Help
RSS
API
Feed
Maltego
Contact
Domain > 4x4net-g.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-09-12
219.94.128.45
(
ClassC
)
Port 80
HTTP/1.1 200 OKServer: nginxDate: Sun, 19 May 2024 00:39:33 GMTContent-Type: text/htmlContent-Length: 8934Connection: keep-aliveLast-Modified: Wed, 19 Jul 2006 23:44:26 GMTETag: 22e6-418f7d7f52a80Acce !--To put this html into an existing HTML document, you must copy the JavaScript and-->!--paste it in a specific location within the destination HTML document. You must then copy-->!--and paste the table in a different location.-->html>head>title>Net Garage-TOP/title>meta http-equivContent-Type contenttext/html; charsetShift_JIS>meta namedescription contentFireworks Splice HTML>!-- Fireworks 3.0 Dreamweaver 3.0 target. Created Thu Mar 15 17:25:33 GMT+0900 (???? (?W?€??)) 2001 -->script languageJavaScript>!--hide this script from non-javascript-enabled browsersfunction MM_findObj(n, d) { //v3.0 var p,i,x; if(!d) ddocument; if((pn.indexOf(?))>0&&parent.frames.length) { dparent.framesn.substring(p+1).document; nn.substring(0,p);} if(!(xdn)&&d.all) xd.alln; for (i0;!x&&id.forms.length;i++) xd.formsin; for(i0;!x&&d.layers&&id.layers.length;i++) xMM_findObj(n,d.layersi.document); return x;}/* Functions that swaps images. */function MM_swapImage() { //v3.0 var i,j0,x,aMM_swapImage.arguments; document.MM_srnew Array; for(i0;i(a.length-2);i+3) if ((xMM_findObj(ai))!null){document.MM_srj++x; if(!x.oSrc) x.oSrcx.src; x.srcai+2;}}function MM_swapImgRestore() { //v3.0 var i,x,adocument.MM_sr; for(i0;a&&ia.length&&(xai)&&x.oSrc;i++) x.srcx.oSrc;}/* Functions that handle preload. */function MM_preloadImages() { //v3.0 var ddocument; if(d.images){ if(!d.MM_p) d.MM_pnew Array(); var i,jd.MM_p.length,aMM_preloadImages.arguments; for(i0; ia.length; i++) if (ai.indexOf(#)!0){ d.MM_pjnew Image; d.MM_pj++.srcai;}}}// stop hiding -->/script>/head>body bgcolor#ffffff onLoadMM_preloadImages(index_r02_c1_f2.gif,index_r04_c1_f2.gif,index_r06_c1_f2.gif,index_r08_c1_f2.gif,index_r10_c1_f2.gif,index_r12_c1_f2.gif,index_r14_c1_f2.gif,index_r16_c1_f2.gif,index_r18_c1_f2.gif);>!--The following section is an HTML table which reassembles the sliced image in a browser.-->!--Copy the table section including the opening and closing table tags, and paste the data where-->!--you want the reassembled image to appear in the destination d
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]