aztec.vpn.inside.telstra.com
Open in
urlscan Pro
203.38.12.157
Public Scan
Effective URL: https://aztec.vpn.inside.telstra.com/vdesk/hangup.php3
Submission: On July 11 via automatic, source certstream-suspicious — Scanned from AU
Summary
TLS certificate: Issued by DigiCert Global G2 TLS RSA SHA256 202... on August 3rd 2023. Valid for: a year.
This is the only time aztec.vpn.inside.telstra.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 9 | 203.38.12.157 203.38.12.157 | 1221 (ASN-TELST...) (ASN-TELSTRA Telstra Limited) | |
7 | 1 |
ASN1221 (ASN-TELSTRA Telstra Limited, AU)
aztec.vpn.inside.telstra.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
telstra.com
2 redirects
aztec.vpn.inside.telstra.com |
74 KB |
7 | 1 |
Domain | Requested by | |
---|---|---|
9 | aztec.vpn.inside.telstra.com |
2 redirects
aztec.vpn.inside.telstra.com
|
7 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
aztec.vpn.inside.telstra.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2023-08-03 - 2024-08-02 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://aztec.vpn.inside.telstra.com/vdesk/hangup.php3
Frame ID: D4C39C40C9B3FE5C68ECCF6B6BB12BBE
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
BIG-IP logout pagePage URL History Show full URLs
-
https://aztec.vpn.inside.telstra.com/
HTTP 302
https://aztec.vpn.inside.telstra.com/my.policy HTTP 302
https://aztec.vpn.inside.telstra.com/vdesk/hangup.php3 Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://aztec.vpn.inside.telstra.com/
HTTP 302
https://aztec.vpn.inside.telstra.com/my.policy HTTP 302
https://aztec.vpn.inside.telstra.com/vdesk/hangup.php3 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
hangup.php3
aztec.vpn.inside.telstra.com/vdesk/ Redirect Chain
|
5 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
apm.css
aztec.vpn.inside.telstra.com/public/include/css/ |
35 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.js
aztec.vpn.inside.telstra.com/public/include/js/ |
13 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
u_plugin.js
aztec.vpn.inside.telstra.com/public/include/js/ |
41 KB 41 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_image_en.png
aztec.vpn.inside.telstra.com/public/images/customization/Common/aztech_Access_Profile_general_ui/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header-transient.png
aztec.vpn.inside.telstra.com/public/images/my/ |
856 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
aztec.vpn.inside.telstra.com/ |
1 KB 1 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
41 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| addToLog function| addToLogEnter function| addToLogExit function| stringToHex function| Base64encode function| Base64decode function| ltrim function| getExternalBaseURL function| getExternalBaseHost function| getExternalBasePort function| escapeRegex object| ar4cmatch function| get_cookie function| set_cookie function| delete_cookie function| bind function| arrayContains function| isArray function| forEach function| parseJSON function| getXmlDoc object| timeouts number| idleTimeout number| guardTime number| sessionStart number| maxTimeout number| maxGuard function| tryGetTimesFromCookie function| pad function| startCountDown function| getHTTPRequestObject function| objectToParams function| stripBrackets function| getCustomProtocolLink function| UPlugin function| UPluginInstaller function| UPluginHost function| InsertActivexControl function| OnLoad function| setViewport function| onorientationchange1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
aztec.vpn.inside.telstra.com/ | Name: LastMRH_Session Value: 59eadb4a |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | DENY |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aztec.vpn.inside.telstra.com
203.38.12.157
3bb0adcf2106da3b8c4c69f84692bcced4030de20870edc02bf7a87598eb2b45
492d59030435c1398699fe177a0d1c859d92cd4e284236974f785ece8988fe21
4f6cbd71592fe3afe228f05be3e249e087af8c3b3aa22a362544c1ae4248ce89
7a5a317a8030aa4d86465b391d93fc42ff6790ea7e4b3fcfb248a6bb3b8b48de
827e5746a19ee37010e7e9d0536e38466b37e75c41e883f803107d0d184b1401
b18c9c2405201f7ea6f02bd9e67d05b84616e010187199765d6aa87e85805cd5
c0ef3d378a13e4124d22ad0143388456ebddcec6b57c22fcf8ae30b9b14eaa5f