synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to
Open in
urlscan Pro
101.3.131.122
Public Scan
Submission: On February 19 via api from US — Scanned from US
Summary
TLS certificate: Issued by R3 on January 3rd 2024. Valid for: 3 months.
This is the only time synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 101.3.131.122 101.3.131.122 | 131627 (PEICITY-A...) (PEICITY-AS-TW Peicity Digital Cable Television.) | |
8 | 1 |
ASN131627 (PEICITY-AS-TW Peicity Digital Cable Television., LTD, TW)
synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
quickconnect.to
synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to |
161 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
8 | synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to |
synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to
|
8 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
repair.astscitech.com R3 |
2024-01-03 - 2024-04-02 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to/
Frame ID: 22B4018872CD8BA16AE8BCF7E4A610EA
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
登錄頁面Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to/ |
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to/Scripts/ |
94 KB 42 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Account.js
synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to/Scripts/ |
2 KB 959 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common.js
synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to/Scripts/ |
20 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to/Content/fontawesome/css/ |
30 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
verify_code.ashx
synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to/Core/ |
909 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ast.jpg
synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to/Content/Images/ |
25 KB 25 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff2
synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to/Content/fontawesome/fonts/ |
75 KB 75 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
30 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| LoginSys function| ChangeDb object| _YMGlobal function| getQueryString function| getUrlParam function| GetGuid function| JsonMessage function| DateFormat function| RemoveLastChar function| AnalyzeArr function| strLen function| ischinese function| customTabs function| SendMessage function| SelMemberList function| Upload function| UploadSpec function| AttachUpload function| AttachUpdate function| changeTwoDecimal function| isDate_yyyyMMdd function| isExitsFunction function| isExitsVariable function| showLoading function| hideLoading function| getDateInfo string| userAgent object| jQuery1113056966179202248451 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to/ | Name: ASP.NET_SessionId Value: nwwx5w1ql1vyls50sespfs0v |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
synoinstall-ypgdum5eqi6eyg05.direct.quickconnect.to
101.3.131.122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