URL: https://www.blog.security-breaches.com/
Submission: On November 18 via automatic, source certstream-suspicious — Scanned from FI

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 18 HTTP transactions. The main IP is 185.196.102.116, located in Pori, Finland and belongs to FICOLO Ficolo Oy, FI. The main domain is www.blog.security-breaches.com.
TLS certificate: Issued by E5 on November 18th 2024. Valid for: 3 months.
This is the only time www.blog.security-breaches.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
17 185.196.102.116 49282 (FICOLO Fi...)
18 2
Apex Domain
Subdomains
Transfer
17 security-breaches.com
www.blog.security-breaches.com
64 KB
0 github.com Failed
pvdspek.github.com Failed
18 2
Domain Requested by
17 www.blog.security-breaches.com www.blog.security-breaches.com
0 pvdspek.github.com Failed www.blog.security-breaches.com
18 2

This site contains links to these domains. Also see Links.

Domain
fi.cloudlogin.co
blog.security-breaches.com
Subject Issuer Validity Valid
blog.security-breaches.com
E5
2024-11-18 -
2025-02-16
3 months crt.sh

This page contains 1 frames:

Primary Page: https://www.blog.security-breaches.com/
Frame ID: 6AD4C8809E9E00129510EAA9B496EEE4
Requests: 18 HTTP requests in this frame

Screenshot

Page Title

blog.security-breaches.com

Detected technologies

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

18
Requests

94 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

64 kB
Transfer

165 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

18 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.blog.security-breaches.com/
11 KB
4 KB
Document
General
Full URL
https://www.blog.security-breaches.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
c6c9cf48a8baffd56b3ea967f208061427ae4f5d21c4f2b47256eebbf91e0fa9

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

accept-ranges
bytes
content-encoding
gzip
content-length
3591
content-type
text/html
date
Mon, 18 Nov 2024 12:38:54 GMT
etag
"2d1e-6272f29fbd957-gzip"
last-modified
Mon, 18 Nov 2024 12:36:21 GMT
server
Apache
vary
Accept-Encoding,User-Agent
styles.css
www.blog.security-breaches.com/highly-rated-website-hosting-brand/themes/black-white/
8 KB
1 KB
Stylesheet
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/themes/black-white/styles.css
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
ffb1db3c5b5bba7bda1bffa5bc2e00d7f3dcf206d9a1bfd36a4cba5bba2bfbf5

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/

Response headers

content-encoding
gzip
etag
"1fa6-4c00ed33e6740-gzip"
accept-ranges
bytes
content-length
1435
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Tue, 15 May 2012 08:16:53 GMT
vary
Accept-Encoding,User-Agent
server
Apache
content-type
text/css
style.css
www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/
13 KB
3 KB
Stylesheet
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/style.css
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
c647ad218f6e2c1037b7e91e44e2a0df8e44445ee81fb94aca91977f09ca7566

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/

Response headers

content-encoding
gzip
etag
"344f-4c00e5a6cd680-gzip"
accept-ranges
bytes
content-length
3105
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Tue, 15 May 2012 07:43:06 GMT
vary
Accept-Encoding,User-Agent
server
Apache
content-type
text/css
custom3.css
www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/
2 KB
663 B
Stylesheet
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/custom3.css
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
4a1a5117668ca8f4afe8764e8a852284d9b35673c1616fea4cda7fc33ab95e67

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/

Response headers

content-encoding
gzip
etag
"624-4c00ed33e6740-gzip"
accept-ranges
bytes
content-length
579
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Tue, 15 May 2012 08:16:53 GMT
vary
Accept-Encoding,User-Agent
server
Apache
content-type
text/css
jquery-1.6.2.min.js
www.blog.security-breaches.com/highly-rated-website-hosting-brand/js/
89 KB
31 KB
Script
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/js/jquery-1.6.2.min.js
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
d16d07a0353405fcec95f7efc50a2621bc7425f9a5e8895078396fb0dc460c4f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/

Response headers

content-encoding
gzip
etag
"165a4-4a96f4e8a67c0-gzip"
accept-ranges
bytes
content-length
32003
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Mon, 01 Aug 2011 10:43:51 GMT
vary
Accept-Encoding,User-Agent
server
Apache
content-type
application/javascript
colorbox.css
www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/
5 KB
1 KB
Stylesheet
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/colorbox.css
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
ef75abc651208933e1423d6d7c3bb84d9d16865c8146ffb21bc79f9f4dfe04a3

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/

Response headers

content-encoding
gzip
etag
"1227-4b963d2a87980-gzip"
accept-ranges
bytes
content-length
1370
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Mon, 20 Feb 2012 11:44:54 GMT
vary
Accept-Encoding,User-Agent
server
Apache
content-type
text/css
jquery.colorbox-min.js
www.blog.security-breaches.com/highly-rated-website-hosting-brand/js/
10 KB
4 KB
Script
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/js/jquery.colorbox-min.js
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
49db2dfe9ad8d2492cc8b1b0555d18b5809e7bad6aaff5c8680b3bfb8916e714

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/

Response headers

content-encoding
gzip
etag
"2623-4a96f4e8a67c0-gzip"
accept-ranges
bytes
content-length
4227
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Mon, 01 Aug 2011 10:43:51 GMT
vary
Accept-Encoding,User-Agent
server
Apache
content-type
application/javascript
jquery.tools.min.js
www.blog.security-breaches.com/highly-rated-website-hosting-brand/js/
13 KB
5 KB
Script
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/js/jquery.tools.min.js
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
3ed1671ca75b1d6cafc5ea7fec0eb0b372cc18b7d806b709d02304c5a449f075

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/

Response headers

content-encoding
gzip
etag
"3488-4b963d2a87980-gzip"
accept-ranges
bytes
content-length
4753
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Mon, 20 Feb 2012 11:44:54 GMT
vary
Accept-Encoding,User-Agent
server
Apache
content-type
application/javascript
script.js
www.blog.security-breaches.com/highly-rated-website-hosting-brand/js/
1 KB
692 B
Script
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/js/script.js
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
2adce0d03e98c862cf4eb9bc7d1c6420930a272acf1c26bee9c805fe29edd0e4

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/

Response headers

content-encoding
gzip
etag
"5e6-4a96f4e8a67c0-gzip"
accept-ranges
bytes
content-length
638
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Mon, 01 Aug 2011 10:43:51 GMT
vary
Accept-Encoding,User-Agent
server
Apache
content-type
application/javascript
gradient_dark.png
www.blog.security-breaches.com/highly-rated-website-hosting-brand/themes/black-white/images/
191 B
238 B
Image
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/themes/black-white/images/gradient_dark.png
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/themes/black-white/styles.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
6f5ba49ba1d96a59917ebd33e764a3d2067017afd86509b85bdaa63de42a37c0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/themes/black-white/styles.css

Response headers

etag
"bf-4a96effec1000"
accept-ranges
bytes
content-length
191
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Mon, 01 Aug 2011 10:21:52 GMT
vary
User-Agent
server
Apache
content-type
image/png
shopping-cart-light.png
www.blog.security-breaches.com/highly-rated-website-hosting-brand/themes/black-white/images/
1 KB
1 KB
Image
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/themes/black-white/images/shopping-cart-light.png
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/themes/black-white/styles.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
87e842cb0ff91ecb536e01900b083552aef726d44b2c7a42dc3544e382dc4eb6

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/themes/black-white/styles.css

Response headers

etag
"534-4a96effec1000"
accept-ranges
bytes
content-length
1332
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Mon, 01 Aug 2011 10:21:52 GMT
vary
User-Agent
server
Apache
content-type
image/png
gradient_red.png
www.blog.security-breaches.com/highly-rated-website-hosting-brand/themes/black-white/images/
242 B
289 B
Image
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/themes/black-white/images/gradient_red.png
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/themes/black-white/styles.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
4edb2bcdf54e0e2f2922e5c689ab3b3d2c1ef35658057cbd67e23de19c4155d4

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/themes/black-white/styles.css

Response headers

etag
"f2-4a96effec1000"
accept-ranges
bytes
content-length
242
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Mon, 01 Aug 2011 10:21:52 GMT
vary
User-Agent
server
Apache
content-type
image/png
jquery.autoellipsis-1.0.2.min.js
pvdspek.github.com/downloads/
0
0

controls.png
www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/images/
1 KB
1 KB
Image
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/images/controls.png
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/colorbox.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
34c01d510e0bc7481ac8ff885b7b8db5f8a024b62e8b99eaffea565503255cc2

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/colorbox.css

Response headers

etag
"4e1-4a96f4e8a67c0"
accept-ranges
bytes
content-length
1249
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Mon, 01 Aug 2011 10:43:51 GMT
vary
User-Agent
server
Apache
content-type
image/png
border.png
www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/images/
112 B
159 B
Image
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/images/border.png
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/colorbox.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
11bd83f6446a1b41b0d88ddb2e271fcc9912b210d77f40e34e5e31e1a9af174a

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/colorbox.css

Response headers

etag
"70-4a96f4e8a67c0"
accept-ranges
bytes
content-length
112
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Mon, 01 Aug 2011 10:43:51 GMT
vary
User-Agent
server
Apache
content-type
image/png
loading_background.png
www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/images/
157 B
205 B
Image
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/images/loading_background.png
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/colorbox.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
959eccc6b71befee67657392e7f22be26cab408483657fb32a218fed6ffe016b

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/colorbox.css

Response headers

etag
"9d-4a96f4e8a67c0"
accept-ranges
bytes
content-length
157
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Mon, 01 Aug 2011 10:43:51 GMT
vary
User-Agent
server
Apache
content-type
image/png
loading.gif
www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/images/
9 KB
9 KB
Image
General
Full URL
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/images/loading.gif
Requested by
Host: www.blog.security-breaches.com
URL: https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/colorbox.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
34ef55242fc24c94f0790902c09601d228e9074bf7a1f88c4de6a39b40ce38fa

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/highly-rated-website-hosting-brand/css/colorbox.css

Response headers

etag
"24d3-4a96f4e8a67c0"
accept-ranges
bytes
content-length
9427
date
Mon, 18 Nov 2024 12:38:54 GMT
last-modified
Mon, 01 Aug 2011 10:43:51 GMT
vary
User-Agent
server
Apache
content-type
image/gif
favicon.ico
www.blog.security-breaches.com/
315 B
365 B
Other
General
Full URL
https://www.blog.security-breaches.com/favicon.ico
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.196.102.116 Pori, Finland, ASN49282 (FICOLO Ficolo Oy, FI),
Reverse DNS
Software
Apache /
Resource Hash
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Referer
https://www.blog.security-breaches.com/

Response headers

content-length
315
date
Mon, 18 Nov 2024 12:38:54 GMT
content-type
text/html; charset=iso-8859-1
server
Apache

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
pvdspek.github.com
URL
http://pvdspek.github.com/downloads/jquery.autoellipsis-1.0.2.min.js

Verdicts & Comments Add Verdict or Comment

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery

0 Cookies

2 Console Messages

Source Level URL
Text
security error URL: https://www.blog.security-breaches.com/
Message:
Mixed Content: The page at 'https://www.blog.security-breaches.com/' was loaded over HTTPS, but requested an insecure script 'http://pvdspek.github.com/downloads/jquery.autoellipsis-1.0.2.min.js'. This request has been blocked; the content must be served over HTTPS.
network error URL: https://www.blog.security-breaches.com/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()