b-avrupacanta.maileon.com
Open in
urlscan Pro
212.6.132.213
Public Scan
Effective URL: https://b-avrupacanta.maileon.com/eagle_kp_webapp/login/login.msa
Submission: On September 18 via manual from LU
Summary
TLS certificate: Issued by Thawte TLS RSA CA G1 on May 4th 2018. Valid for: 2 years.
This is the only time b-avrupacanta.maileon.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 15 | 212.6.132.213 212.6.132.213 | 8426 (CLARANET-...) (CLARANET-AS ClaraNET LTD) | |
13 | 1 |
ASN8426 (CLARANET-AS ClaraNET LTD, GB)
PTR: mta.pf.xqueue.de
b.avrupacanta.com | |
b-avrupacanta.maileon.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
maileon.com
1 redirects
b-avrupacanta.maileon.com |
103 KB |
1 |
avrupacanta.com
1 redirects
b.avrupacanta.com |
217 B |
13 | 2 |
Domain | Requested by | |
---|---|---|
14 | b-avrupacanta.maileon.com |
1 redirects
b-avrupacanta.maileon.com
|
1 | b.avrupacanta.com | 1 redirects |
13 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.certified-senders.eu |
www.ispa.at |
www.eco.de |
www.eugdpr.org |
www.xqueue.de |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.maileon.com Thawte TLS RSA CA G1 |
2018-05-04 - 2020-07-02 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://b-avrupacanta.maileon.com/eagle_kp_webapp/login/login.msa
Frame ID: DC7126112D789EA57E47DBF6E3AAFB03
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://b.avrupacanta.com/
HTTP 301
https://b-avrupacanta.maileon.com/ HTTP 302
https://b-avrupacanta.maileon.com/eagle_kp_webapp/login/login.msa Page URL
Detected technologies
Ubuntu (Operating Systems) ExpandDetected patterns
- headers server /Ubuntu/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
- script /(?:twitter\.github\.com\/bootstrap|bootstrap(?:\.js|\.min\.js))/i
Page Statistics
5 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://b.avrupacanta.com/
HTTP 301
https://b-avrupacanta.maileon.com/ HTTP 302
https://b-avrupacanta.maileon.com/eagle_kp_webapp/login/login.msa Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
login.msa
b-avrupacanta.maileon.com/eagle_kp_webapp/login/ Redirect Chain
|
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.2.1.min.js
b-avrupacanta.maileon.com/eagle_kp_webapp/js/jquery/ |
85 KB 35 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.js
b-avrupacanta.maileon.com/eagle_kp_webapp/js/pages/login/ |
4 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
b-avrupacanta.maileon.com/eagle_kp_webapp/themes/shared/css/bootstrap/4.0.0-beta/ |
122 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mobile.min.css
b-avrupacanta.maileon.com/alternatedocroot_1/53/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_bottom.png
b-avrupacanta.maileon.com/alternatedocroot_1/images/footer/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popper.min.js
b-avrupacanta.maileon.com/eagle_kp_webapp/js/popper/1.11.0/ |
19 KB 8 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
b-avrupacanta.maileon.com/eagle_kp_webapp/js/bootstrap/4.0.0-beta/ |
50 KB 16 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ssl_g.png
b-avrupacanta.maileon.com/alternatedocroot_1/images/footer/certifications/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gdpr_g.png
b-avrupacanta.maileon.com/alternatedocroot_1/images/footer/certifications/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
eco_g.png
b-avrupacanta.maileon.com/alternatedocroot_1/images/footer/certifications/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ispa_g.png
b-avrupacanta.maileon.com/alternatedocroot_1/images/footer/certifications/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
csa_g.png
b-avrupacanta.maileon.com/alternatedocroot_1/images/footer/certifications/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| ff function| insertGetNewPasswordLink function| getNewPasswordInputValidation function| getNewPasswordDialog function| closeGetPasswordDialog function| submitGetPasswordForm function| inputValidation function| createCookie function| readCookie function| eraseCookie function| toogle2FACode function| Popper2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
b-avrupacanta.maileon.com/ | Name: JSESSIONID Value: c5c871eff45f207d8ab44cc95a22 |
|
b-avrupacanta.maileon.com/eagle_kp_webapp | Name: JSESSIONID Value: c5c87286847350b6438abbd8ded2 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
b-avrupacanta.maileon.com
b.avrupacanta.com
212.6.132.213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