www.ampliasecurity.com
Open in
urlscan Pro
155.133.130.34
Public Scan
Submission: On September 22 via manual from US
Summary
TLS certificate: Issued by Gandi Standard SSL CA 2 on January 16th 2018. Valid for: a year.
This is the only time www.ampliasecurity.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 155.133.130.34 155.133.130.34 | 29169 (GANDI-AS ...) (GANDI-AS Domain name registrar - http://www.gandi.net) | |
13 | 1 |
ASN29169 (GANDI-AS Domain name registrar - http://www.gandi.net, FR)
PTR: xvm-130-34.dc3.ghst.net
www.ampliasecurity.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
ampliasecurity.com
www.ampliasecurity.com |
2 MB |
13 | 1 |
Domain | Requested by | |
---|---|---|
13 | www.ampliasecurity.com |
www.ampliasecurity.com
|
13 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.youtube.com |
youtu.be |
www.twitter.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.ampliasecurity.com Gandi Standard SSL CA 2 |
2018-01-16 - 2019-01-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.ampliasecurity.com/research/windows-credentials-editor/
Frame ID: 81E6CA41A5E6E8E38486E81005FB6FA4
Requests: 13 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
Page Statistics
7 Outgoing links
These are links going to different origins than the main page.
Title: Exploiting BASH Remote Code Execution Vulnerability (CVE-2014-6271)
Search URL Search Domain Scan URL
Title: Exploiting MySQL Authentication Bypass Vulnerability (CVE-2012-2122)
Search URL Search Domain Scan URL
Title: Exploiting Apache Struts ExceptionDelegator Vulnerability (CVE-2012-0391)
Search URL Search Domain Scan URL
Title: ASP.NET Padding Oracle attack PoC exploit video
Search URL Search Domain Scan URL
Title: Using GTT to download files from an isolated Citrix environment
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.ampliasecurity.com/research/windows-credentials-editor/ |
24 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontello.css
www.ampliasecurity.com/libs/fontello/css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
www.ampliasecurity.com/libs/font-awesome/css/ |
21 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
www.ampliasecurity.com/assets/css/ |
140 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
www.ampliasecurity.com/assets/css/ |
13 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-amplia_security.png
www.ampliasecurity.com/assets/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.png
www.ampliasecurity.com/assets/images/ |
2 MB 2 MB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
www.ampliasecurity.com/libs/ |
94 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
www.ampliasecurity.com/assets/js/ |
31 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
amplia.js
www.ampliasecurity.com/assets/js/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-Semibold-webfont.woff
www.ampliasecurity.com/assets/fonts/ |
19 KB 20 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-Light-webfont.woff
www.ampliasecurity.com/assets/fonts/ |
19 KB 19 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff
www.ampliasecurity.com/libs/font-awesome/fonts/ |
64 KB 64 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| jQuery111108890748206503940 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
X-Content-Type-Options | nosniff |
X-Frame-Options | DENY |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.ampliasecurity.com
155.133.130.34
0fb1bbca73646e8e2b93c82e8d8b219647b13d4b440c48e338290b9a685b8de1
199411f659f41aaccb959bacb1b0de30e54f244352a48c6f9894e65ae0f8a9a1
23f804ca09ed823f504f3d6e312b109ebfc43a0d7e2f3c2fb98d5f55068ed0dd
24cc29533598f962823c4229bc280487646a27a42a95257c31de1b9b18f3710f
25587c4f1d25386f86e45ca5b68985faa54e804757662e1d5f966468f360613d
36e831e11429dd412752f8dbb2ca9c49e40e2b3e4afdcc1854332cffe2f71a42
533076c09e051889644171af030b5b2806e4277e311a0f2019f2440c97b70ee3
5dacdd51a17dcfc2638e94e55c2f310c6686a07c37102ab084915fdf33d1b1b0
5e809b51ea3562043fe32dd911ff1efae11066c7197c0802e5aba12a49ad77e7
87981e8062814ca279922ee55276ad14bbdc29649f98e34b2d83c3afb5052a51
a9304ab4ab6e2e9b1f2d3eaa82e18f631dea6f5f5c1c56a8941d98d0dfb02238
ac6d788ce5925786b158783dbaf90796a9f72f80f29118413a4c70b5d49bee8f
cfdb7870ec5fcb2667869d28177e5f1f00fc8e9404f6c6dda684cb64b50ae77d