192.145.245.14
Open in
urlscan Pro
192.145.245.14
Public Scan
Effective URL: https://192.145.245.14:4443/remote/login?lang=en
Submission: On September 18 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by support on December 8th 2017. Valid for: 20 years.
This is the only time 192.145.245.14 was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 192.145.245.14 192.145.245.14 | 14828 (HBCI-1999TA) (HBCI-1999TA) | |
9 | 1 |
ASN14828 (HBCI-1999TA, US)
PTR: 192-145-245-14.245.145.192.in-addr.arpa
192.145.245.14 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 | 0 |
Domain | Requested by | |
---|---|---|
9 | 0 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
FGT80E4Q17016437 support |
2017-12-08 - 2038-01-19 |
20 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://192.145.245.14:4443/remote/login?lang=en
Frame ID: 6589B86156CB026B27CD5E5FF46D663F
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Please LoginPage URL History Show full URLs
- https://192.145.245.14:4443/ Page URL
-
https://192.145.245.14:4443/remote/login
HTTP 302
https://192.145.245.14:4443/remote/login?lang=en Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://192.145.245.14:4443/ Page URL
-
https://192.145.245.14:4443/remote/login
HTTP 302
https://192.145.245.14:4443/remote/login?lang=en Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
192.145.245.14/ |
131 B 676 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login
192.145.245.14/remote/ Redirect Chain
|
5 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
192.145.245.14/ |
90 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
legacy-main.css
192.145.245.14/css/ |
1 MB 82 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
legacy_theme_setup.js
192.145.245.14/js/ |
303 KB 45 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.js
192.145.245.14/sslvpn/js/ |
17 KB 4 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fgt_lang
192.145.245.14/remote/ |
1 MB 1 MB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ftnt-icons.woff
192.145.245.14/fonts/ |
49 KB 49 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lato-regular.woff2
192.145.245.14/ |
23 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
27 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| documentPictureInPicture object| my_xmlhttp boolean| buf_request_in_progress boolean| token_push_request_in_progress string| famreqid string| pol_id string| grp string| pass_renew string| peer object| elm_ftm_push_enabled string| ftm_pushed_enabled function| get_xmlhttp function| handle_buffer_ready function| login_send_request function| handle_buffer_statechange function| try_login function| try_skip function| try_ftm_push function| login_get_cmd_kbd_event function| login_crack_kbd_event function| key_pressdown function| abort_current_request function| launchFortiClient function| launchSamlLogin object| fgt_lang function| load_login_strings0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | frame-ancestors 'self'; object-src 'self'; script-src 'self' https: 'unsafe-eval' 'unsafe-inline' blob:; |
Strict-Transport-Security | max-age=31536000 |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
192.145.245.14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