URL: http://202.57.55.10:19001/tftp
Submission: On June 27 via manual from GR — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 0 domains to perform 2 HTTP transactions. The main IP is 202.57.55.10, located in Pasay, Philippines and belongs to PHILCOMNET-PH Philippine Global Communications Corporation, PH. The main domain is 202.57.55.10.
This is the only time 202.57.55.10 was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 202.57.55.10 9927 (PHILCOMNE...)
2 1
Apex Domain
Subdomains
Transfer
2 0
Domain Requested by
2 0

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://202.57.55.10:19001/tftp
Frame ID: D5655903EA94232A0792C49FA4765A1F
Requests: 2 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://202.57.55.10:19001/tftp HTTP 307
    https://202.57.55.10:19001/tftp HTTP 307
    http://202.57.55.10:19001/tftp Page URL

Page Statistics

2
Requests

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

1
IPs

1
Countries

110 kB
Transfer

109 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://202.57.55.10:19001/tftp HTTP 307
    https://202.57.55.10:19001/tftp HTTP 307
    http://202.57.55.10:19001/tftp Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request tftp
202.57.55.10/
Redirect Chain
  • http://202.57.55.10:19001/tftp
  • https://202.57.55.10:19001/tftp
  • http://202.57.55.10:19001/tftp
100 KB
100 KB
Document
General
Full URL
http://202.57.55.10:19001/tftp
Protocol
HTTP/1.1
Server
202.57.55.10 Pasay, Philippines, ASN9927 (PHILCOMNET-PH Philippine Global Communications Corporation, PH),
Reverse DNS
Software
/
Resource Hash
5825e1381f8ecfc8420242db3f0e56f935722bc9e77e2ed8f7ee6189e185c99e
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9;q=0.9
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Cache-Control
maxage=7200,must-revalidate
Connnection
Close
Date
Wed Jan 14 15:11:23 2009
ETag
Expires
Wed Jan 14 17:11:23 2009
X-Frame-Options
SAMEORIGIN
content-length
102400
content-type
text/html; Charset=UTF-8

Redirect headers

Location
http://202.57.55.10:19001/tftp
Non-Authoritative-Reason
HttpsUpgrades
favicon.ico
202.57.55.10/
9 KB
10 KB
Other
General
Full URL
http://202.57.55.10:19001/favicon.ico
Protocol
HTTP/1.1
Server
202.57.55.10 Pasay, Philippines, ASN9927 (PHILCOMNET-PH Philippine Global Communications Corporation, PH),
Reverse DNS
Software
/
Resource Hash
dd9c37bc9a3fcafd9f718829e41651a3eb4cfefcd9b665aba4fae89922bd0ff5
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9;q=0.9
Referer
http://202.57.55.10:19001/tftp
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Date
Wed Jan 14 15:11:28 2009
ETag
1563941033-9662
X-Frame-Options
SAMEORIGIN
content-type
text/html; Charset=UTF-8
Cache-Control
maxage=7200,must-revalidate
Connnection
Close
content-length
9662
Expires
Wed Jan 14 17:11:28 2009

Verdicts & Comments Add Verdict or Comment

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

undefined| event object| fence

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options SAMEORIGIN

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

202.57.55.10
5825e1381f8ecfc8420242db3f0e56f935722bc9e77e2ed8f7ee6189e185c99e
dd9c37bc9a3fcafd9f718829e41651a3eb4cfefcd9b665aba4fae89922bd0ff5