202.14.14.161
Open in
urlscan Pro
202.14.14.161
Public Scan
Effective URL: https://202.14.14.161/?src=connect
Submission: On January 22 via manual from JP — Scanned from SG
Summary
TLS certificate: Issued by OpenVPN Web CA 2022.11.12 16:07:30 +0... on November 11th 2022. Valid for: a year.
This is the only time 202.14.14.161 was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 28 | 202.14.14.161 202.14.14.161 | 56197 (KDDI-SG K...) (KDDI-SG KDDI ASIA PACIFIC PTE. LTD.) | |
25 | 1 |
ASN56197 (KDDI-SG KDDI ASIA PACIFIC PTE. LTD., SG)
PTR: zz2021414161.userreserved.kddi.net.sg
202.14.14.161 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
25 | 0 |
Domain | Requested by | |
---|---|---|
25 | 0 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
172.16.16.90 OpenVPN Web CA 2022.11.12 16:07:30 +08 vpn-kddi-16-90 |
2022-11-11 - 2023-11-12 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://202.14.14.161/?src=connect
Frame ID: 940462B9F13B7F53F6B6A27E8763541A
Requests: 25 HTTP requests in this frame
Screenshot
Page Title
OpenVPN CWSPage URL History Show full URLs
-
https://202.14.14.161/
HTTP 302
https://202.14.14.161/__session_start__ HTTP 302
https://202.14.14.161/ HTTP 302
https://202.14.14.161/?src=connect Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://202.14.14.161/
HTTP 302
https://202.14.14.161/__session_start__ HTTP 302
https://202.14.14.161/ HTTP 302
https://202.14.14.161/?src=connect Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
25 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
202.14.14.161/ Redirect Chain
|
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
load-fonts.css
202.14.14.161/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
all.min.css
202.14.14.161/ |
78 KB 78 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
202.14.14.161/ |
157 KB 157 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap-select.min.css
202.14.14.161/ |
11 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
202.14.14.161/css/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
202.14.14.161/ |
87 KB 88 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popper.min.js
202.14.14.161/ |
19 KB 19 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
202.14.14.161/ |
59 KB 59 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap-select.min.js
202.14.14.161/ |
51 KB 51 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
json2.min.js
202.14.14.161/js/lib/ |
3 KB 4 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
qrcode.js
202.14.14.161/ |
13 KB 13 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo
202.14.14.161/ |
25 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
open-vpn-logo.png
202.14.14.161/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lib-cws.js
202.14.14.161/js/ |
7 KB 8 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
connect-cws.js
202.14.14.161/js/ |
26 KB 26 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
poppins-v9-latin-regular.woff2
202.14.14.161/ |
8 KB 8 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fa-light-300.woff2
202.14.14.161/ |
153 KB 154 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.html
202.14.14.161/html/ |
2 KB 2 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-challenge.html
202.14.14.161/html/ |
627 B 778 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
downloads.html
202.14.14.161/html/ |
5 KB 5 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
import_profile.html
202.14.14.161/html/ |
1 KB 2 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
profiles.html
202.14.14.161/html/ |
2 KB 2 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
password.html
202.14.14.161/html/ |
946 B 1 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
session2.json
202.14.14.161/ |
928 B 2 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
24 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
string| host object| IS_IPADDR_URL function| $ function| jQuery function| Popper object| bootstrap function| qrcode object| stdio object| $ui object| stdui object| Connect string| HTML_VIEWS object| OpenVPN function| CWSController function| UserProfileController function| ChangePasswordController function| LoginController function| DownloadsController function| LoginView function| LoginChallengeView function| DownloadsView function| UserProfileView function| ChangePasswordView function| Credentials1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
202.14.14.161/ | Name: openvpn_sess_o52BamxK76xKYiYziN1LOgB1UjocQ1-ULEigq-uW-MvGl5ndSJVEn4jE7pAJAIWNqlhhRIdj3r6NOKljBTTwhg Value: bH6N5mqAc_-uePu00r62uI2ITbZ5EuFKJcCwStT9ut1h3plmFC-nghSdrs2h6E_ZtobBZbTqRG_OR1dMRIr7LA |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
202.14.14.161
06ce334ffe48dbfd6bee06baaf5fed183e033f258dd00ea388c4ed8aeec2ab13
1aace9b45aa44d3a43ded96a19313090148d581f5059587fe03cbbfb6166be9a
38544024da1a0fc2f706be6582557b5722d17f48ad9a8073594a0cf928e2e3ff
50f51c5162563b91a3bd2cd1d5ffe3091eee193371848199c5486c299f12aebf
5292e677fe712c80863414e9e73f3678d86d409f751392b6803b70a949fc1017
558c1708821688922a35f8105bc9b840a73ae02165d0016746c71741ab48128d
5b902fadbc81f4a8349d0a18b027aa17e2938f59132f530883b7461671cea903
6082321fa006c2afea53132ac86165e4a598f3e53b2721cc8dedcbeacb667e54
6763de73150d26e3296cd0154ff12dede3b5d39251c734c0ae4f8af4e437e4cc
680af6669abc319f9803f0fa26d443df1b6bc29133d88a8e4bea560ffed7288c
69279bee49c5f3502f7a3f07358da1562cc0a10d57e8a56cfc0f8977d367c99f
82d72395d737e8840e78d22c3f9d76f604f53184839eae0e4a6bf77706407110
8ad16ebcc2920635ce21cbf0f6cf21dc1d4db2caa47a08e92dc9f51d566d7b74
94b60bb2a455856a150af70192527cc2de373db6fc6aec5114f595ba4f5b0bc9
96d296336c91c047aca5230e2d4ca303e713f6c26c3928e3778bd0d77c48e3e4
9fe7ad0167a7fc7cf5d36b4a683a35a384cd557569f940e08f3f29fcaf6f45d1
a55559f0be798529230ce6607c6755ea3a8d50fe02bc564e8eacb40640007dce
aec35173a7631923704b1030573be26f3dda488bd0bdb0043fe1f536820f6ba6
af56b6e2ac80cf26dbf5fd22ecfe9dec97b17db4c011fe5bb995c51008f36f43
c3d8c409f0ad78fe1288ba3b3404c06b1722b83ac3a69248e0f356e83d03bf7e
c87456d50a7fa4e006d07c8b6f8fb081ff18325498c6bd17d666bd94867cdf27
dc429d11f6529726da26ea7fbe33bfe10531d29fb0a967536ad663db7e013d33
f9702ca06f17996477501afb9ea9236f6c22168e439968a99433ce60633761ef
fab32ccef85408b763c899ad7c0b910c96c76dc9ed7158ce304fdcd3c0bf8388
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e