www.eoffice.pcbassam.org
Open in
urlscan Pro
103.158.205.105
Public Scan
Submission: On June 16 via api from US — Scanned from DE
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on June 12th 2023. Valid for: a year.
This is the only time www.eoffice.pcbassam.org was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 103.158.205.105 103.158.205.105 | 141416 (AIIL-AS-A...) (AIIL-AS-AP Amtron Informatics India Limited) | |
15 | 1 |
ASN141416 (AIIL-AS-AP Amtron Informatics India Limited, IN)
www.eoffice.pcbassam.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
pcbassam.org
www.eoffice.pcbassam.org |
514 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | www.eoffice.pcbassam.org |
www.eoffice.pcbassam.org
|
15 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.digitalindia.gov.in |
data.gov.in |
swachhbharat.mygov.in |
india.gov.in |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.pcbassam.org Sectigo RSA Domain Validation Secure Server CA |
2023-06-12 - 2024-06-11 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.eoffice.pcbassam.org/
Frame ID: 471B07C0B0363B7347318BBE9B951C0A
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
eOffice Project DivisionDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.eoffice.pcbassam.org/ |
16 KB 17 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.css
www.eoffice.pcbassam.org/intranic5/css/ |
143 KB 143 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
intranic.css
www.eoffice.pcbassam.org/intranic5/css/ |
119 KB 119 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.css
www.eoffice.pcbassam.org/intranic5/font-awesome/ |
28 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.1.1.min.js
www.eoffice.pcbassam.org/intranic5/js/ |
16 KB 17 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
www.eoffice.pcbassam.org/intranic5/images/ |
16 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nic.png
www.eoffice.pcbassam.org/intranic5/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
digital-india-logo.png
www.eoffice.pcbassam.org/intranic5/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
data-gov-logo.png
www.eoffice.pcbassam.org/intranic5/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
swachh-bharat.png
www.eoffice.pcbassam.org/intranic5/images/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
india-gov-logo.png
www.eoffice.pcbassam.org/intranic5/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg_img.jpg
www.eoffice.pcbassam.org/intranic5/images/ |
68 KB 68 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-Semibold.ttf
www.eoffice.pcbassam.org/intranic5/font// |
16 KB 17 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
www.eoffice.pcbassam.org/intranic5/font-awesome/ |
55 KB 56 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
www.eoffice.pcbassam.org/ |
15 KB 15 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.eoffice.pcbassam.org/ | Name: PHPSESSID Value: 6d44euaq2558ech1mr01lth6q1 |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; always |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.eoffice.pcbassam.org
103.158.205.105
1d00a5417163c8504f02b945d2deaaf78c0c10d356eda28faff515ec2945122b
454922fac5ba486d76932183071d9b0a666dddee7441763c2822b68b09b1d337
5ef7c9788a9ec8920111d145c69eeee5b31996f7a95c15e381cb7354818227d0
6e240ec87dde71ca932ed10b9e0e7c3bb77203d77b205fa0f494ceb2049c6e8b
8de9ca8b107b71484fd7f7e899eafb27fa3e63419dfcf03775847796a595e20d
a70e9af8b84f1e573c8de77cb655fea65902226bb0d9d827da401668bf9a5c96
aa261556d29191467f0eb4fd140db2ec3bdcf6241aa7e0b442018c0a3d1ca262
aadc3580d2b64ff5a7e6f1425587db4e8b033efcbf8f5c332ca52a5ed580c87c
c6783c6a44fb86bf41152540cf7c89fd13a8d787b1aeefe4399c17b6c86db0d5
ec34b99d72efa8616ac685d13c04eaff50a59da3b5168171dfdcf5f933a54300
ef5a025060bbaa3487c39b85b6da41c6383cc1242167a0d09dd169f12ccb5f5f
f3ffd24cbbbfaa06826aff12bc2fea6868897c89a7890981273f42da540dc6be
fbdefa87262f9a236d9a71cc9cacddc03b6c7a1227ba30dd57fa25ac4a31f7c8