www.employerpay.com.au
Open in
urlscan Pro
203.18.160.172
Public Scan
Effective URL: https://www.employerpay.com.au/openid-connect-server-webapp/login
Submission Tags: falconsandbox
Submission: On January 23 via api from US — Scanned from AU
Summary
TLS certificate: Issued by RapidSSL Global TLS RSA4096 SHA256 20... on October 4th 2022. Valid for: a year.
This is the only time www.employerpay.com.au was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 3.33.209.153 3.33.209.153 | 16509 (AMAZON-02) (AMAZON-02) | |
1 1 | 13.33.33.15 13.33.33.15 | 16509 (AMAZON-02) (AMAZON-02) | |
4 7 | 203.18.160.172 203.18.160.172 | 17477 (MCT-SYDNE...) (MCT-SYDNEY Macquarie Telecom) | |
4 | 2 |
ASN16509 (AMAZON-02, US)
PTR: a72d2b168aa523aae.awsglobalaccelerator.com
mediasuper.com.au |
ASN16509 (AMAZON-02, US)
PTR: server-13-33-33-15.sin2.r.cloudfront.net
www.mediasuper.com.au |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
employerpay.com.au
4 redirects
www.employerpay.com.au |
294 KB |
2 |
mediasuper.com.au
2 redirects
mediasuper.com.au www.mediasuper.com.au |
1 KB |
4 | 2 |
Domain | Requested by | |
---|---|---|
7 | www.employerpay.com.au |
4 redirects
www.employerpay.com.au
|
1 | www.mediasuper.com.au | 1 redirects |
1 | mediasuper.com.au | 1 redirects |
4 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.employerpay.com.au RapidSSL Global TLS RSA4096 SHA256 2022 CA1 |
2022-10-04 - 2023-10-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.employerpay.com.au/openid-connect-server-webapp/login
Frame ID: 9210B0CD4E66D16DDA6EDE6F3A6B6DBB
Requests: 4 HTTP requests in this frame
Screenshot
Page Title
LoginPage URL History Show full URLs
-
http://mediasuper.com.au/employer-login
HTTP 301
https://www.mediasuper.com.au/employer-login HTTP 301
https://www.employerpay.com.au/openid-connect-server-webapp/login HTTP 302
http://www.employerpay.com.au/EmployerPortal/home/ HTTP 307
https://www.employerpay.com.au/EmployerPortal/home/ HTTP 302
https://www.employerpay.com.au/EmployerPortal/home/openid_connect_login HTTP 302
https://www.employerpay.com.au/openid-connect-server-webapp/authorize?response_type=code&client_id=4dfc63ed... HTTP 302
https://www.employerpay.com.au/openid-connect-server-webapp/login Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://mediasuper.com.au/employer-login
HTTP 301
https://www.mediasuper.com.au/employer-login HTTP 301
https://www.employerpay.com.au/openid-connect-server-webapp/login HTTP 302
http://www.employerpay.com.au/EmployerPortal/home/ HTTP 307
https://www.employerpay.com.au/EmployerPortal/home/ HTTP 302
https://www.employerpay.com.au/EmployerPortal/home/openid_connect_login HTTP 302
https://www.employerpay.com.au/openid-connect-server-webapp/authorize?response_type=code&client_id=4dfc63ed-a683-4db1-8e23-4c34eb5eb31f&scope=address+phone+openid+profile+email&redirect_uri=https%3A%2F%2Fwww.employerpay.com.au%2FEmployerPortal%2Fhome%2Fopenid_connect_login&nonce=1bfc3dbf8ad86&state=2452da259b748&vnd-branding-css-url=%2Fep-branding%2Fqsuper%2Fdefault%2Fbranding.css HTTP 302
https://www.employerpay.com.au/openid-connect-server-webapp/login Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login
www.employerpay.com.au/openid-connect-server-webapp/ Redirect Chain
|
12 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
www.employerpay.com.au/openid-connect-server-webapp/resources/js/lib/ |
278 KB 278 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
branding.css
www.employerpay.com.au/ep-branding/qsuper/default/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loginNotification
www.employerpay.com.au/openid-connect-server-webapp/ |
0 602 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.employerpay.com.au
- URL
- https://www.employerpay.com.au/ep-branding/qsuper/default/branding.css?v=17934
Verdicts & Comments Add Verdict or Comment
17 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange function| $ function| jQuery string| brandingURL object| userScope boolean| autoCompletePassword object| notificationContent object| notificationTitle object| notificationCategory number| random object| headID object| cssNode function| preSubmit function| showPage function| showNotificationBox function| handleNotificationBox function| getNotificationAndShow6 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.employerpay.com.au/openid-connect-server-webapp | Name: JSESSIONID Value: 3659E89903EF0BA6C99031172980D0EB |
|
mediasuper.com.au/ | Name: AWSALB Value: /MmFV4CoH/E/OT3h1DYEobYP/OIleeT2YQhfNjsdC/TPo8gNDaRYSdkEO4E35C9Sa0T1kfVUWbpDdnrT8AnQEdb+r9+sHqVZp6m0xi0cIbJQmy6ZN1pZeSzz1p10 |
|
www.mediasuper.com.au/ | Name: AWSALB Value: lp30eHrzg4KAsiEALy55SFC7+coALaxS4IoVHJVyebxtlBWXXCGvxzMjPb+6Om6A+pY8bVv3HAmzPO5p69/IZ/OsJ1MIf+08Eu8dVHAdGrd+e9X8Eh4f+Ff9I8h9 |
|
www.mediasuper.com.au/ | Name: AWSALBCORS Value: lp30eHrzg4KAsiEALy55SFC7+coALaxS4IoVHJVyebxtlBWXXCGvxzMjPb+6Om6A+pY8bVv3HAmzPO5p69/IZ/OsJ1MIf+08Eu8dVHAdGrd+e9X8Eh4f+Ff9I8h9 |
|
www.employerpay.com.au/ | Name: JSESSIONID_EHOME Value: 638D6AE8100E556E727D56BCD33020F0 |
|
www.employerpay.com.au/ | Name: JSESSIONID Value: 04D69859DB39C8370D0FFA5F95F3FF24 |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=63072000; includeSubdomains; max-age=31536000 ; includeSubDomains |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1;mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
mediasuper.com.au
www.employerpay.com.au
www.mediasuper.com.au
www.employerpay.com.au
13.33.33.15
203.18.160.172
3.33.209.153
2065aecca0fb9b0567358d352ed5f1ab72fce139bf449b4d09805f5d9c3725ed
721ceeaa9b7aeac45dee3297fe1455ad46150fc16734777e899fa72c0b17ac28
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855