Help
RSS
API
Feed
Maltego
Contact
Domain > auth.api-gw.account-journeys.prod.sb-cloud.io
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-11-24
13.226.52.93
(
ClassC
)
2025-07-15
3.163.24.43
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Tue, 15 Jul 2025 18:07:45 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://auth.api-gw.account-journeys.prod.sb-cloud.io/X-Cache: Redirect from cloudfrontVia: 1.1 7e363c66fa49e16860bbd773eaa92164.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P2X-Amz-Cf-Id: Qu-79qXSEfoICf6609CsYS90WHNmb15ldQOCx3S1vPnS-npa0cmA0g html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/html;charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveDate: Tue, 15 Jul 2025 18:07:46 GMTServer: ServerContent-Language: en-USSet-Cookie: XSRF-TOKENbad1c236-b6aa-4791-b9d4-ad43535cf161; Path/; Secure; HttpOnly; SameSiteLaxx-amz-cognito-request-id: 21fa6ac1-9857-484f-9301-1cc9b366e9e3X-Content-Type-Options: nosniffX-XSS-Protection: 1; modeblockCache-Control: no-cache, no-store, max-age0, must-revalidatePragma: no-cacheExpires: 0Strict-Transport-Security: max-age31536000 ; includeSubDomainsX-Frame-Options: DENYX-Cache: Miss from cloudfrontVia: 1.1 cadda06365c5592c0d0a272a3fe5825e.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P2X-Amz-Cf-Id: RGLuRF0It7_CT9AZrGH3_JQ6dvjcEfzZ8KJkF5UWC1ExMfvcdjL6oQ !DOCTYPE html>html langen>head>head> link hrefnull/null/css/bootstrap.min.css relstylesheet mediascreen /> link hrefnull/null/css/cognito-login.css relstylesheet mediascreen /> title>Signin/title> script srcnull/null/js/amazon-cognito-advanced-security-data.min.js >/script> script> function getAdvancedSecurityData(formReference) { if (typeof AmazonCognitoAdvancedSecurityData undefined) { return true; } // UserpoolId is not available on frontend for springboard. We do not use userPoolId // anyway other than put in context data. var userPoolId ; var clientId getUrlParameter(client_id); var username ; var usernameInput document.getElementsByName(username)0; if (usernameInput && usernameInput.value) { username usernameInput.value; } var asfData AmazonCognitoAdvancedSecurityData.getData(username, userPoolId, clientId); if (typeof asfData undefined) { return true; } if (formReference && formReference.cognitoAsfData) { formReference.cognitoAsfData.value asfData } return true; } function getUrlParameter(name) { name name.replace(/\/, \\).replace(/\/, \\); var regex new RegExp(\\?& + name + (^*)); var results regex.exec(location.search); return results null ? : decodeURIComponent(results1.replace(/\+/g, )); } function onSubmit(evt, formRef) { formRef.querySelector(buttontypesubmit).disabled true; if (!!formRef.submitted) { evt.preventDefault(); return false; } else { formRef.submitted true; return getAdvancedSecurityData(formRef); } } function onSubmitLoginForm (formRef) { formRef.querySelector(inputnamesignInSubmitButton).disabled true; getAdvancedSecurityData(formRef) }/script> meta nameviewport contentwidthdevice-width, initial-scale1>/head>/head>body spellcheckfalse> div classcontainer> div classmodal-dialog> div classmodal-content background-customizable modal-content-mobile visible-xs visible-sm> div>div> div classbanner-customizable> center> /center> /div> /div>/div> div classmodal-body> div>div> /div>/div> div> div>div> /div>/div> div>div> /div>/div> /div> /div> /div> div classmodal-content background-customizable modal-content-mobile visible-md visible-lg> div>div> div classbanner-customizable> center> /center> /div> /div>/div> div classmodal-body> div>div> /div>/div> div> div> div>div> /div>/div> div>div> /div>/div> /div> /div> /div> /div> /div> /div> script> document.addEventListener(DOMContentLoaded, function () { var inputs document.querySelectorAll(input); inputs.forEach((input) > { input.addEventListener(input, function () { var name this.name; var value this.value; var matchingInputs document.querySelectorAll(`inputname${name}`); matchingInputs.forEach((match) > { if (match ! this) { match.value value; } }); }); }); });/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]