synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to
Open in
urlscan Pro
185.151.21.177
Public Scan
Effective URL: https://synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/login?redir=%2Fng
Submission: On March 22 via api from US — Scanned from US
Summary
TLS certificate: Issued by FortiGate on March 5th 2023. Valid for: 2 years.
This is the only time synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 185.151.21.177 185.151.21.177 | 8540 (AMANET-AS) (AMANET-AS) | |
9 | 1 |
ASN8540 (AMANET-AS, AT)
PTR: 177-21-151-185.teletronic.at
synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
quickconnect.to
1 redirects
synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to |
372 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
10 | synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to |
1 redirects
synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
FortiGate FortiGate |
2023-03-05 - 2025-06-07 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/login?redir=%2Fng
Frame ID: FE01220672365704E411303F44358560
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/
HTTP 302
https://synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/ng Page URL
- https://synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/login?redir=%2Fng Page URL
Detected technologies
RequireJS (JavaScript Frameworks) ExpandDetected patterns
- require.*\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/
HTTP 302
https://synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/ng Page URL
- https://synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/login?redir=%2Fng Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/ HTTP 302
- https://synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/ng
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
ng
synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/ Redirect Chain
|
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
require_all.js
synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/9b38f56b73e613560187d4c2945bb183/js/ |
27 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ng_all.js
synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/9b38f56b73e613560187d4c2945bb183/ng/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login
synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/ |
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main-green.css
synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/9b38f56b73e613560187d4c2945bb183/css/ |
1 MB 94 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.js
synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/9b38f56b73e613560187d4c2945bb183/js/ |
7 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
en.json
synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/9b38f56b73e613560187d4c2945bb183/lang/ |
763 KB 191 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lato-regular.woff2
synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/9b38f56b73e613560187d4c2945bb183/fonts/ |
27 KB 28 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ftnt-icons.woff
synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to/9b38f56b73e613560187d4c2945bb183/fonts/ |
40 KB 41 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
49 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| fgt_lang object| my_xmlhttp boolean| buf_request_in_progress object| ftm_push_status_timeout object| elm_username object| elm_secretkey object| elm_twofactor object| elm_authtoken object| elm_tokenmsg object| elm_tokencode object| elm_ftm_push_enabled number| ftm_pushed_enabled object| elm_button object| str_table string| GUI_LOGIN_STATUS_OK string| GUI_LOGIN_STATUS_LOCKOUT string| GUI_LOGIN_STATUS_NEED_TFA string| GUI_LOGIN_STATUS_CHANGE_PWD string| GUI_LOGIN_STATUS_FTM_PUSH_PARAMS string| GUI_LOGIN_STATUS_FTM_PUSH_STATUS string| GUI_LOGIN_STATUS_FTM_PUSH_FAILURE string| FNBAM_SUCCESS string| FNBAM_DENIED string| FNBAM_PENDING string| FNBAM_ERROR function| getQueryValue function| login_sso function| login_send_request function| handle_buffer_statechange function| addQuery function| try_login function| trigger_ftm_push function| get_ftm_push_status function| start_ftm_push_poll function| cancel_ftm_push_poll function| update_error_status_line function| clear_error_status_line function| update_warning_status_line function| handle_buffer_ready function| disable_input function| reenable_input function| login_get_cmd_kbd_event function| login_crack_kbd_event function| key_pressdown function| update_token_msg function| showToken function| clear_input function| abort_current_request string| FNBAM_NEED_TOKEN0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | frame-ancestors 'self' |
Strict-Transport-Security | max-age=15552000 |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
synoinstall-mzg3o93y1msbz5ho.direct.quickconnect.to
185.151.21.177
0c76edd76812558784cda76b3a12847548c5cfa797d873039a2511c1e1adf58b
102943ed92e6b630524219140e47212597da44bc6d175ff7e86c93f13435bb21
2ee055921e5460e768980da0e441063d23f4320ea15e232a4f77ffcbe5b4f74f
3b347dfcb1d710018a78e37b373b323c7bd3334cdd5bb94ddbd3a1b7bd213404
6aa37c694de8768116689094e2859536a85edfd9c466ffc1e75e8081ffea2806
a33c339ba7510aec5b0d59f39eb27e171e0d1cfd1f24fc86b8644484e00633f2
b47fa79a8a4dd640582235619c339fbd4f999e1e3ac7e168273c41a14d7de00c
ca48645a97bfcf2933a887a8db171fa7d07deb39fef1049540b4b4b44d49a4b3