URL: http://194.233.87.3:8080/CVE-2020-3452-Exploit/cisco_asa_files/
Submission Tags: opendir censys opendir_recursion Search All
Submission: On August 02 via api from FI — Scanned from FI

Summary

This website contacted 1 IPs in 1 countries across 0 domains to perform 1 HTTP transactions. The main IP is 194.233.87.3, located in Singapore and belongs to CAPL-AS-AP Contabo Asia Private Limited, SG. The main domain is 194.233.87.3.
This is the only time 194.233.87.3 was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2 194.233.87.3 141995 (CAPL-AS-A...)
1 1
Apex Domain
Subdomains
Transfer
1 0
Domain Requested by
1 0

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://194.233.87.3:8080/CVE-2020-3452-Exploit/cisco_asa_files/
Frame ID: DD4C1FFD7196E29F093BF71FBB0A0761
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

Directory listing for /CVE-2020-3452-Exploit/cisco_asa_files/

Page URL History Show full URLs

  1. http://194.233.87.3:8080/CVE-2020-3452-Exploit/cisco_asa_files HTTP 301
    http://194.233.87.3:8080/CVE-2020-3452-Exploit/cisco_asa_files/ Page URL

Page Statistics

1
Requests

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

1
IPs

1
Countries

4 kB
Transfer

4 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://194.233.87.3:8080/CVE-2020-3452-Exploit/cisco_asa_files HTTP 301
    http://194.233.87.3:8080/CVE-2020-3452-Exploit/cisco_asa_files/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
194.233.87.3/CVE-2020-3452-Exploit/cisco_asa_files/
Redirect Chain
  • http://194.233.87.3:8080/CVE-2020-3452-Exploit/cisco_asa_files
  • http://194.233.87.3:8080/CVE-2020-3452-Exploit/cisco_asa_files/
4 KB
4 KB
Document
General
Full URL
http://194.233.87.3:8080/CVE-2020-3452-Exploit/cisco_asa_files/
Protocol
HTTP/1.0
Server
194.233.87.3 , Singapore, ASN141995 (CAPL-AS-AP Contabo Asia Private Limited, SG),
Reverse DNS
vmi1235004.contaboserver.net
Software
SimpleHTTP/0.6 Python/3.8.10 /
Resource Hash
49e5fc565098e3871be9270b0ea7b58ba03a52f6a44bec3e72650b4bf9b5ea3b

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.110 Safari/537.36
accept-language
fi-FI,fi;q=0.9

Response headers

Content-Length
4050
Content-type
text/html; charset=utf-8
Date
Wed, 02 Aug 2023 18:38:01 GMT
Server
SimpleHTTP/0.6 Python/3.8.10

Redirect headers

Date
Wed, 02 Aug 2023 18:38:00 GMT
Location
/CVE-2020-3452-Exploit/cisco_asa_files/
Server
SimpleHTTP/0.6 Python/3.8.10

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

194.233.87.3
49e5fc565098e3871be9270b0ea7b58ba03a52f6a44bec3e72650b4bf9b5ea3b