fpdownload2.macromedia.com Open in urlscan Pro
2a02:26f0:3500:11::215:14d0  Public Scan

Submitted URL: https://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Effective URL: https://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
Submission: On October 09 via manual from PL — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2a02:26f0:3500:11::215:14d0, located in Frankfurt am Main, Germany and belongs to AKAMAI-ASN1, NL. The main domain is fpdownload2.macromedia.com. The Cisco Umbrella rank of the primary domain is 3619.
TLS certificate: Issued by DigiCert TLS RSA SHA256 2020 CA1 on June 28th 2022. Valid for: a year.
This is the only time fpdownload2.macromedia.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Downloads These files were downloaded by the website

MIME: Microsoft Cabinet archive data, 222832 bytes, 2 files
Size: 225 KB (230624 bytes, 100% done)
Downloaded from: https://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab

Domain & IP information

IP Address AS Autonomous System
1 1 2a02:26f0:350... 20940 (AKAMAI-ASN1)
1 2a02:26f0:350... 20940 (AKAMAI-ASN1)
1 1
Apex Domain
Subdomains
Transfer
2 macromedia.com
download.macromedia.com — Cisco Umbrella Rank: 64933
fpdownload2.macromedia.com — Cisco Umbrella Rank: 3619
106 B
1 1
Domain Requested by
1 fpdownload2.macromedia.com
1 download.macromedia.com 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid
a248.e.akamai.net
DigiCert TLS RSA SHA256 2020 CA1
2022-06-28 -
2023-06-30
a year crt.sh

This page contains 1 frames:

Primary Page: https://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
Frame ID: F32A9836234AF03A254A1BEE93B93A97
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

Page Statistics

1
Requests

0 %
HTTPS

100 %
IPv6

1
Domains

2
Subdomains

1
IPs

1
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.


Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request swflash.cab
fpdownload2.macromedia.com/get/shockwave/cabs/flash/
Redirect Chain
  • https://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
  • https://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
0
0
Document
General
Full URL
https://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a02:26f0:3500:11::215:14d0 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Apache /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.91 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Accept-Ranges
bytes
Alt-Svc
h3-Q050=":443"; ma=93600,quic=":443"; ma=93600; v="46,43"
Connection
keep-alive
Content-Length
230624
Content-Type
application/vnd.ms-cab-compressed
Date
Sun, 09 Oct 2022 12:23:12 GMT
ETag
"384e0-5b5f2605114af"
Last-Modified
Tue, 08 Dec 2020 11:38:06 GMT
Server
Apache

Redirect headers

content-length
0
date
Sun, 09 Oct 2022 12:23:12 GMT
location
https://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
server
AkamaiGHost

Verdicts & Comments Add Verdict or Comment

7 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

download.macromedia.com
fpdownload2.macromedia.com
2a02:26f0:3500:11::215:14d0
2a02:26f0:3500:592::365a