op.pe
Open in
urlscan Pro
34.206.253.53
Public Scan
Effective URL: https://op.pe/874fd
Submission: On December 30 via manual from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on November 16th 2018. Valid for: 3 months.
This is the only time op.pe was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 52.22.34.127 52.22.34.127 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
5 | 34.206.253.53 34.206.253.53 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
5 | 1 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-22-34-127.compute-1.amazonaws.com
op.pe |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-34-206-253-53.compute-1.amazonaws.com
op.pe |
Domain | Requested by | |
---|---|---|
6 | op.pe |
1 redirects
op.pe
|
5 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
github.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
op.pe Let's Encrypt Authority X3 |
2018-11-16 - 2019-02-14 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://op.pe/874fd
Frame ID: 0F4E8FC2EEF044F96463A9844CD05C2E
Requests: 5 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://op.pe/874fd
HTTP 302
https://op.pe/874fd Page URL
Detected technologies
Erlang (Programming Languages) ExpandDetected patterns
- headers server /Cowboy/i
Cowboy (Web Frameworks) Expand
Detected patterns
- headers server /Cowboy/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: GitHub
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://op.pe/874fd
HTTP 302
https://op.pe/874fd Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
874fd
op.pe/ Redirect Chain
|
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.min.css
op.pe/ |
117 KB 117 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LondrinaOutline-Regular.woff2
op.pe/fonts/Londrina_Outline/ |
34 KB 34 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LondrinaSolid-Regular.woff2
op.pe/fonts/Londrina_Solid/ |
20 KB 20 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glyphicons-halflings-regular.woff2
op.pe/fonts/ |
18 KB 18 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
op.pe
34.206.253.53
52.22.34.127
12a56976fc717d031e55babfd50b03a2030f0a88006ab71c78b8ce6d370f5915
4d2fd496a25d15ce75b3f503bf3661d3a1e1d286359ff3383badc83440de80e1
9bcc8aaac97f0d722da13225b7dc459ffce68030bd4db1df1073fbb2e24bd0ca
c8e223f73158865fc665cb3bec0636b0f1458940b28d24debe4009121570f621
fe185d11a49676890d47bb783312a0cda5a44c4039214094e7957b4c040ef11c