Report Overview

  1. Submitted URL

    raw.githubusercontent.com/DangerousPrototypes/dangerous-prototypes-open-hardware/master/Logic_Pirate/packages/Logic_Pirate_User_Package.zip

  2. IP

    185.199.109.133

    ASN

    #54113 FASTLY

  3. Submitted

    2024-04-24 13:21:43

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    1

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
raw.githubusercontent.com358022014-02-062014-03-012024-04-23

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/DangerousPrototypes/dangerous-prototypes-open-hardware/master/Logic_Pirate/packages/Logic_Pirate_User_Package.zip

  2. IP

    185.199.110.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    167 kB (166934 bytes)

  2. Hash

    38cb5966a721fe9355969ee50b398f2b

    3dccc144f904af189d680b6622d09bf93195e952

  1. Archive (6)

  2. FilenameMd5File type
    mchpcdc.cat
    68437caa8337ba0fc1caa140a008cebc
    DER Encoded PKCS#7 Signed Data
    mchpcdc.inf
    2297a1e5fc930347126e8ceb9a83e894
    Windows setup INFormation
    logic_pirate_40_MHz.hex
    4b96e2ff3c5eee51d9ed37e1f3535d47
    ASCII text, with CRLF line terminators
    logic_pirate_60_MHz.hex
    425097c4e04df965570fcd5a08c792f7
    ASCII text, with CRLF line terminators
    PIC32UBL.exe
    d6534ec46d75bc03d30644d7df110d18
    PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
    set_test_pin.py
    ed7d14d2448fecdc9cc007075dbdcf68
    ASCII text, with CRLF line terminators

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
raw.githubusercontent.com/DangerousPrototypes/dangerous-prototypes-open-hardware/master/Logic_Pirate/packages/Logic_Pirate_User_Package.zip
185.199.110.133200 OK167 kB