www.windows-2016.no
Open in
urlscan Pro
173.249.51.170
Public Scan
Effective URL: https://www.windows-2016.no/
Submission: On October 03 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on August 16th 2018. Valid for: 3 months.
This is the only time www.windows-2016.no was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 162.210.103.226 162.210.103.226 | 32748 (STEADFAST) (STEADFAST - Steadfast) | |
3 | 173.249.51.170 173.249.51.170 | 51167 (CONTABO) (CONTABO) | |
4 | 2 |
ASN32748 (STEADFAST - Steadfast, US)
PTR: vps2.guldvog.com.ph
windows-2016.com |
ASN51167 (CONTABO, DE)
PTR: vps4.guldvog.com.ph
www.windows-2016.no |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
windows-2016.no
www.windows-2016.no |
105 KB |
1 |
windows-2016.com
windows-2016.com |
822 B |
4 | 2 |
Domain | Requested by | |
---|---|---|
3 | www.windows-2016.no |
windows-2016.com
www.windows-2016.no |
1 | windows-2016.com | |
4 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
vps4.guldvog.com.ph |
www.guldvog.com.ph |
Subject Issuer | Validity | Valid | |
---|---|---|---|
windows-2016.no Let's Encrypt Authority X3 |
2018-08-16 - 2018-11-14 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.windows-2016.no/
Frame ID: E602BE041080A5046F36AFCF7A0F01C4
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://windows-2016.com/ Page URL
- https://www.windows-2016.no/ Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: vps4.Guldvog.com.ph
Search URL Search Domain Scan URL
Title: WWW.GULDVOG.COM.PH Jan Guldvog
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://windows-2016.com/ Page URL
- https://www.windows-2016.no/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
windows-2016.com/ |
580 B 822 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
www.windows-2016.no/ |
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
www.windows-2016.no/_vti_bin/fpcount.exe/ |
381 B 427 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Mr.%20Jan%20Gerhardsen%20Guldvog_640x480.jpg
www.windows-2016.no/Pictures/ |
103 KB 103 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
windows-2016.com
www.windows-2016.no
162.210.103.226
173.249.51.170
19ee3442bedf45d1c404a68ff492eac331da237b7292cd420cde85fff07f129b
397d6f8f29abc3a94594bafe5967d4b7cb8f812977f018c2e49954da9c2fa512
42db8f732ceba520c6eba22f874fabd3b90dff9078f6d77387e27551fb6ac6db
983b1e313bc3797327275924b06c964f5f64452907fc0832d91cb32424a6b4a7