powerschool.kaust.edu.sa
Open in
urlscan Pro
109.171.129.32
Public Scan
Effective URL: https://powerschool.kaust.edu.sa/public/
Submission: On April 17 via manual from SA
Summary
TLS certificate: Issued by DigiCert SHA2 High Assurance Server CA on April 20th 2017. Valid for: 3 years.
This is the only time powerschool.kaust.edu.sa was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 74.201.124.110 74.201.124.110 | 12182 (INTERNAP-...) (INTERNAP-2BLK - Internap Network Services Corporation) | |
13 | 109.171.129.32 109.171.129.32 | 50999 (KAUST-AS1) (KAUST-AS1) | |
13 | 1 |
ASN12182 (INTERNAP-2BLK - Internap Network Services Corporation, US)
weblaunch.blifax.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
kaust.edu.sa
powerschool.kaust.edu.sa |
631 KB |
1 |
blifax.com
1 redirects
weblaunch.blifax.com |
262 B |
13 | 2 |
Domain | Requested by | |
---|---|---|
13 | powerschool.kaust.edu.sa |
powerschool.kaust.edu.sa
|
1 | weblaunch.blifax.com | 1 redirects |
13 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.kaust.edu.sa DigiCert SHA2 High Assurance Server CA |
2017-04-20 - 2020-07-18 |
3 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://powerschool.kaust.edu.sa/public/
Frame ID: 12BFECD4A54CA9A6D9F236502F31A8E
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://weblaunch.blifax.com/listener3/redirect?l=45ed6f29-82a7-4a4e-a081-e56db2227f20&id=2dda3700-0b42-e...
HTTP 303
https://powerschool.kaust.edu.sa/public/ Page URL
Detected technologies
Java (Programming Languages) ExpandDetected patterns
- headers server /Apache-Coyote(\/1\.1)?/i
Apache Tomcat (Web Servers) Expand
Detected patterns
- headers server /Apache-Coyote(\/1\.1)?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
- script /jquery-ui(?:-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /jquery-ui(?:-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://weblaunch.blifax.com/listener3/redirect?l=45ed6f29-82a7-4a4e-a081-e56db2227f20&id=2dda3700-0b42-e811-9464-0050568c582d&u=https%3a%2f%2fpowerschool.kaust.edu.sa%2fpublic%2f
HTTP 303
https://powerschool.kaust.edu.sa/public/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
powerschool.kaust.edu.sa/public/ Redirect Chain
|
8 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
screen.css
powerschool.kaust.edu.sa/images/css/ |
240 KB 240 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
customization.css
powerschool.kaust.edu.sa/images/css/ |
52 B 273 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-2.1.3.min.js
powerschool.kaust.edu.sa/scripts/ |
82 KB 83 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.11.2.custom.min.js
powerschool.kaust.edu.sa/scripts/ |
234 KB 234 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
md5.js
powerschool.kaust.edu.sa/admin/javascript/ |
21 KB 21 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signin-scripts.js
powerschool.kaust.edu.sa/scripts/ |
3 KB 3 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
print.css
powerschool.kaust.edu.sa/images/css/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-caution.svg
powerschool.kaust.edu.sa/images/img/ |
2 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
powerschool-white.svg
powerschool.kaust.edu.sa/images/img/ |
6 KB 6 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
districtlogo.png
powerschool.kaust.edu.sa/images/district-logos/ |
28 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
reset.css
powerschool.kaust.edu.sa/images/css/ |
553 B 775 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ui-bg_flat_75_ffffff_40x100.png
powerschool.kaust.edu.sa/images/img/jquery/ |
208 B 431 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
49 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| $ function| jQuery string| pskey number| hexcase string| b64pad function| hex_md5 function| b64_md5 function| any_md5 function| hex_hmac_md5 function| b64_hmac_md5 function| any_hmac_md5 function| md5_vm_test function| rstr_md5 function| rstr_hmac_md5 function| rstr2hex function| rstr2b64 function| rstr2any function| str2rstr_utf8 function| str2rstr_utf16le function| str2rstr_utf16be function| rstr2binl function| binl2rstr function| binl_md5 function| md5_cmn function| md5_ff function| md5_gg function| md5_hh function| md5_ii function| safe_add function| bit_rol function| doAdminLogin function| doTeacherLogin function| doPCASLogin function| encryptMultipleStudentsAccesPasswords function| encryptSingleStudentAccesPassword function| encryptGuardianPassword function| encryptGuardianPasswords function| encryptRecoverPasswords function| doChangePassword function| getCookie function| deleteCookie function| trim function| $j function| getURLParameter function| translatorRole function| setPageLocale function| jsEnabled function| psModernizer number| hidelogin1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
powerschool.kaust.edu.sa/ | Name: JSESSIONID Value: B4D75BD715508822BB0A7C34E504073B |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
powerschool.kaust.edu.sa
weblaunch.blifax.com
109.171.129.32
74.201.124.110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