spamflare.com
Open in
urlscan Pro
172.67.163.8
Public Scan
Effective URL: https://spamflare.com/
Submission Tags: falconsandbox
Submission: On August 08 via api from US — Scanned from US
Summary
TLS certificate: Issued by WE1 on June 22nd 2024. Valid for: 3 months.
This is the only time spamflare.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 64.38.239.83 64.38.239.83 | 20454 (SSASN2) (SSASN2) | |
16 | 172.67.163.8 172.67.163.8 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
16 | 1 |
ASN20454 (SSASN2, US)
PTR: s480d.ik2.com
2cfa777f.21.ik2.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
spamflare.com
spamflare.com |
218 KB |
1 |
ik2.com
1 redirects
2cfa777f.21.ik2.com |
335 B |
16 | 2 |
Domain | Requested by | |
---|---|---|
16 | spamflare.com |
spamflare.com
|
1 | 2cfa777f.21.ik2.com | 1 redirects |
16 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
spamflare.com WE1 |
2024-06-22 - 2024-09-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://spamflare.com/
Frame ID: 657E53E89C2C7745F0AAAAA997CCA87D
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
SpamFlarePage URL History Show full URLs
-
http://2cfa777f.21.ik2.com/
HTTP 307
https://2cfa777f.21.ik2.com/ HTTP 301
https://spamflare.com/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://2cfa777f.21.ik2.com/
HTTP 307
https://2cfa777f.21.ik2.com/ HTTP 301
https://spamflare.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
spamflare.com/ Redirect Chain
|
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
spamflare.com/a/bootstrap-3.4.1/css/ |
119 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
26.css
spamflare.com/a/css/ |
13 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
spamflare.com/a/font-awesome-4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SpamFlareLogo.png
spamflare.com/a/images/ |
82 KB 82 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
english.png
spamflare.com/a/images/language/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
french.png
spamflare.com/a/images/language/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
portuguese.png
spamflare.com/a/images/language/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
spanish.png
spamflare.com/a/images/language/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
german.png
spamflare.com/a/images/language/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
italian.png
spamflare.com/a/images/language/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
27.js
spamflare.com/a/js/ |
10 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.1.min.js
spamflare.com/a/jquery/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
spamflare.com/a/bootstrap-3.4.1/js/ |
39 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
glyphicons-halflings-regular.woff2
spamflare.com/a/bootstrap-3.4.1/fonts/ |
18 KB 18 KB |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
spamflare.com/ |
315 B 662 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
24 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| postAJAX function| getAJAX function| getQuarantineData function| getContactConciergeData function| initWhitelistView function| getWhitelistData function| dspWhitelistData function| WL_contact_del function| WL_contact_delete function| dspQuarantineData function| quarantineDetails function| initQuarantineView function| initContactConciergeView function| setLang function| quarantineRelease function| init_wl_add function| init_wl_bulk_add function| dspContactConciergeData function| selectFormRadioBoxes function| toggleConciergeRadio function| showContactConciergeButtons function| approveContactConcierge function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.spamflare.com/ | Name: sfSession Value: i0scubf0ehjaope5e05or0bi3l |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
2cfa777f.21.ik2.com
spamflare.com
172.67.163.8
64.38.239.83
0fd40b1fb7d71ca9e0002d8457bdf00f7c7780641ade61fb7f7f20b125c3c50a
312736983e4d31dd02e145d89e6c51477117367a02cdd679cba6e3d7a0a29783
50437b61b013c668c7b9f4e963298e5f30e2d8d11d1d96c5fe855a7e3d6d969a
678c6d75bd62f4e2f9b411105ea703cae9c1d19960809bef76496ee4772b412d
6d92dfc1700fd38cd130ad818e23bc8aef697f815b2ea5face2b5dfad22f2e11
7882b1fe56ec16311aed154afc1578601c4fad824da307100cbd641b35bec919
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
7af353412d452e818be9d18fb601856084960ecb750813c52f3e745516484197
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
958ee5a440428d863a148182f195306709703f8778158fc3dd5ac9210df79f9c
9ee2fcff6709e4d0d24b09ca0fc56aade12b4961ed9c43fd13b03248bfb57afe
a7db7b365cb1d8f048524639ca2e25e98f6ae785d32c3b70cb5339b04b6d1df5
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
df2eab3c15b22b2ef380c38b9de4ffdef093c48e9c637878b14ab331bcd2303f
e46c9560f6fc2eb1982bb63a8ece5bda607405b75c42db68915310dd3b6ec3dd
fcf999e3ee8eab8fec67d85d7be5f277467f05425e83f1c3b8dc11b233ffb558