jcsgt.codesandbox.io
Open in
urlscan Pro
2606:4700::6812:17cf
Public Scan
Effective URL: https://jcsgt.codesandbox.io/
Submission: On June 04 via api from BE
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on February 29th 2020. Valid for: 7 months.
This is the only time jcsgt.codesandbox.io was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 4 | 2606:4700::68... 2606:4700::6812:17cf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:303... 2606:4700:3035::681f:4177 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 2 |
ASN13335 (CLOUDFLARENET, US)
jcsgt.codesandbox.io | |
codesandbox.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
codesandbox.io
1 redirects
jcsgt.codesandbox.io codesandbox.io |
8 KB |
1 |
sourcemanager.pw
sourcemanager.pw |
|
4 | 2 |
Domain | Requested by | |
---|---|---|
2 | codesandbox.io |
jcsgt.codesandbox.io
|
2 | jcsgt.codesandbox.io | 1 redirects |
1 | sourcemanager.pw |
jcsgt.codesandbox.io
|
4 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-02-29 - 2020-10-09 |
7 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://jcsgt.codesandbox.io/
Frame ID: 09C3263E4445B30631A94250A9BDDCF9
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://jcsgt.codesandbox.io/
HTTP 301
https://jcsgt.codesandbox.io/ Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Google Cloud (CDN) Expand
Detected patterns
- headers via /^1\.1 google$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://jcsgt.codesandbox.io/
HTTP 301
https://jcsgt.codesandbox.io/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
jcsgt.codesandbox.io/ Redirect Chain
|
631 B 715 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sse-hooks.js
codesandbox.io/public/sse-hooks/ |
19 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
sourcemanager.pw/source/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
watermark-button.b90db4dc7.js
codesandbox.io/static/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.codesandbox.io/ | Name: __cfduid Value: d84f4f3184329e8f2cb371f8b73c6da751591235071 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
codesandbox.io
jcsgt.codesandbox.io
sourcemanager.pw
2606:4700:3035::681f:4177
2606:4700::6812:17cf
0116feb7225a0bf4c4e415055c0e353a74f2bb2a39286e6e9c57639b420803c6
02b4eafc2aad23dd0155190b41acd1e8abe096f8b9c82a7d54cd1262beb42560
92d01d7d79190b8403615c66ce075a8aa808c22564bc5413307b3ceae038c9d7