| | 41.204.160.15 | 200 OK | 48 kB |
URL User Request GET HTTP/1.1IP41.204.160.15:443 ASN#36914 Kenya Education Network
CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeHTML document, Unicode text, UTF-8 text, with very long lines (318), with CRLF line terminators Hashc67b7914e8ecaf2e0e2304f3608149a4 a046b8d54638cfb733516326967146b2914895f3 af5cee32cdf078945ec7b567bb52f98b97611713d99480db85664f4d86f7ec4d
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/ HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Upgrade-Insecure-Requests: 1
Connection: keep-alive
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:15 GMT
Server: Apache
Last-Modified: Thu, 25 Apr 2024 06:02:55 GMT
Accept-Ranges: bytes
Content-Length: 47629
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html
|
|
| www.nrf.go.ke/hackathon/assets/css/slicknav.css | 41.204.160.15 | 200 OK | 3.0 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/css/slicknav.css IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
Hash0d9e9eac3362d80eb6f0eb0c06f7ae8c 4c639f32cc7f9703e856b5be7ee5c23495e4d063 150b06b6457bd52a377ba78fb56b1c7af7fb0064c392c99800e3b731c0a3feae
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/css/slicknav.css HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:16 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:00:56 GMT
Accept-Ranges: bytes
Content-Length: 3032
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/css
|
|
| www.nrf.go.ke/hackathon/assets/css/bootstrap.min.css | 41.204.160.15 | 200 OK | 145 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/css/bootstrap.min.css IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeASCII text, with very long lines (65325) Size145 kB (144877 bytes) Hash450fc463b8b1a349df717056fbb3e078 895125a4522a3b10ee7ada06ee6503587cbf95c5 2c0f3dcfe93d7e380c290fe4ab838ed8cadff1596d62697f5444be460d1f876d
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/css/bootstrap.min.css HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:16 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:00:56 GMT
Accept-Ranges: bytes
Content-Length: 144877
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/css
|
|
| www.nrf.go.ke/hackathon/assets/css/nivo-lightbox.css | 41.204.160.15 | 200 OK | 5.8 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/css/nivo-lightbox.css IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
Hash078535ab0d43cef7bb47515a0436fb97 fc177171482dbee63a782c182d6b36908ff6dfc5 3ef086e8d3e5a2a504c3cae80d5242c9bb77c35190b37dacef0d538bdda74816
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/css/nivo-lightbox.css HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:16 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:00:56 GMT
Accept-Ranges: bytes
Content-Length: 5773
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/css
|
|
| www.nrf.go.ke/hackathon/assets/fonts/line-icons.css | 41.204.160.15 | 200 OK | 15 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/fonts/line-icons.css IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
Hashc6531c4dcf5f361b622beaa7cffd61d8 91923ea418d831faef4dd0101614fc6d8b2bb110 80913dd60d4479cb92e092c9196b3ebd0149235af7b1b5ec07bd93abcce4f553
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/fonts/line-icons.css HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:16 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:01:00 GMT
Accept-Ranges: bytes
Content-Length: 14782
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/css
|
|
| www.nrf.go.ke/hackathon/assets/css/responsive.css | 41.204.160.15 | 200 OK | 5.7 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/css/responsive.css IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
Hashe377c49ee2218ecdda26408f02562447 d5f4e2930b2abe2293ff9bc715fd2bf84c56d1d3 85832f0db5dfb468440669469990604c42a802b838e14e2d19dc1ffbda9750ca
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/css/responsive.css HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:16 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:00:56 GMT
Accept-Ranges: bytes
Content-Length: 5723
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/css
|
|
| www.nrf.go.ke/hackathon/assets/js/popper.min.js | 41.204.160.15 | 200 OK | 19 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/js/popper.min.js IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeJavaScript source, ASCII text, with very long lines (18860), with CRLF line terminators Hash940017f4a5906e1e6783de73d8322038 61ded952df91f92313d3f1d196f76196f05f2db0 fe3dc4c4826441004ae9788fc603b1a1b387e1d9fafee000eab4bbb8159e554c
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/js/popper.min.js HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:16 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:00:58 GMT
Accept-Ranges: bytes
Content-Length: 19038
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: application/javascript
|
|
| www.nrf.go.ke/hackathon/assets/js/jquery-min.js | 41.204.160.15 | 200 OK | 84 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/js/jquery-min.js IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeJavaScript source, ASCII text, with very long lines (32025) Hashf9c7afd05729f10f55b689f36bb20172 43dc554608df885a59ddeece1598c6ace434d747 f16ab224bb962910558715c82f58c10c3ed20f153ddfaa199029f141b5b0255c
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/js/jquery-min.js HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:16 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:00:58 GMT
Accept-Ranges: bytes
Content-Length: 84345
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: application/javascript
|
|
| www.nrf.go.ke/hackathon/assets/css/main.css | 41.204.160.15 | 200 OK | 42 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/css/main.css IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
Hash0ad0f84939ee49bea8acca3ac3c42dbe 8a9bb94b43231a73368ef7712358d96516e75c6f 1b630253957f1e9bb958d87927412fca1291d67a1f07e002627a58a99a727774
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/css/main.css HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:16 GMT
Server: Apache
Last-Modified: Wed, 24 Apr 2024 23:13:14 GMT
Accept-Ranges: bytes
Content-Length: 41842
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/css
|
|
| www.nrf.go.ke/hackathon/assets/js/jquery.countdown.min.js | 41.204.160.15 | 200 OK | 5.3 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/js/jquery.countdown.min.js IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeJavaScript source, ASCII text, with very long lines (4136) Hash5d3ff3c3fbaa67cc639501f44eeb07be bd66e4cd58de09c198e7abc77fa4c883955d189e 2249399b2268c260d0698542503d16afebc80e437c846239f12196744ebbd40f
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/js/jquery.countdown.min.js HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:16 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 11:24:44 GMT
Accept-Ranges: bytes
Content-Length: 5339
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: application/javascript
|
|
| www.nrf.go.ke/hackathon/assets/css/animate.css | 41.204.160.15 | 200 OK | 57 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/css/animate.css IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeASCII text, with very long lines (460) Hashcb67371414710491ee3730390d1efb33 2e70ccc82e0ed3de2fd87409e6ca66e7b1a2d285 59a1460df6cb458204ec993345ff4964fa7e1a77da4ab7137e50fce8434c1d6a
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/css/animate.css HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:16 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:00:56 GMT
Accept-Ranges: bytes
Content-Length: 57095
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/css
|
|
| www.nrf.go.ke/hackathon/assets/js/jquery.nav.js | 41.204.160.15 | 200 OK | 5.1 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/js/jquery.nav.js IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeJavaScript source, ASCII text Hasha33571eb2591514e45765696e5d92c9f e680863a86670bf2d8e0b1f5b33c267f0ddc5cd1 707a967916ff7ca8411b995ff078ee44fcbb627bbb11f067643f7a6ab7f99806
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/js/jquery.nav.js HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:16 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:00:58 GMT
Accept-Ranges: bytes
Content-Length: 5138
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: application/javascript
|
|
| www.nrf.go.ke/hackathon/assets/js/jquery.easing.min.js | 41.204.160.15 | 200 OK | 5.6 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/js/jquery.easing.min.js IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeUnicode text, UTF-8 text, with very long lines (3601) Hash9cda9e740bbf260a190f4041132b5105 603599b494c5f0c9ed5d11ccea03ca6517da46dc ecfc183e33d25d24aa7c06218e0a413488fff8774e4b4b87543c766db9b0b8ba
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/js/jquery.easing.min.js HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:16 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:00:56 GMT
Accept-Ranges: bytes
Content-Length: 5564
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: application/javascript
|
|
| www.nrf.go.ke/hackathon/assets/js/wow.js | 41.204.160.15 | 200 OK | 5.7 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/js/wow.js IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeJavaScript source, ASCII text Hashf7896cd67c024ed5f0d280491a84525c 9744f94996c7660a52c70627848fc8097f31eef3 0a575c5ec91df862fb63c1e945d05061c29b60c3a0508d1fc3cad7d47bab4c6e
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/js/wow.js HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:00:56 GMT
Accept-Ranges: bytes
Content-Length: 5693
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: application/javascript
|
|
| www.nrf.go.ke/hackathon/assets/js/bootstrap.min.js | 41.204.160.15 | 200 OK | 49 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/js/bootstrap.min.js IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeJavaScript source, ASCII text, with very long lines (48664) Hash14d449eb8876fa55e1ef3c2cc52b0c17 a9545831803b1359cfeed47e3b4d6bae68e40e99 e7ed36ceee5450b4243bbc35188afabdfb4280c7c57597001de0ed167299b01b
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/js/bootstrap.min.js HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:16 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:00:56 GMT
Accept-Ranges: bytes
Content-Length: 48944
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: application/javascript
|
|
| www.nrf.go.ke/hackathon/assets/js/nivo-lightbox.js | 41.204.160.15 | 200 OK | 15 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/js/nivo-lightbox.js IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeJavaScript source, ASCII text Hashf826ced492f4a23c4d775778371df0ef 0c36310a0df8120e7defb6697643149750f011e0 c97a69e28f040c8159d3ae7760ab0279e3913331aa36afe9092834af30a780f2
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/js/nivo-lightbox.js HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:00:56 GMT
Accept-Ranges: bytes
Content-Length: 14762
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: application/javascript
|
|
| fonts.gstatic.com/s/poppins/v21/pxiEyp8kv8JHgFVrJJfecg.woff2 | 216.58.207.227 | 200 OK | 7.9 kB |
URL GET HTTP/2fonts.gstatic.com/s/poppins/v21/pxiEyp8kv8JHgFVrJJfecg.woff2 IP216.58.207.227:443
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerGoogle Trust Services LLC Subject*.gstatic.com FingerprintF5:5C:D9:68:C6:5F:A3:33:5A:73:C3:79:B6:83:FE:44:2E:A4:83:74 ValidityMon, 18 Mar 2024 20:34:25 GMT - Mon, 10 Jun 2024 20:34:24 GMT
File typeWeb Open Font Format (Version 2), TrueType, length 7884, version 1.0 Hash9212f6f9860f9fc6c69b02fedf6db8c3 ac6d71b4d5fdd2b3dabc9a06ff6c001e4251da0b 7d93459d86585bfcdbb7e0376056226adb25821ee54b96236fe2123e9560929f
GET /s/poppins/v21/pxiEyp8kv8JHgFVrJJfecg.woff2 HTTP/1.1
Host: fonts.gstatic.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: identity
Origin: https://www.nrf.go.ke
DNT: 1
Connection: keep-alive
Referer: https://fonts.googleapis.com/
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
accept-ranges: bytes
access-control-allow-origin: *
content-security-policy-report-only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy: cross-origin
cross-origin-opener-policy: same-origin; report-to="apps-themes"
report-to: {"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
timing-allow-origin: *
content-length: 7884
x-content-type-options: nosniff
server: sffe
x-xss-protection: 0
date: Tue, 23 Apr 2024 03:21:03 GMT
expires: Wed, 23 Apr 2025 03:21:03 GMT
cache-control: public, max-age=31536000
age: 182781
last-modified: Fri, 22 Mar 2024 00:00:38 GMT
content-type: font/woff2
alt-svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
X-Firefox-Spdy: h2
|
|
| fonts.gstatic.com/s/poppins/v21/pxiByp8kv8JHgFVrLCz7Z1xlFQ.woff2 | 216.58.207.227 | 200 OK | 7.8 kB |
URL GET HTTP/2fonts.gstatic.com/s/poppins/v21/pxiByp8kv8JHgFVrLCz7Z1xlFQ.woff2 IP216.58.207.227:443
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerGoogle Trust Services LLC Subject*.gstatic.com FingerprintF5:5C:D9:68:C6:5F:A3:33:5A:73:C3:79:B6:83:FE:44:2E:A4:83:74 ValidityMon, 18 Mar 2024 20:34:25 GMT - Mon, 10 Jun 2024 20:34:24 GMT
File typeWeb Open Font Format (Version 2), TrueType, length 7816, version 1.0 Hash25b0e113ca7cce3770d542736db26368 cb726212d5d525021752a1d8470a0fb593e0c49e 9338e65fc077355c7a87ae0d64cc101e23b9bf8ad78ae65f0f319c857311b526
GET /s/poppins/v21/pxiByp8kv8JHgFVrLCz7Z1xlFQ.woff2 HTTP/1.1
Host: fonts.gstatic.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: identity
Origin: https://www.nrf.go.ke
DNT: 1
Connection: keep-alive
Referer: https://fonts.googleapis.com/
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
accept-ranges: bytes
access-control-allow-origin: *
content-security-policy-report-only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy: cross-origin
cross-origin-opener-policy: same-origin; report-to="apps-themes"
report-to: {"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
timing-allow-origin: *
content-length: 7816
x-content-type-options: nosniff
server: sffe
x-xss-protection: 0
date: Mon, 22 Apr 2024 16:23:47 GMT
expires: Tue, 22 Apr 2025 16:23:47 GMT
cache-control: public, max-age=31536000
last-modified: Fri, 22 Mar 2024 00:00:32 GMT
content-type: font/woff2
age: 222217
alt-svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
X-Firefox-Spdy: h2
|
|
| www.nrf.go.ke/hackathon/assets/js/main.js | 41.204.160.15 | 200 OK | 2.4 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/js/main.js IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeJavaScript source, ASCII text, with CRLF line terminators Hashb37bdaf2d628fbc0cce79426ad8ab5b9 af4aa4094b24f6386b2b26c0036e953b4bf0d7d2 99a77e5f8e24c065bc40111f67daffb02b9948c78441ebc2c397a7880d8620a7
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/js/main.js HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Tue, 23 Apr 2024 05:42:34 GMT
Accept-Ranges: bytes
Content-Length: 2398
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: application/javascript
|
|
| www.nrf.go.ke/hackathon/assets/js/jquery.slicknav.js | 41.204.160.15 | 200 OK | 17 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/js/jquery.slicknav.js IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeJavaScript source, ASCII text Hash512df78fdd589e7ebed7905775441a21 ea0d0e582cb93d1e1a531295a8a80ae8aca631d2 134c82a4a98549168990c2e9ed21efae92ae49396093773853f284b72ad733d8
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/js/jquery.slicknav.js HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:00:56 GMT
Accept-Ranges: bytes
Content-Length: 16748
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: application/javascript
|
|
| www.nrf.go.ke/hackathon/assets/img/nrf/partners/logo-riara.png | 41.204.160.15 | 200 OK | 9.5 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/img/nrf/partners/logo-riara.png IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typePNG image data, 296 x 60, 8-bit/color RGBA, non-interlaced Hash8260c5673c96ef5e0297222a0e11e44f 1392229585bbaed7fe14ecd3e42daf9245bbcd1b d1c85504c0c5f934a76b4d4c54bb64ca651cfd1dbc90c52aa0342bf86c2df59a
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/img/nrf/partners/logo-riara.png HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Wed, 24 Apr 2024 15:47:37 GMT
Accept-Ranges: bytes
Content-Length: 9521
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Content-Type: image/png
|
|
| www.nrf.go.ke/hackathon/assets/img/nrf/nrf-logo.png | 41.204.160.15 | 200 OK | 247 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/img/nrf/nrf-logo.png IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typePNG image data, 1118 x 452, 8-bit/color RGBA, non-interlaced Size247 kB (247035 bytes) Hashe5f3a73cfb553a3c34a530d80258f6d0 1d96ec9180fd416a1439ff268f1364495389aa25 efbbc0624dbbc74a63909e8471afd3e8b25a831f08877a2813ab321e5e3f631f
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/img/nrf/nrf-logo.png HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Wed, 24 Apr 2024 15:09:42 GMT
Accept-Ranges: bytes
Content-Length: 247035
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Content-Type: image/png
|
|
| www.nrf.go.ke/hackathon/assets/fonts/LineIcons.ttf?tc3uo0 | 41.204.160.15 | 200 OK | 102 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/fonts/LineIcons.ttf?tc3uo0 IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeTrueType Font data, 11 tables, 1st "OS/2", 14 names, Macintosh, type 1 string, LineIcons Size102 kB (101616 bytes) Hashc3eb13c7cec2990d6fd4e3ee80d0ea61 f187de04ae16831a31226b1350b1d610971d2a73 a29ccf578a290cfb7192db8bceefaf536481e21cdf23ca8d6829fe89022c84d2
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/fonts/LineIcons.ttf?tc3uo0 HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/assets/fonts/line-icons.css
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Thu, 18 Apr 2024 09:01:00 GMT
Accept-Ranges: bytes
Content-Length: 101616
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: font/ttf
|
|
| www.nrf.go.ke/hackathon/assets/img/nrf/icons/arrival.png | 41.204.160.15 | 200 OK | 11 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/img/nrf/icons/arrival.png IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typePNG image data, 381 x 381, 8-bit/color RGBA, non-interlaced Hash50a8cf509f85137c1fc3540a4e6829d0 256b1dbaf012d9cc93a35c2a9132fdf153432080 008afe6c6467fc3d4fb912200d4630d1ccc2255f75fea28b913614deee4e140c
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/img/nrf/icons/arrival.png HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Wed, 24 Apr 2024 15:06:58 GMT
Accept-Ranges: bytes
Content-Length: 11277
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Content-Type: image/png
|
|
| www.nrf.go.ke/hackathon/assets/img/nrf/slides/slide-4.jpg | 41.204.160.15 | 200 OK | 81 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/img/nrf/slides/slide-4.jpg IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeJPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1280x640, components 3 Hash7cfe59ac3a676829f4046ae2fdb7928a d8461946fcb051bce4757c833a1a527b689ac579 c9d940d728bc12b33892c2693a2855efec70f62acc81ce64915936b4c62c3d33
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/img/nrf/slides/slide-4.jpg HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Thu, 25 Apr 2024 06:01:53 GMT
Accept-Ranges: bytes
Content-Length: 81292
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: image/jpeg
|
|
| www.nrf.go.ke/hackathon/assets/img/nrf/slides/slide-1.jpg | 41.204.160.15 | 200 OK | 110 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/img/nrf/slides/slide-1.jpg IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeJPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1600x800, components 3 Size110 kB (109904 bytes) Hashe33d0662dd117529b8cb71a6b2a8f90e 796cd19b016e2e2ba9b90ed60bb5141ae43f95e4 06a8224a72cfd0443e5b8c5b12c28c8ada405d2fb6a9473cfe42dc52e463d7f8
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/img/nrf/slides/slide-1.jpg HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Thu, 25 Apr 2024 06:01:53 GMT
Accept-Ranges: bytes
Content-Length: 109904
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: image/jpeg
|
|
| www.nrf.go.ke/hackathon/assets/img/nrf/icons/registration.png | 41.204.160.15 | 200 OK | 15 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/img/nrf/icons/registration.png IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typePNG image data, 381 x 381, 8-bit/color RGBA, non-interlaced Hash585b6f19e4d1cc29ced1e73d3a8129dc 8d799bef9fa02f44132463260dd9a145fea38fa7 b650cad0b87904dee3e403f7572c5b7b33bbfb923f64b661b59412251adf42df
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/img/nrf/icons/registration.png HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Wed, 24 Apr 2024 15:06:58 GMT
Accept-Ranges: bytes
Content-Length: 14965
Keep-Alive: timeout=5, max=95
Connection: Keep-Alive
Content-Type: image/png
|
|
| www.nrf.go.ke/hackathon/assets/img/nrf/icons/express-hacking.png | 41.204.160.15 | 200 OK | 14 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/img/nrf/icons/express-hacking.png IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typePNG image data, 380 x 381, 8-bit/color RGBA, non-interlaced Hashc1140a984ed2e1d1c92f2a7bd4c1b9fe 816aa0a3594fa8a0eb8c774c7840fbd2c620e39a 2690d1b5ddcfe2a3c41e10af2cada85d2fde76c3b950f7461d6349b803b5a776
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/img/nrf/icons/express-hacking.png HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Wed, 24 Apr 2024 15:06:58 GMT
Accept-Ranges: bytes
Content-Length: 14060
Keep-Alive: timeout=5, max=95
Connection: Keep-Alive
Content-Type: image/png
|
|
| www.nrf.go.ke/hackathon/assets/img/nrf/Mentor%20M1.png | 41.204.160.15 | 200 OK | 23 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/img/nrf/Mentor%20M1.png IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typePNG image data, 601 x 601, 8-bit/color RGBA, non-interlaced Hasha13c27e51703196b032eaf1596c89061 4c550fb7ec8036d92195d612fc2b2b9c47184ee8 4fb2368ab0627043eb30f3045762c90be48d2ab2c8f3f68c9e81cf2bebeffc93
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/img/nrf/Mentor%20M1.png HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Tue, 23 Apr 2024 13:08:12 GMT
Accept-Ranges: bytes
Content-Length: 22743
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: image/png
|
|
| www.nrf.go.ke/hackathon/assets/img/nrf/Mentor%20F1.png | 41.204.160.15 | 200 OK | 21 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/img/nrf/Mentor%20F1.png IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typePNG image data, 601 x 601, 8-bit/color RGBA, non-interlaced Hash6dfcdce1c4c21ce438d1f0d6a9c22f01 f599b4d9a88604130f5c99ea6f9210637d3e074e 7d59b5f840754dec6bcc36320058c32c39df20a2296ada669bf8b9a4a324b662
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/img/nrf/Mentor%20F1.png HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Tue, 23 Apr 2024 13:08:12 GMT
Accept-Ranges: bytes
Content-Length: 21171
Keep-Alive: timeout=5, max=95
Connection: Keep-Alive
Content-Type: image/png
|
|
| www.nrf.go.ke/hackathon/assets/img/nrf/slides/slide-2.jpg | 41.204.160.15 | 200 OK | 76 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/img/nrf/slides/slide-2.jpg IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeJPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1280x640, components 3 Hashcd4c0183e1063c9e717538965dc04a4a 2606091482a5c35a57281b0fbb65c4cec5caf4fc cd1ec283b7a51ba5f2d050a3406ab9e3931d804f2f40bec82015e42eeffdc42a
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/img/nrf/slides/slide-2.jpg HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Thu, 25 Apr 2024 06:01:53 GMT
Accept-Ranges: bytes
Content-Length: 75541
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: image/jpeg
|
|
| www.nrf.go.ke/hackathon/assets/img/nrf/icons/innovate.png | 41.204.160.15 | 200 OK | 15 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/img/nrf/icons/innovate.png IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typePNG image data, 381 x 381, 8-bit/color RGBA, non-interlaced Hashcde920a547a98483ca1e0447c6f3d3aa 4352bc3ff2d6ccc87379f8bbec6d6cca2b4b0599 f5128b7d2e209545edaa79e1d0943e90d7d11d6866432ba80ecd31907f836496
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/img/nrf/icons/innovate.png HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Wed, 24 Apr 2024 15:06:58 GMT
Accept-Ranges: bytes
Content-Length: 14688
Keep-Alive: timeout=5, max=94
Connection: Keep-Alive
Content-Type: image/png
|
|
| www.nrf.go.ke/hackathon/assets/img/nrf/icons/presentation.png | 41.204.160.15 | 200 OK | 12 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/img/nrf/icons/presentation.png IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typePNG image data, 381 x 381, 8-bit/color RGBA, non-interlaced Hash4efaeba3f23850b4fda97384950e90c1 529e976d14d5ab1fed2cea3675efc29957b98f6e c5f161d2da497668fd3743390fb2b4852673482d3f63cad1be769f05a6df4097
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/img/nrf/icons/presentation.png HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Wed, 24 Apr 2024 15:06:58 GMT
Accept-Ranges: bytes
Content-Length: 11561
Keep-Alive: timeout=5, max=94
Connection: Keep-Alive
Content-Type: image/png
|
|
| www.nrf.go.ke/hackathon/assets/img/nrf/slides/slide-3.jpg | 41.204.160.15 | 200 OK | 81 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/img/nrf/slides/slide-3.jpg IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typeJPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1280x640, components 3 Hash3f3aaadb95a098035b7e4afb0e90645b 43f96a33db5525dd76c1b5ff6e39fd322db1fe82 4105bd57f945e59eb8076855802e27ac727f906097ecc292195d30d6bcf27dff
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/img/nrf/slides/slide-3.jpg HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:17 GMT
Server: Apache
Last-Modified: Thu, 25 Apr 2024 06:01:53 GMT
Accept-Ranges: bytes
Content-Length: 80637
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: image/jpeg
|
|
| www.nrf.go.ke/hackathon/assets/img/nrf/icons/awards.png | 41.204.160.15 | 200 OK | 11 kB |
URL GET HTTP/1.1www.nrf.go.ke/hackathon/assets/img/nrf/icons/awards.png IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typePNG image data, 382 x 382, 8-bit/color RGBA, non-interlaced Hash979aef4a8a5c0dd13a774ffb03a1c549 1a4ffcc8d0c8cbbbcedd2bdc27e8bcb410f3009e 1f87a00a1895747fe24837deb30e1b90956857a53c371695b9c4e5c70247c7e2
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /hackathon/assets/img/nrf/icons/awards.png HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:18 GMT
Server: Apache
Last-Modified: Wed, 24 Apr 2024 15:06:58 GMT
Accept-Ranges: bytes
Content-Length: 11172
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Content-Type: image/png
|
|
| www.nrf.go.ke/favicon.ico | 41.204.160.15 | 302 Found | 0 B |
URL GET HTTP/1.1www.nrf.go.ke/favicon.ico IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
Hashd41d8cd98f00b204e9800998ecf8427e da39a3ee5e6b4b0d3255bfef95601890afd80709 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /favicon.ico HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/hackathon/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 302 Found
Date: Thu, 25 Apr 2024 06:07:18 GMT
Server: Apache
Link: <https://www.nrf.go.ke/wp-json/>; rel="https://api.w.org/"
X-Redirect-By: WordPress
Location: https://www.nrf.go.ke/wp-content/uploads/2023/03/nrf-logo.png
Content-Length: 0
Keep-Alive: timeout=5, max=93
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
|
|
| www.nrf.go.ke/wp-content/uploads/2023/03/nrf-logo.png | 41.204.160.15 | 200 OK | 25 kB |
URL GET HTTP/1.1www.nrf.go.ke/wp-content/uploads/2023/03/nrf-logo.png IP41.204.160.15:443 ASN#36914 Kenya Education Network
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerLet's Encrypt Subjectnrf.go.ke FingerprintBD:8D:C9:62:26:C5:C3:8C:08:CF:83:7D:D7:76:65:5E:54:14:38:CB ValidityTue, 02 Apr 2024 20:57:41 GMT - Mon, 01 Jul 2024 20:57:40 GMT
File typePNG image data, 150 x 150, 8-bit/color RGB, non-interlaced Hashc7d508a86af63fc36bd6735e858fa44c 087f7aa01a7053b3654cc6c196f0147b5228a284 9f3f1dbbff151b275fbdd53113a62dd15251e1c99ed6ad16b34d316a760a0c52
Analyzer | Verdict | Alert | Quad9 DNS | malicious | Sinkholed |
GET /wp-content/uploads/2023/03/nrf-logo.png HTTP/1.1
Host: www.nrf.go.ke
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: https://www.nrf.go.ke/hackathon/
DNT: 1
Connection: keep-alive
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 25 Apr 2024 06:07:19 GMT
Server: Apache
Last-Modified: Wed, 08 Mar 2023 17:23:08 GMT
Accept-Ranges: bytes
Content-Length: 25322
Keep-Alive: timeout=5, max=92
Connection: Keep-Alive
Content-Type: image/png
|
|
| fonts.googleapis.com/css?family=Poppins:400|Poppins:700 | 142.250.74.170 | 200 OK | 1.5 kB |
URL GET HTTP/2fonts.googleapis.com/css?family=Poppins:400|Poppins:700 IP142.250.74.170:443
Requested byhttps://www.nrf.go.ke/hackathon/ CertificateIssuerGoogle Trust Services LLC Subjectupload.video.google.com Fingerprint15:CB:F7:AC:18:3F:DC:1E:F9:4E:94:D1:98:40:40:61:53:17:28:F2 ValidityMon, 18 Mar 2024 20:35:28 GMT - Mon, 10 Jun 2024 20:35:27 GMT
File typeASCII text, with very long lines (1514), with no line terminators Hashcdd27ecea9cbc9c753cb675baddd6d40 e1d522b1605f5c3a64732f68b6761fd1b216f29e bacce4fbde5cf76978790324df62db4f7aadc19edf9fb435c91e9079472c3db6
GET /css?family=Poppins:400|Poppins:700 HTTP/1.1
Host: fonts.googleapis.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://www.nrf.go.ke/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
content-type: text/css; charset=utf-8
access-control-allow-origin: *
timing-allow-origin: *
link: <https://fonts.gstatic.com>; rel=preconnect; crossorigin
strict-transport-security: max-age=31536000
expires: Thu, 25 Apr 2024 06:07:23 GMT
date: Thu, 25 Apr 2024 06:07:23 GMT
cache-control: private, max-age=86400
cross-origin-resource-policy: cross-origin
cross-origin-opener-policy: same-origin-allow-popups
content-encoding: gzip
server: ESF
x-xss-protection: 0
x-frame-options: SAMEORIGIN
x-content-type-options: nosniff
alt-svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
X-Firefox-Spdy: h2
|
|