45.59.118.42
Open in
urlscan Pro
45.59.118.42
Public Scan
Submission: On July 17 via manual from TW — Scanned from DE
Summary
This is the only time 45.59.118.42 was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 45.59.118.42 45.59.118.42 | 14956 (ROUTERHOS...) (ROUTERHOSTING) | |
13 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 | 0 |
Domain | Requested by | |
---|---|---|
13 | 0 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://45.59.118.42/owa/auth/expiredpassword.php
Frame ID: 0910EF7B96AD46848D2DF094CDBDE186
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Outlook Web AppPage URL History Show full URLs
-
http://45.59.118.42/owa/auth/expiredpassword.php
HTTP 307
https://45.59.118.42/owa/auth/expiredpassword.php HTTP 307
http://45.59.118.42/owa/auth/expiredpassword.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://45.59.118.42/owa/auth/expiredpassword.php
HTTP 307
https://45.59.118.42/owa/auth/expiredpassword.php HTTP 307
http://45.59.118.42/owa/auth/expiredpassword.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
expiredpassword.php
45.59.118.42/owa/auth/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logon.css
45.59.118.42/owa/auth/owa.auth.expiredpassword.airforce_files/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
owafont.css
45.59.118.42/owa/auth/owa.auth.expiredpassword.airforce_files/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lgntopl.gif
45.59.118.42/owa/auth/owa.auth.expiredpassword.airforce_files/ |
12 KB 13 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lgntopr.gif
45.59.118.42/owa/auth/owa.auth.expiredpassword.airforce_files/ |
2 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lgnexlogo.gif
45.59.118.42/owa/auth/owa.auth.expiredpassword.airforce_files/ |
841 B 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lgnbotl.gif
45.59.118.42/owa/auth/owa.auth.expiredpassword.airforce_files/ |
23 KB 23 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lgnbotr.gif
45.59.118.42/owa/auth/owa.auth.expiredpassword.airforce_files/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lgntopm.gif
45.59.118.42/owa/auth/owa.auth.expiredpassword.airforce_files/ |
501 B 785 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lgnleft.gif
45.59.118.42/owa/auth/owa.auth.expiredpassword.airforce_files/ |
465 B 749 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lgnright.gif
45.59.118.42/owa/auth/owa.auth.expiredpassword.airforce_files/ |
510 B 794 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lgnbotm.gif
45.59.118.42/owa/auth/owa.auth.expiredpassword.airforce_files/ |
521 B 806 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
45.59.118.42/ |
274 B 490 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
45.59.118.42
4407859ec7901e8020b9bdf557101222ee098b34da893d6a880e4bfd7b25e157
4ed581c18762d9b865e62d582979b26226bbdf56137b93005d1af6e7e73c8512
5a8a50bbfec3340a13879de71a5dbe889eca252ac9cfb523c6cea94f05b7b673
5e283cb72a998c5e968aaf4cc8716cad7f9716f4d4469acb33e68159a7daed71
667bfe91e87f17a493f17d6f0bcbcac664b66936ce61210da93c009532e97587
69ee68e79ca0e135459cf435e243fde4558458475de9ae748493f482af66e3a9
732efb3f5df1ca7e12f6308e1d59eeb77af291174004c2135ff907832339b102
77bdb749feb3b2871563093e2185bf50e10cfab8f7953e99e373dd573ecd5903
843d1de5dc833f8d30a6434264d495ced8f2274811d236d2f3db493e6d7681df
e82172c3d476f5c9a7d2f5d6cb3f91046c05a342db007e89f5ec1f08d90e0a59
eeaf80e630285b8742c5d1231eb871c72cdcfc38fb759ba8a7a6a312d26eeac1
f7c7299439660c248f51d73aeaa6f659edb0b4159a02260f571fa6d1c0bffe47
f8303194c7771a4f47551c1769dae5469ea3d536cdf0b1a2533303c9d77ade06