4windows.ir
Open in
urlscan Pro
130.185.77.124
Public Scan
Summary
TLS certificate: Issued by R3 on April 17th 2021. Valid for: 3 months.
This is the only time 4windows.ir was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
26 | 130.185.77.124 130.185.77.124 | 60631 (PARVASYSTEM) (PARVASYSTEM) | |
26 | 1 |
ASN60631 (PARVASYSTEM, IR)
PTR: srv.golddata.ir
4windows.ir |
Apex Domain Subdomains |
Transfer | |
---|---|---|
26 |
4windows.ir
4windows.ir |
1 MB |
26 | 1 |
Domain | Requested by | |
---|---|---|
26 | 4windows.ir |
4windows.ir
|
26 | 1 |
Subject Issuer | Validity | Valid | |
---|---|---|---|
4windows.ir R3 |
2021-04-17 - 2021-07-16 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://4windows.ir/
Frame ID: 441AEEF2ED9A530BEB5F78422305108B
Requests: 26 HTTP requests in this frame
Screenshot
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
26 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
4windows.ir/ |
55 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
4windows.ir/assets/school/theme1/css/ |
156 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
4windows.ir/assets/school/theme1/css/fonts/ |
71 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
4windows.ir/assets/school/theme1/css/ |
15 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oL5ek_1604561250.png
4windows.ir/uploads/56/school/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Or2KJ_1599291582.jpg
4windows.ir/uploads//user/152/ |
108 KB 109 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
android.png
4windows.ir/assets/school/theme1/img/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
qr-code.png
4windows.ir/assets/school/theme1/img/ |
962 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
whatsapp.png
4windows.ir/assets/school/theme1/img/ |
33 KB 34 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
4windows.ir/assets/school/theme1/js/ |
94 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
4windows.ir/assets/school/theme1/js/ |
59 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4QkgD_1604561513.jpg
4windows.ir/uploads/56/school/ |
231 KB 233 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
qmaK8_1604562595.png
4windows.ir/uploads/56/course/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
QoTZI_1604562167.png
4windows.ir/uploads/56/course/ |
56 KB 57 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vlPTo_1604561700.png
4windows.ir/uploads/56/course/ |
49 KB 49 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
course.jpg
4windows.ir/assets/f_assets/images/ |
30 KB 30 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iranyekanwebbold.woff
4windows.ir/assets/fonts/woff/ |
34 KB 34 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iranyekanwebregular.woff
4windows.ir/assets/fonts/woff/ |
34 KB 34 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-solid-900.woff2
4windows.ir/assets/school/theme1/css/webfonts/ |
78 KB 79 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iranyekanweblight.woff
4windows.ir/assets/fonts/woff/ |
34 KB 35 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-regular-400.woff2
4windows.ir/assets/school/theme1/css/webfonts/ |
13 KB 13 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iranyekanwebthin.woff
4windows.ir/assets/fonts/woff/ |
35 KB 35 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iranyekanwebmedium.woff
4windows.ir/assets/fonts/woff/ |
35 KB 35 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-brands-400.woff2
4windows.ir/assets/school/theme1/css/webfonts/ |
76 KB 76 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iranyekanwebblack.woff
4windows.ir/assets/fonts/woff/ |
34 KB 34 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bkVBP_1604561513.jpg
4windows.ir/uploads/56/school/ |
255 KB 257 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
35 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated number| countDownDate_2234 number| x_2234 number| countDownDate_2225 number| x_2225 number| countDownDate_2224 number| x_2224 number| countDownDate_2226 number| x_2226 number| countDownDate_2227 number| x_2227 number| countDownDate_2236 number| x_2236 function| $ function| jQuery object| bootstrap object| jQuery111303080769944082826 function| setCookie function| getCookie string| featured_courses string| free_courses string| new_courses string| bestseller_courses string| vr_courses object| target_courses_div2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
4windows.ir/ | Name: ostadionline_session Value: eyJpdiI6Ii9vWm9QWHM2NHR0TnhtMGpkNFZZQkE9PSIsInZhbHVlIjoiTTc2ajJTZjNWTU9qVlJOTHVHRlN2TWpGeEd0ZUZZNUtneFRYMEJmbTZGVit0S0RMeVp3ZmsvMDdxcVdqZ1ZPZUU2a29zcS9tcnhWS29DNk9VbWZ5TzVuMFZOSDBjVDFudUJGOFova3haMjFld2t3eGpJaThVQTRaa1RpLzJlVkUiLCJtYWMiOiJlNWJiNzgzMWJmMDIyNTIyYTRiYmFmZThiN2E0NTc5ZTA1NmUzNDc0NDExYjlmNThmMmVlZmZlYmQxNDJkNjhiIn0%3D |
|
4windows.ir/ | Name: XSRF-TOKEN Value: eyJpdiI6IlZqV2JWaHJjbDBKMGI0S216WktVYmc9PSIsInZhbHVlIjoiSXVWOEc0amxad0k4MkxVQUtNUG5Lb2JDd0p6M1M5Yk1OcmwxRmREUDRzWk94OXgyS0p3TmQvL0d3RkF4MVlpYjVaY0wvL1hHM2JDeTA1RmZDTlhPOWxpUmFBQktWbHpMZWl1STJTUFNPRFp2L1pjVUpORm5MWXlMYTFRRndwZHYiLCJtYWMiOiIwYjM4Y2NhMmY0M2FjYzhhMzM0NDk3ZTRlOGUwOTEyMDY4MWJhM2UwNmI0NzQ0ZmEwZjE2Y2JmOGFjNjg1MjAzIn0%3D |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
4windows.ir
130.185.77.124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