rs-postel.direct.quickconnect.to
Open in
urlscan Pro
212.204.50.68
Public Scan
Effective URL: https://rs-postel.direct.quickconnect.to/weblogin.htm
Submission: On August 20 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by Vigor Router on February 21st 2024. Valid for: a year.
This is the only time rs-postel.direct.quickconnect.to was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 4 | 212.204.50.68 212.204.50.68 | 12693 (EDISCOM A...) (EDISCOM Am Kanal 4a) | |
1 | 2606:4700:20:... 2606:4700:20::681a:bf9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 3 |
ASN12693 (EDISCOM Am Kanal 4a, 14467 Potsdam, DE)
rs-postel.direct.quickconnect.to |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
quickconnect.to
1 redirects
rs-postel.direct.quickconnect.to |
134 KB |
1 |
draytek.com
www.draytek.com |
194 KB |
0 |
draytek.com.tw
Failed
www.draytek.com.tw Failed |
|
5 | 3 |
Domain | Requested by | |
---|---|---|
4 | rs-postel.direct.quickconnect.to |
1 redirects
rs-postel.direct.quickconnect.to
|
1 | www.draytek.com |
rs-postel.direct.quickconnect.to
|
0 | www.draytek.com.tw Failed |
rs-postel.direct.quickconnect.to
|
5 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
Vigor Router Vigor Router |
2024-02-21 - 2025-03-22 |
a year | crt.sh |
draytek.com E5 |
2024-06-22 - 2024-09-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://rs-postel.direct.quickconnect.to/weblogin.htm
Frame ID: 3162C4ACA95D665047566D680875EC06
Requests: 5 HTTP requests in this frame
Screenshot
Page Title
Vigor Login PagePage URL History Show full URLs
-
https://rs-postel.direct.quickconnect.to/
HTTP 302
https://rs-postel.direct.quickconnect.to/weblogin.htm Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://rs-postel.direct.quickconnect.to/
HTTP 302
https://rs-postel.direct.quickconnect.to/weblogin.htm Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
weblogin.htm
rs-postel.direct.quickconnect.to/ Redirect Chain
|
30 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gettext.min.js
rs-postel.direct.quickconnect.to/js/ |
183 KB 63 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
weblogin.png
rs-postel.direct.quickconnect.to/images/ |
60 KB 60 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
de.json
www.draytek.com.tw/locale/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
de.json
www.draytek.com/locale/ |
671 KB 194 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.draytek.com.tw
- URL
- https://www.draytek.com.tw/locale/de.json
Verdicts & Comments Add Verdict or Comment
30 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| webcfg object| myApp object| availableLangs object| ccMaps function| gettext function| TR object| angular function| $ number| waiting_cnt number| CUST_LOGIN_ENABLE function| enterSubmit function| getObjTime function| formatting function| calculateUptime function| changecode function| initPage function| HttpsLogin function| encode function| createInput function| serializeData function| submitPara function| randomString function| checkwaitingtime function| remoteLoaded function| chglang function| $http object| $scope object| $sce object| $cookies function| $q0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | default-src 'self';frame-ancestors 'self';form-action 'self';script-src 'self' 'nonce-draytek' 'unsafe-eval';style-src 'self' 'nonce-draytek';img-src 'self' data:;connect-src 'self' *.draytek.com *.draytek.com.tw |
Strict-Transport-Security | max-age=31536000; includeSubdomains |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
rs-postel.direct.quickconnect.to
www.draytek.com
www.draytek.com.tw
www.draytek.com.tw
212.204.50.68
2606:4700:20::681a:bf9
1c612f40c2cd4fa3a5f3f00a1352f771ce147893a96cfc88c375a5050a2d8ad7
67e00eabfbb466191bcad3dcad96a988bf40434773fffb4f98968a49f9e646ab
c3b7957eba5c76190aec0543ea2c062995fd534fe37d4ed4f95a7cf18af4f2c3
fb18dc66f3280514fe45ba83e2d14dcdd89ddc1f5ef91110b2c0cf5cfba8a4db