pyload-ext.hlsnk.duckdns.org
Open in
urlscan Pro
95.216.136.89
Public Scan
Effective URL: https://pyload-ext.hlsnk.duckdns.org/login
Submission Tags: krdtest
Submission: On January 21 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on January 19th 2022. Valid for: 3 months.
This is the only time pyload-ext.hlsnk.duckdns.org was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 15 | 95.216.136.89 95.216.136.89 | 24940 (HETZNER-AS) (HETZNER-AS) | |
15 | 2 |
ASN24940 (HETZNER-AS, DE)
PTR: static.89.136.216.95.clients.your-server.de
pyload-ext.hlsnk.duckdns.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
duckdns.org
1 redirects
pyload-ext.hlsnk.duckdns.org |
127 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | pyload-ext.hlsnk.duckdns.org |
1 redirects
pyload-ext.hlsnk.duckdns.org
|
15 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
tampermonkey.net |
Subject Issuer | Validity | Valid | |
---|---|---|---|
hlsnk.duckdns.org R3 |
2022-01-19 - 2022-04-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://pyload-ext.hlsnk.duckdns.org/login
Frame ID: 57A88C87AC6C813D0A8C71C5948EAEF5
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
Login - pyLoad WebinterfacePage URL History Show full URLs
-
https://pyload-ext.hlsnk.duckdns.org/
HTTP 303
https://pyload-ext.hlsnk.duckdns.org/login Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- jquery-ui[.-]([\d.]*\d)[^/]*\.js
- jquery-ui.*\.js
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Tampermonkey
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://pyload-ext.hlsnk.duckdns.org/
HTTP 303
https://pyload-ext.hlsnk.duckdns.org/login Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login
pyload-ext.hlsnk.duckdns.org/ Redirect Chain
|
13 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
pyload-ext.hlsnk.duckdns.org/media/pyplex/css/ |
114 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.12.1.min.css
pyload-ext.hlsnk.duckdns.org/media/pyplex/css/ |
17 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
pyload-ext.hlsnk.duckdns.org/media/pyplex/css/ |
9 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ajax-loader.gif
pyload-ext.hlsnk.duckdns.org/media/pyplex/img/ |
404 B 629 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pyload-logo.png
pyload-ext.hlsnk.duckdns.org/media/pyplex/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pyload.png
pyload-ext.hlsnk.duckdns.org/media/pyplex/img/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.2.1.min.js
pyload-ext.hlsnk.duckdns.org/media/js/pyplex/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.12.1.min.js
pyload-ext.hlsnk.duckdns.org/media/js/pyplex/ |
72 KB 19 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.peekabar.min.js
pyload-ext.hlsnk.duckdns.org/media/js/pyplex/ |
2 KB 966 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
pyload-ext.hlsnk.duckdns.org/media/js/pyplex/ |
35 KB 9 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
base.js
pyload-ext.hlsnk.duckdns.org/media/js/pyplex/ |
17 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glyphicons-halflings-regular.woff2
pyload-ext.hlsnk.duckdns.org/media/pyplex/fonts/ |
18 KB 18 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
status
pyload-ext.hlsnk.duckdns.org/json/ |
730 B 571 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST |
status
pyload-ext.hlsnk.duckdns.org/json/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- pyload-ext.hlsnk.duckdns.org
- URL
- https://pyload-ext.hlsnk.duckdns.org/json/status
Verdicts & Comments Add Verdict or Comment
21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| $ function| jQuery boolean| desktopNotifications object| interactiveCaptchaHandlerInstance function| indicateLoad function| indicateFinish function| indicateSuccess function| indicateFail function| humanFileSize function| parseUri function| getScrollBarHeight function| LoadJsonToContent function| set_captcha function| load_captcha function| captcha_reset_default function| clear_captcha function| submit_captcha function| submit_positional_captcha function| submit_interactive_captcha function| interactiveCaptchaHandler0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
pyload-ext.hlsnk.duckdns.org
pyload-ext.hlsnk.duckdns.org
95.216.136.89
19441575d0cd327ae32b424ae7278317d42d23ad4ab71a23ea839447e4d43c0a
217d1b91669dd4a21ce0cff140d526b43a3ac1ea5caa5578d5372fde00dadf1d
2865366ba1eecbb5809ca0153556c36a31697b574559ad68b9e16b128a207f3b
39646863a414e0a84920b3a8639c0f3e8c94535e8dc051b42b485a068dc2902f
3a789a30975ea4fd382e9e8cbe52ae7fac948e5475f2bc3b58161df8b81ebdf9
6d81b59a29da9134564b9dd79175980074846e99950e9545ad8b7945d5f95d52
75c6f1cea31d7ab1a3037274456287267832ce37461ba16c10f650cdd2f4cd7d
779c3d2f778d3d8f6c1309b755abed738e2ddda2aeabec21618b3fc54f1e05e8
ba3fe63eac33e099b1600d123a80bc075696219926d63f6adc4b9401aad71ca9
c8eeec83fe8bf655eeeda291466d268770436dde4e3e40416a85d05d3893e892
dcd5b26d090ee8160e92383e2a433726067eccff93067307fd2da8247fd44a16
e65709c68f5c46ccf66ffeb093c735acb4bb5815b9519d8ef7a02300d5c09a6c
eb17e4999b8aab6ae932f9680c36007b2c0c3071a25b3df93d2bd403c854f17a
f534213f0d0d85a9f86aedc8d21df98e01bdb89840b4c056ca35cc9b8c3ed61c