraud.claims/ HTTP 307
    https://staging.bankfraud.claims/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

12 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
staging.bankfraud.claims/
Redirect Chain
  • https://staging.bankfraud.claims/
  • https://staging.bankfraud.claims/
1 KB
2 KB
Document
General
Full URL
https://staging.bankfraud.claims/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
199.59.243.226 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
03c65efdc02175d29e67d88138ec5c002cd16b78ff0f61f6e7f3723e85645c9b

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Accept-Ch
sec-ch-prefers-color-scheme
Cache-Control
no-store, max-age=0
Connection
close
Content-Length
1074
Content-Type
text/html; charset=utf-8
Critical-Ch
sec-ch-prefers-color-scheme
Date
Mon, 22 Jul 2024 12:43:22 GMT
Vary
sec-ch-prefers-color-scheme
X-Adblock-Key
MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_EohXwTtZmoKk6gLlT6Y6AQpFGz1bOmMxqAD3pvNXn4xc1nDRj09CAkQcEVdIrwjLcgQMAIE1MmA5xPU8DUbS9g==
X-Request-Id
a0d340e9-208a-4122-83e5-4784c9c2aaae

Redirect headers

Location
https://staging.bankfraud.claims/
biynqdyQG.js
staging.bankfraud.claims/
33 KB
33 KB
Script
General
Full URL
https://staging.bankfraud.claims/biynqdyQG.js
Requested by
Host: staging.bankfraud.claims
URL: https://staging.bankfraud.claims/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
199.59.243.226 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
b0754afe500a24201f740ed9c023d64483ca9183fa6361d759bb329462d25344

Request headers

Referer
https://staging.bankfraud.claims/
sec-ch-prefers-color-scheme
light
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Date
Mon, 22 Jul 2024 12:43:22 GMT
Connection
close
Content-Length
33929
X-Request-Id
de170d30-68d2-45a6-8f4d-501febb462e3
Content-Type
application/javascript; charset=utf-8
_fd
staging.bankfraud.claims/
6 KB
6 KB
Fetch
General
Full URL
https://staging.bankfraud.claims/_fd
Requested by
Host: staging.bankfraud.claims
URL: https://staging.bankfraud.claims/biynqdyQG.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
199.59.243.226 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
4ec70364c6576ee3c0045292f6529b148d76f9f333a5ddde31ae5e94eb472ff9

Request headers

Accept
application/json
Referer
https://staging.bankfraud.claims/
sec-ch-prefers-color-scheme
light
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Content-Type
application/json

Response headers

Date
Mon, 22 Jul 2024 12:43:22 GMT
Connection
close
Content-Length
6285
X-Request-Id
626b1409-de09-4d8a-89d5-e1802fffca46
Content-Type
application/json; charset=utf-8
caf.js
www.google.com/adsense/domains/
196 KB
76 KB
Script
General
Full URL
https://www.google.com/adsense/domains/caf.js?abp=1&bodis=true
Requested by
Host: staging.bankfraud.claims
URL: https://staging.bankfraud.claims/biynqdyQG.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
216.58.206.36 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
mil07s07-in-f4.1e100.net
Software
sffe /
Resource Hash
d32d8ba62130fba989f6171d248b36beef5799ae0eb484a6a88012af801feff3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://staging.bankfraud.claims/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

date
Mon, 22 Jul 2024 12:43:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/ads-afs-ui
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="ads-afs-ui"
etag
"18237712235520403037"
vary
Accept-Encoding
report-to
{"group":"ads-afs-ui","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-afs-ui"}]}
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
accept-ranges
bytes
link
<https://syndicatedsearch.goog>; rel="preconnect"
expires
Mon, 22 Jul 2024 12:43:23 GMT
cookie.js
partner.googleadservices.com/gampad/
386 B
265 B
Script
General
Full URL
https://partner.googleadservices.com/gampad/cookie.js?domain=staging.bankfraud.claims&client=partner-dp-bodis30_3ph&product=SAS&callback=__sasCookie
Requested by
Host: www.google.com
URL: https://www.google.com/adsense/domains/caf.js?abp=1&bodis=true
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
216.58.206.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
tzfraa-aa-in-f2.1e100.net
Software
cafe /
Resource Hash
54f4b063c35e8ac98b8a958664e38b5370fdf6ee01df23a34b0ca1d0eb005874
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://staging.bankfraud.claims/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

date
Mon, 22 Jul 2024 12:43:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-type
text/javascript; charset=UTF-8
cache-control
private
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
243
x-xss-protection
0
ads
syndicatedsearch.goog/afs/ Frame 47C7
0
0
Document
General
Full URL
https://syndicatedsearch.goog/afs/ads?adtest=off&psid=3113057640&pcsa=false&channel=pid-bodis-gcontrol47%2Cpid-bodis-gcontrol312%2Cpid-bodis-gcontrol450%2Cpid-bodis-gcontrol151%2Cpid-bodis-gcontrol202&client=dp-bodis30_3ph&r=m&hl=de&ivt=0&rpbu=https%3A%2F%2Fstaging.bankfraud.claims%2F%3Fcaf%3D1%26bpt%3D345&max_radlink_len=50&type=3&uiopt=false&swp=as-drid-2442788251544177&oe=UTF-8&ie=UTF-8&fexp=21404%2C17300002%2C17301431%2C17301433%2C17301436%2C17301511%2C17301516%2C17301266&format=r3&nocache=8501721652203378&num=0&output=afd_ads&domain_name=staging.bankfraud.claims&v=3&bsl=8&pac=2&u_his=1&u_tz=120&dt=1721652203378&u_w=1600&u_h=1200&biw=1600&bih=1200&psw=1600&psh=1080&frm=0&uio=-&cont=rs&drt=0&jsid=caf&nfp=1&jsv=652824369&rurl=https%3A%2F%2Fstaging.bankfraud.claims%2F
Requested by
Host: www.google.com
URL: https://www.google.com/adsense/domains/caf.js?abp=1&bodis=true
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
gws /
Resource Hash
Security Headers
Name Value
Content-Security-Policy object-src 'none';base-uri 'self';script-src 'nonce-XKx11fU81Q2Qguo7pJspQg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other
X-Xss-Protection 0

Request headers

Referer
https://staging.bankfraud.claims/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
cache-control
private, max-age=3600
content-disposition
inline
content-encoding
br
content-length
2681
content-security-policy
object-src 'none';base-uri 'self';script-src 'nonce-XKx11fU81Q2Qguo7pJspQg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other
content-type
text/html; charset=UTF-8
cross-origin-opener-policy
same-origin-allow-popups; report-to="gws"
date
Mon, 22 Jul 2024 12:43:23 GMT
expires
Mon, 22 Jul 2024 12:43:23 GMT
report-to
{"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/other"}]}
server
gws
x-xss-protection
0
enhance.js
parking3.parklogic.com/page/ Frame DEC5
2 KB
2 KB
Script
General
Full URL
https://parking3.parklogic.com/page/enhance.js?pcId=7&pId=1129&domain=bankfraud.claims
Requested by
Host: staging.bankfraud.claims
URL: https://staging.bankfraud.claims/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2600:3c02:1::2d4f:f4d1 Atlanta, United States, ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG),
Reverse DNS
Software
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.5.38 / PHP/5.5.38
Resource Hash
d6fef70184ad820642abf14678451438e62a6be1ad86977a658c36ad7cc908ca

Request headers

Referer
https://staging.bankfraud.claims/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

date
Mon, 22 Jul 2024 12:43:23 GMT
server
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.5.38
connection
close
x-powered-by
PHP/5.5.38
transfer-encoding
chunked
content-type
text/javascript;charset=UTF-8
_tr
staging.bankfraud.claims/
2 B
300 B
Fetch
General
Full URL
https://staging.bankfraud.claims/_tr
Requested by
Host: staging.bankfraud.claims
URL: https://staging.bankfraud.claims/biynqdyQG.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
199.59.243.226 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
2689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df

Request headers

Accept
application/json
Referer
https://staging.bankfraud.claims/
sec-ch-prefers-color-scheme
light
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Content-Type
application/json

Response headers

Date
Mon, 22 Jul 2024 12:43:22 GMT
Connection
close
Content-Length
2
X-Request-Id
eade40bc-58c3-4202-bb60-d5debbc80fbb
Content-Type
application/json; charset=utf-8
scribe.php
parking3.parklogic.com/page/ Frame DEC5
47 B
320 B
Fetch
General
Full URL
https://parking3.parklogic.com/page/scribe.php?pcId=7&domain=bankfraud.claims&pId=1129&usid=null&utid=null&query=null&domainJs=staging.bankfraud.claims&path=/&ss=true&lp=1
Requested by
Host: parking3.parklogic.com
URL: https://parking3.parklogic.com/page/enhance.js?pcId=7&pId=1129&domain=bankfraud.claims
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2600:3c02:1::2d4f:f4d1 Atlanta, United States, ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG),
Reverse DNS
Software
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.5.38 / PHP/5.5.38
Resource Hash
71c140e7490a21cda6320509c996c5d77079da8815e5cd2eccd2d41de9a28678

Request headers

Referer
https://staging.bankfraud.claims/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

access-control-allow-origin
*
date
Mon, 22 Jul 2024 12:43:24 GMT
server
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.5.38
connection
close
x-powered-by
PHP/5.5.38
transfer-encoding
chunked
content-type
text/html;charset=UTF-8
hero_nc.svg
parking3.parklogic.com/page/images/pe262/ Frame DEC5
47 KB
47 KB
Image
General
Full URL
https://parking3.parklogic.com/page/images/pe262/hero_nc.svg
Requested by
Host: staging.bankfraud.claims
URL: https://staging.bankfraud.claims/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2600:3c02:1::2d4f:f4d1 Atlanta, United States, ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG),
Reverse DNS
Software
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.5.38 /
Resource Hash
878da09a057ec8f1775cdc522e5f7ec44966df547a87a9c29826ba114833c24b

Request headers

Referer
https://staging.bankfraud.claims/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

date
Mon, 22 Jul 2024 12:43:24 GMT
last-modified
Mon, 08 Mar 2021 23:04:00 GMT
server
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.5.38
etag
"bbe1-5bd0e72fe1800"
content-type
image/svg+xml
connection
close
accept-ranges
bytes
content-length
48097
gen_204
syndicatedsearch.goog/afs/
0
509 B
Image
General
Full URL
https://syndicatedsearch.goog/afs/gen_204?client=dp-bodis30_3ph&output=uds_ads_only&zx=r1d76am2tpir&aqid=61OeZojnHPOxjuwP2f-I8Qg&psid=3113057640&pbt=bs&adbx=450&adby=311&adbh=480&adbw=700&adbah=153%2C153%2C153&adbn=master-1&eawp=partner-dp-bodis30_3ph&errv=652824369&csala=3%7C0%7C166%7C66%7C10&lle=0&ifv=1&hpt=0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
gws /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy object-src 'none';base-uri 'self';script-src 'nonce-eEmI0_HIq2kSL2SZ-weAVQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://staging.bankfraud.claims/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

content-security-policy
object-src 'none';base-uri 'self';script-src 'nonce-eEmI0_HIq2kSL2SZ-weAVQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other
date
Mon, 22 Jul 2024 12:43:25 GMT
server
gws
cross-origin-opener-policy
same-origin-allow-popups; report-to="gws"
x-frame-options
SAMEORIGIN
report-to
{"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/other"}]}
content-type
text/html; charset=UTF-8
permissions-policy
unload=()
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
x-xss-protection
0
gen_204
syndicatedsearch.goog/afs/
0
213 B
Image
General
Full URL
https://syndicatedsearch.goog/afs/gen_204?client=dp-bodis30_3ph&output=uds_ads_only&zx=a21nj28m5an6&aqid=61OeZojnHPOxjuwP2f-I8Qg&psid=3113057640&pbt=bv&adbx=450&adby=311&adbh=480&adbw=700&adbah=153%2C153%2C153&adbn=master-1&eawp=partner-dp-bodis30_3ph&errv=652824369&csala=3%7C0%7C166%7C66%7C10&lle=0&ifv=1&hpt=0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
gws /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy object-src 'none';base-uri 'self';script-src 'nonce-NPaOWGUBWUJSZGhVNQXSyg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://staging.bankfraud.claims/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

content-security-policy
object-src 'none';base-uri 'self';script-src 'nonce-NPaOWGUBWUJSZGhVNQXSyg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other
date
Mon, 22 Jul 2024 12:43:25 GMT
server
gws
cross-origin-opener-policy
same-origin-allow-popups; report-to="gws"
x-frame-options
SAMEORIGIN
report-to
{"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/other"}]}
content-type
text/html; charset=UTF-8
permissions-policy
unload=()
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
0
x-xss-protection
0

Verdicts & Comments Add Verdict or Comment

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 string| park object| version object| __parkour number| googleNDT_ number| googleAltLoader object| google function| __sasCookie

2 Cookies

Domain/Path Name / Value
staging.bankfraud.claims/ Name: parking_session
Value: 55a1df36-a866-4d26-8d10-9d3448aa5179
.bankfraud.claims/ Name: __gsas
Value: ID=ac91911d842813bf:T=1721652203:RT=1721652203:S=ALNI_MYObpnkpnBCk8sif5E3kQQSVQIq2Q