sso.poisontestdrop.ru
Open in
urlscan Pro
2606:4700:20::681a:6
Public Scan
Effective URL: https://sso.poisontestdrop.ru/realms/master/protocol/openid-connect/auth?client_id=security-admin-console&redirect_uri=https%3...
Submission: On July 26 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by E6 on July 26th 2024. Valid for: 3 months.
This is the only time sso.poisontestdrop.ru was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 33 | 2606:4700:20:... 2606:4700:20::681a:6 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
30 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
33 |
poisontestdrop.ru
3 redirects
sso.poisontestdrop.ru |
861 KB |
30 | 1 |
Domain | Requested by | |
---|---|---|
33 | sso.poisontestdrop.ru |
3 redirects
sso.poisontestdrop.ru
|
30 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sso.poisontestdrop.ru E6 |
2024-07-26 - 2024-10-24 |
3 months | crt.sh |
This page contains 4 frames:
Primary Page:
https://sso.poisontestdrop.ru/realms/master/protocol/openid-connect/auth?client_id=security-admin-console&redirect_uri=https%3A%2F%2Fsso.poisontestdrop.ru%2Fadmin%2Fmaster%2Fconsole%2F&state=8ce48e59-f7b4-47f0-8f12-9c9989838a57&response_mode=fragment&response_type=code&scope=openid&nonce=2ac689ef-41d5-4788-81c2-19443ca0f348&code_challenge=-CqD0noKC1C58tuSI0f_chKulAuZjVtNeNw8xoVJq00&code_challenge_method=S256
Frame ID: 67EA39BA5287E387BE58F2520A59BBBB
Requests: 24 HTTP requests in this frame
Frame:
https://sso.poisontestdrop.ru/realms/master/protocol/openid-connect/3p-cookies/step2.html
Frame ID: 9CAA0AF7D080F6A197D621F6C9F322BD
Requests: 2 HTTP requests in this frame
Frame:
https://sso.poisontestdrop.ru/cdn-cgi/challenge-platform/h/g/scripts/jsd/2db5e1cc2adc/main.js
Frame ID: 00794F397F914FF77673DAEF78F255F8
Requests: 2 HTTP requests in this frame
Frame:
https://sso.poisontestdrop.ru/realms/master/protocol/openid-connect/login-status-iframe.html
Frame ID: 9888845EA6F926E1BB7128198CB5FE64
Requests: 2 HTTP requests in this frame
Screenshot
Page Title
Sign in to KeycloakPage URL History Show full URLs
-
https://sso.poisontestdrop.ru/
HTTP 302
https://sso.poisontestdrop.ru/admin/ HTTP 302
https://sso.poisontestdrop.ru/admin/master/console/ Page URL
- https://sso.poisontestdrop.ru/realms/master/protocol/openid-connect/auth?client_id=security-admin-console&... Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://sso.poisontestdrop.ru/
HTTP 302
https://sso.poisontestdrop.ru/admin/ HTTP 302
https://sso.poisontestdrop.ru/admin/master/console/ Page URL
- https://sso.poisontestdrop.ru/realms/master/protocol/openid-connect/auth?client_id=security-admin-console&redirect_uri=https%3A%2F%2Fsso.poisontestdrop.ru%2Fadmin%2Fmaster%2Fconsole%2F&state=8ce48e59-f7b4-47f0-8f12-9c9989838a57&response_mode=fragment&response_type=code&scope=openid&nonce=2ac689ef-41d5-4788-81c2-19443ca0f348&code_challenge=-CqD0noKC1C58tuSI0f_chKulAuZjVtNeNw8xoVJq00&code_challenge_method=S256 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://sso.poisontestdrop.ru/ HTTP 302
- https://sso.poisontestdrop.ru/admin/ HTTP 302
- https://sso.poisontestdrop.ru/admin/master/console/
- https://sso.poisontestdrop.ru/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://sso.poisontestdrop.ru/cdn-cgi/challenge-platform/h/g/scripts/jsd/2db5e1cc2adc/main.js
30 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
sso.poisontestdrop.ru/admin/master/console/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index-C9t2UlUN.js
sso.poisontestdrop.ru/resources/exq3w/admin/keycloak.v2/assets/ |
565 KB 167 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index-DmufuwSM.css
sso.poisontestdrop.ru/resources/exq3w/admin/keycloak.v2/assets/ |
683 KB 68 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
RedHatText-Medium-C_mvOOeZ.woff2
sso.poisontestdrop.ru/resources/exq3w/admin/keycloak.v2/assets/ |
28 KB 29 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
RedHatText-Regular-nZJ6sD2S.woff2
sso.poisontestdrop.ru/resources/exq3w/admin/keycloak.v2/assets/ |
28 KB 28 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
react-jsx-runtime.production.min.js
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/vendor/react/ |
959 B 883 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
react.production.min.js
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/vendor/react/ |
7 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
react-dom.production.min.js
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/vendor/react-dom/ |
130 KB 42 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
step1.html
sso.poisontestdrop.ru/realms/master/protocol/openid-connect/3p-cookies/ Frame 9CAA |
2 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
sso.poisontestdrop.ru/cdn-cgi/challenge-platform/h/g/scripts/jsd/2db5e1cc2adc/ Frame 0079 Redirect Chain
|
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
8a9432a4be852bc3
sso.poisontestdrop.ru/cdn-cgi/challenge-platform/h/g/jsd/r/ Frame 0079 |
0 611 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
step2.html
sso.poisontestdrop.ru/realms/master/protocol/openid-connect/3p-cookies/ Frame 9CAA |
686 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login-status-iframe.html
sso.poisontestdrop.ru/realms/master/protocol/openid-connect/ Frame 9888 |
4 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.svg
sso.poisontestdrop.ru/resources/exq3w/admin/keycloak.v2/ |
7 KB 3 KB |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
init
sso.poisontestdrop.ru/realms/master/protocol/openid-connect/login-status-iframe.html/ Frame 9888 |
0 0 |
Fetch
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
auth
sso.poisontestdrop.ru/realms/master/protocol/openid-connect/ |
5 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
patternfly.min.css
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/@patternfly/patternfly/ |
1 MB 137 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
patternfly.min.css
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/css/ |
178 KB 31 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
patternfly-additions.min.css
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/css/ |
220 KB 30 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pficon.css
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/lib/pficon/ |
540 B 817 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.css
sso.poisontestdrop.ru/resources/exq3w/login/keycloak/css/ |
11 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
menu-button-links.js
sso.poisontestdrop.ru/resources/exq3w/login/keycloak/js/ |
7 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
passwordVisibility.js
sso.poisontestdrop.ru/resources/exq3w/login/keycloak/js/ |
698 B 660 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
authChecker.js
sso.poisontestdrop.ru/resources/exq3w/login/keycloak/js/ |
2 KB 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
keycloak-bg.png
sso.poisontestdrop.ru/resources/exq3w/login/keycloak/img/ |
80 KB 80 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
keycloak-logo-text.png
sso.poisontestdrop.ru/resources/exq3w/login/keycloak/img/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OpenSans-Light-webfont.woff2
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/ |
62 KB 60 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OpenSans-Regular-webfont.woff2
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/ |
61 KB 59 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff2
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/ |
75 KB 76 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
sso.poisontestdrop.ru/resources/exq3w/login/keycloak/img/ |
627 B 997 B |
Other
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
sso.poisontestdrop.ru/realms/master/ | Name: AUTH_SESSION_ID Value: dc309a24-83d0-446c-98a0-76920cd40061.keycloak-app-0-24648 |
|
sso.poisontestdrop.ru/realms/master/ | Name: AUTH_SESSION_ID_LEGACY Value: dc309a24-83d0-446c-98a0-76920cd40061.keycloak-app-0-24648 |
|
sso.poisontestdrop.ru/realms/master/ | Name: KC_RESTART Value: eyJhbGciOiJIUzUxMiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2YTRjZjdhNS04NzIxLTQ5NjEtOGRlYy0zODNiYThlZjU2MmYifQ.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.TZ5Ov1g1t8mY7uyIVq1wTartsviyQHRDwldjlYKCL4LLikkw8ZklwIe1DUphRj5vsnAmypzZJbUa5uJy2vPBZA |
|
.poisontestdrop.ru/ | Name: cf_clearance Value: wikzNf304o1NapPjKilPB5__IaXlz3WwCq7x_Ke.1A8-1721994897-1.0.1.1-0xnjjF6XyAhFiaXvb2o4VMnjmiEwkJFb2PY7mTBrp7SFGq8OV8CMF7vUFYyX0YHQbd972awHayRtze2MrtBUWQ |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | frame-src 'self'; frame-ancestors 'self'; object-src 'none'; |
Strict-Transport-Security | max-age=31536000; includeSubDomains |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
sso.poisontestdrop.ru
2606:4700:20::681a:6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