- Scan ID:
- e6e61d5b-48fc-442d-a473-ded9b2c6fa20Finished
- Submitted URL:
- https://oast.live/
- Report Finished:
Links · 1 found
The outgoing links identified from the page
Link | Text |
---|---|
https://github.com/projectdiscovery/interactsh | Interactsh |
JavaScript Variables · 3 found
Global JavaScript variables loaded on the window object of a page, are variables declared outside of functions and accessible from anywhere in the code within the current scope
Name | Type |
---|---|
onbeforetoggle | object |
documentPictureInPicture | object |
onscrollend | object |
Console log messages · 0 found
Messages logged to the web console
HTML
The raw HTML body of the page
<html><head></head><body><h1> Interactsh Server </h1>
<a href="https://github.com/projectdiscovery/interactsh"><b>Interactsh</b></a> is an open-source tool for detecting out-of-band interactions. It is a tool designed to detect vulnerabilities that cause external interactions.<br><br>
If you notice any interactions from <b>*.oast.live</b> in your logs, it's possible that someone (internal security engineers, pen-testers, bug-bounty hunters) has been testing your application.<br><br>
You should investigate the sites where these interactions were generated from, and if a vulnerability exists, examine the root cause and take the necessary steps to mitigate the issue.
</body></html>