app.connect.jllt.com
Open in
urlscan Pro
130.35.99.110
Public Scan
Submission: On December 06 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 3rd 2023. Valid for: 3 months.
This is the only time app.connect.jllt.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 3 | 130.35.99.110 130.35.99.110 | 31898 (ORACLE-BM...) (ORACLE-BMC-31898) | |
6 | 23.15.178.203 23.15.178.203 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 23.212.110.187 23.212.110.187 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 3 | 147.154.46.112 147.154.46.112 | 31898 (ORACLE-BM...) (ORACLE-BMC-31898) | |
10 | 4 |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a23-15-178-203.deploy.static.akamaitechnologies.com
images.connect.jllt.com |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a23-212-110-187.deploy.static.akamaitechnologies.com
images.discover.jll.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
jllt.com
2 redirects
app.connect.jllt.com images.connect.jllt.com |
108 KB |
3 |
eloqua.com
1 redirects
s330532268.t.eloqua.com |
2 KB |
1 |
jll.com
images.discover.jll.com |
1 KB |
10 | 3 |
Domain | Requested by | |
---|---|---|
6 | images.connect.jllt.com |
app.connect.jllt.com
|
3 | s330532268.t.eloqua.com |
1 redirects
app.connect.jllt.com
|
3 | app.connect.jllt.com | 2 redirects |
1 | images.discover.jll.com |
app.connect.jllt.com
|
10 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.jllt.com |
www.facebook.com |
twitter.com |
www.linkedin.com |
connect.jllt.com |
www.us.jll.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
connect.jllt.com R3 |
2023-10-03 - 2024-01-01 |
3 months | crt.sh |
images.connect.jllt.com R3 |
2023-10-15 - 2024-01-13 |
3 months | crt.sh |
images.interact.jll.com R3 |
2023-12-02 - 2024-03-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://app.connect.jllt.com/e/es?s=330532268&e=55978&elqTrackId=efd74c1a1b7a40299e524d6e5aa03bea&elq=3de55f8bc82f4be5b3bde8966e45ee9f&elqaid=781&elqat=1
Frame ID: EE26D504FBD7A9FEC653C6049952FACD
Requests: 10 HTTP requests in this frame
7 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Unsubscribe or update preferences
Search URL Search Domain Scan URL
Title: Privacy policy
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 7- https://app.connect.jllt.com/e/FooterImages/FooterImage1?elq=3de55f8bc82f4be5b3bde8966e45ee9f&siteid=330532268 HTTP 302
- https://s330532268.t.eloqua.com/e/FooterImages/FooterImage1?elq=3de55f8bc82f4be5b3bde8966e45ee9f&siteid=330532268 HTTP 302
- https://s330532268.t.eloqua.com/e/FooterImages/FooterImage1.aspx?elq=3de55f8bc82f4be5b3bde8966e45ee9f&siteid=330532268&elqCookie=1
- https://app.connect.jllt.com/e/footerimages/fi9?es=55978&s=330532268&u=aHR0cHM6Ly9hcHAuY29ubmVjdC5qbGx0LmNvbS9lL2VzP3M9MzMwNTMyMjY4JmU9NTU5NzgmZWxxVHJhY2tJZD1lZmQ3NGMxYTFiN2E0MDI5OWU1MjRkNmU1YWEwM2JlYSZlbHE9M2RlNTVmOGJjODJmNGJlNWIzYmRlODk2NmU0NWVlOWYmZWxxYWlkPTc4MSZlbHFhdD0x HTTP 302
- https://s330532268.t.eloqua.com/e/footerimages/fi9?es=55978&s=330532268&u=aHR0cHM6Ly9hcHAuY29ubmVjdC5qbGx0LmNvbS9lL2VzP3M9MzMwNTMyMjY4JmU9NTU5NzgmZWxxVHJhY2tJZD1lZmQ3NGMxYTFiN2E0MDI5OWU1MjRkNmU1YWEwM2JlYSZlbHE9M2RlNTVmOGJjODJmNGJlNWIzYmRlODk2NmU0NWVlOWYmZWxxYWlkPTc4MSZlbHFhdD0x
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
es
app.connect.jllt.com/e/ |
19 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
%7B05ae5662-3e9a-4b79-b58e-d6a6b6be2b78%7D_JLLTech_black_red_on_white.png
images.connect.jllt.com/EloquaImages/clients/JLLTechnologies/ |
25 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
%7Ba0da706c-cb94-4256-8b4d-943333afc0a1%7D_blank.png
images.discover.jll.com/EloquaImages/clients/JLL/ |
928 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
%7Bef61f2be-a29b-4de7-b9d7-440d20be2d00%7D_br-engage-iwms-4-600x250.jpg
images.connect.jllt.com/EloquaImages/clients/JLLTechnologies/ |
59 KB 59 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
%7Ba1437e74-d12d-4ff5-8aa7-2838e50b2590%7D_fb-80x80.png
images.connect.jllt.com/EloquaImages/clients/JLLTechnologies/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
%7Bc5a84eeb-bca1-4af4-98fc-3657530a5a05%7D_tw-80x80.png
images.connect.jllt.com/EloquaImages/clients/JLLTechnologies/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
%7Bf0c9aaa9-96ed-417d-9fc9-a9ca58bef9e8%7D_in-80x80.png
images.connect.jllt.com/EloquaImages/clients/JLLTechnologies/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
%7Bafc0fda0-71f8-42a0-9016-403af002bfd7%7D_JLLTech_grey_logo.png
images.connect.jllt.com/EloquaImages/clients/JLLTechnologies/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
FooterImage1.aspx
s330532268.t.eloqua.com/e/FooterImages/ Redirect Chain
|
49 B 448 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fi9
s330532268.t.eloqua.com/e/footerimages/ Redirect Chain
|
49 B 448 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.jllt.com/ | Name: ELOQUA Value: GUID=16366B2DB8514EEB9DBF126215923463 |
|
.jllt.com/ | Name: ELQSTATUS Value: OK |
|
.eloqua.com/ | Name: ELOQUA Value: GUID=C3B6A633BE114650ABDB90113720589C |
|
.eloqua.com/ | Name: ELQSTATUS Value: OK |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
app.connect.jllt.com
images.connect.jllt.com
images.discover.jll.com
s330532268.t.eloqua.com
130.35.99.110
147.154.46.112
23.15.178.203
23.212.110.187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