login.agftap.org
Open in
urlscan Pro
20.118.56.10
Public Scan
Submission: On October 11 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by Microsoft Azure TLS Issuing CA 01 on March 14th 2022. Valid for: a year.
This is the only time login.agftap.org was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 20.118.56.10 20.118.56.10 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
6 | 1 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
login.agftap.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
agftap.org
login.agftap.org |
102 KB |
6 | 1 |
Domain | Requested by | |
---|---|---|
6 | login.agftap.org |
login.agftap.org
|
6 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.azurewebsites.net Microsoft Azure TLS Issuing CA 01 |
2022-03-14 - 2023-03-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://login.agftap.org/
Frame ID: 81D680E0D2E0842BACEA311ADB1C3488
Requests: 6 HTTP requests in this frame
Screenshot
Page Title
AgFTAP LoginDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Glyphicons (Font Scripts) Expand
Detected patterns
- (?:<link[^>]* href=[^>]+glyphicons(?:\.min)?\.css|<img[^>]* src=[^>]+glyphicons)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
login.agftap.org/ |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
login.agftap.org/lib/bootstrap/dist/css/ |
157 KB 36 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap-glyphicons.min.css
login.agftap.org/lib/bootstrap4-glyphicons/css/ |
12 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
site.css
login.agftap.org/css/ |
1 KB 836 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.slim.min.js
login.agftap.org/lib/jquery/dist/ |
71 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.bundle.min.js
login.agftap.org/lib/bootstrap/dist/js/ |
82 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery object| bootstrap2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.login.agftap.org/ | Name: ARRAffinity Value: 5ad2b7566e759e34ce550586593c9aedf59606e6da1e884c49e2c673cb9b7098 |
|
.login.agftap.org/ | Name: ARRAffinitySameSite Value: 5ad2b7566e759e34ce550586593c9aedf59606e6da1e884c49e2c673cb9b7098 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
login.agftap.org
20.118.56.10
18a73f1a0c384d8a51148481dac25f20e8d66855a12e59359dbc098a31a863ba
1943be858d982f19c8635d5b698c29cf9c49fbc6bae36df48acab8003f561335
46ad4b0445d34e2db0ba21baba96baf3cca3469006ff09030b11b74c295a28de
6ac752250a2cb49a49734d7cbf34a37fed277261d1ffa9dcb28b64a6cce32825
b445b71b7deb62cdd123bed12de79793df3ade8984107c0dbda06c95a50be293
b64b23b4a62a17d314b64f2dc76260b4c5bcd10135c092eb59372d998c2ef7ae