auth-sbox.pagatudo.io
Open in
urlscan Pro
18.238.49.41
Public Scan
Effective URL: https://auth-sbox.pagatudo.io/error?error=redirect_mismatch&client_id=26ps83vg6msk3p03sm5t1o7spc
Submission: On March 06 via api from US — Scanned from US
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on May 31st 2023. Valid for: a year.
This is the only time auth-sbox.pagatudo.io was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 100.24.131.201 100.24.131.201 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 4 | 18.238.49.41 18.238.49.41 | 16509 (AMAZON-02) (AMAZON-02) | |
3 | 54.192.100.141 54.192.100.141 | 16509 (AMAZON-02) (AMAZON-02) | |
6 | 2 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-100-24-131-201.compute-1.amazonaws.com
bo-sbox.wyrapay.com |
ASN16509 (AMAZON-02, US)
PTR: server-18-238-49-41.jfk52.r.cloudfront.net
auth-sbox.pagatudo.io |
ASN16509 (AMAZON-02, US)
PTR: server-54-192-100-141.ewr53.r.cloudfront.net
d3oia8etllorh5.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
pagatudo.io
1 redirects
auth-sbox.pagatudo.io |
28 KB |
3 |
cloudfront.net
d3oia8etllorh5.cloudfront.net |
388 KB |
1 |
wyrapay.com
1 redirects
bo-sbox.wyrapay.com |
1 KB |
6 | 3 |
Domain | Requested by | |
---|---|---|
4 | auth-sbox.pagatudo.io |
1 redirects
auth-sbox.pagatudo.io
|
3 | d3oia8etllorh5.cloudfront.net |
auth-sbox.pagatudo.io
|
1 | bo-sbox.wyrapay.com | 1 redirects |
6 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.pagatudo.io Sectigo RSA Domain Validation Secure Server CA |
2023-05-31 - 2024-05-30 |
a year | crt.sh |
*.cloudfront.net Amazon RSA 2048 M01 |
2023-10-10 - 2024-09-19 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://auth-sbox.pagatudo.io/error?error=redirect_mismatch&client_id=26ps83vg6msk3p03sm5t1o7spc
Frame ID: 1C1EB09294E21AE5BF4EC0C1648EF640
Requests: 6 HTTP requests in this frame
Screenshot
Page Title
SigninPage URL History Show full URLs
-
https://bo-sbox.wyrapay.com/
HTTP 302
https://auth-sbox.pagatudo.io/oauth2/authorize?client_id=26ps83vg6msk3p03sm5t1o7spc&redirect_uri=https%3A%... HTTP 302
https://auth-sbox.pagatudo.io/error?error=redirect_mismatch&client_id=26ps83vg6msk3p03sm5t1o7spc Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bo-sbox.wyrapay.com/
HTTP 302
https://auth-sbox.pagatudo.io/oauth2/authorize?client_id=26ps83vg6msk3p03sm5t1o7spc&redirect_uri=https%3A%2F%2Fbo-sbox.wyrapay.com%2Fsignin-oidc&response_type=code&scope=openid%20profile&code_challenge=Fd0anUSdve4VbtDjMrjXALrB3C8E6RW6hTjH3HDahjY&code_challenge_method=S256&response_mode=form_post&state=CfDJ8Jn0S2G85qlAqz0Zp2fncurS4Z-knxJUwflMKLBVW6rPjD8j0mgHrFKHPDytxFDZQAcokbTgYK3y6hbhONlIgsmpWeE_V_NIXPkWkvyL8muR3IyrU5rlgxNrIWQGPJW6JF1XFtFf98hIWwaBd9_sJ0ElsojJUbODuuggis3CljizNV85tqpqvSCtd7dVE1mmulak35TwvWfTAWQ0YtBdTJ2Ty-BJAaOFQpbCLPWpVkYt4D8Pxvr2w-lVOmNO7NvBe5476fq1eTKBeMTUbJMnIwFYnuohpLBzN6j_jzR2fgRfA8JtpsI7tzPceVBIQ8Dg1MS4W7MhD_i2lJ4PXqVYGWBXmPk4S50D608yScJUJk8GKa2ml0xMxzZQFDhYXdrpXQ&x-client-SKU=ID_NETSTANDARD2_0&x-client-ver=6.15.1.0 HTTP 302
https://auth-sbox.pagatudo.io/error?error=redirect_mismatch&client_id=26ps83vg6msk3p03sm5t1o7spc Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
error
auth-sbox.pagatudo.io/ Redirect Chain
|
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
d3oia8etllorh5.cloudfront.net/20230404192231/css/ |
118 KB 119 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cognito-login.css
d3oia8etllorh5.cloudfront.net/20230404192231/css/ |
6 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
amazon-cognito-advanced-security-data.min.js
d3oia8etllorh5.cloudfront.net/20230404192231/js/ |
262 KB 263 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
image.jpg
auth-sbox.pagatudo.io/ALL/20240126182708/assets/images/ |
23 KB 23 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
cspreport
auth-sbox.pagatudo.io/ |
0 664 B |
Other
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| __fwcimLoaded object| AWSCognitoContextData object| _crypto function| setImmediate function| clearImmediate object| AmazonCognitoAdvancedSecurityData function| Zepto function| $ function| getAdvancedSecurityData function| getUrlParameter function| onSubmit object| fwcim2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bo-sbox.wyrapay.com/signin-oidc | Name: .AspNetCore.Correlation.rnZULO5IznHmGSO2sTOCBCP_fe3rjLF-ji7XzmsDS9c Value: N |
|
auth-sbox.pagatudo.io/ | Name: XSRF-TOKEN Value: 077f73cc-5b61-49b8-b997-24cf9e2cc488 |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 ; includeSubDomains |
X-Content-Type-Options | nosniff nosniff |
X-Frame-Options | DENY |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
auth-sbox.pagatudo.io
bo-sbox.wyrapay.com
d3oia8etllorh5.cloudfront.net
100.24.131.201
18.238.49.41
54.192.100.141
2fb9a3f03eb6fe4fc4d10df54839dc3ea6a011a6da3d0b1659c340e0096c0591
621362b5b7b6513a58acef7fe9fe717093d1186a25b4a429c20e09e2a54c9ace
70c3cca4b853f34ff1d7222821bd3c804f49767066bbab611a6f1decced8807a
7ae177fecdbc4dae81c93de1debd1442369e283b671dc1ecdfc1939e22d7b4b9
b9462c3d8fc4e698687d6fa7efdd3123606f6e235a179e7cb12cdb38f8ed7978
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855