cyberintelligence.house.com
Open in
urlscan Pro
2600:9000:26da:2800:18:9602:5580:93a1
Public Scan
Effective URL: https://cyberintelligence.house.com/
Submission: On May 31 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on March 21st 2024. Valid for: a year.
This is the only time cyberintelligence.house.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2600:9000:26d... 2600:9000:26da:2800:18:9602:5580:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
5 | 1 |
ASN16509 (AMAZON-02, US)
cyberintelligence.house.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
house.com
cyberintelligence.house.com |
68 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | cyberintelligence.house.com |
cyberintelligence.house.com
|
5 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.house.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.house.com Amazon RSA 2048 M02 |
2024-03-21 - 2025-04-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://cyberintelligence.house.com/
Frame ID: 812A0EA11B10A02E75B1248247CDEDCA
Requests: 5 HTTP requests in this frame
Screenshot
Page Title
404Page URL History Show full URLs
-
http://cyberintelligence.house.com/
HTTP 307
https://cyberintelligence.house.com/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Return to house.com
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://cyberintelligence.house.com/
HTTP 307
https://cyberintelligence.house.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
cyberintelligence.house.com/ Redirect Chain
|
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
cyberintelligence.house.com/assets/css/ |
21 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cyberintelligence.house.com/assets/css/libs/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
error_01.png
cyberintelligence.house.com/assets/images/part/ |
59 KB 60 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
cyberintelligence.house.com/ |
607 B 987 B |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cyberintelligence.house.com
2600:9000:26da:2800:18:9602:5580:93a1
62e61c1b03755da7fada8527ea9e5c5afb2053485a0b42d242a3298175a8fae8
7ea60c8f9c74f2fcbcbaf7293bd1cbb80062e6ec39053ee306b4a3b23de36653
8a0224a217f56d6531cda41098cb323abbab62e60fa5e8ef66668b7e817b56cb
fb2ac730441a7132684f0617cf6ed95979f84fc71abd567fcac1c8fa83a4b613