Help
RSS
API
Feed
Maltego
Contact
Domain > access.cpavision.mx
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-05-16
3.93.202.251
(
ClassC
)
2024-12-28
54.157.35.233
(
ClassC
)
2025-01-30
54.204.161.107
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Sat, 28 Dec 2024 11:15:01 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://access.cpavision.mx:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sat, 28 Dec 2024 11:15:02 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveServer: nginx/1.22.1X-Powered-By: PHP/8.0.30Access-Control-Allow- !DOCTYPE html>html>head> link relstylesheet href/css/bootstrap.min.css> script src/js/jquery.min.js>/script> script src/js/bootstrap.min.js>/script> script src/js/sweetalert.min.js>/script> title>Login CPA Access/title> script typetext/javascript> function login() { var request {email:$(#usuario).val(),password:$(#password).val()}; $(#preloader).show(); $.ajax( { url: api/login, type: POST, contentType: application/json, dataType: json, success: function (msg) { if(msgmessagetoken generado){ window.location.replace(/home/+msgtoken); } else{ swal(Acceso Denegado!, Usuario o password incorrecto, error); } $(#preloader).hide(); }, error: function (msg){ //window.location.replace(https://www.cpalumis.com.mx/cpareview/cpa/facreview); console.log(error->,msg); $(#preloader).hide(); swal(Acceso Denegado!, Usuario o password incorrecto, error); }, data: JSON.stringify( request ) }); } /script> style typetext/css> inputtypetext{display: block; width: 100%;} inputtypepassword{display: block; width: 100%;} #preloader{display: none; width: 48px; height: auto;} body{margin-top: 5%;} /style>/head>body> div classcontainer-fluid> div classrow idheader> div classcol-sm-4> /div> div classcol-sm-4> br> div aligncenter>img src/img/logo_access_vert.png width50%>/div> br> div>Usuario:/div> div>input typetext idusuario>/div> br> div>Password:/div> div>input typepassword idpassword>/div> br> button onclicklogin(); classbtn btn-info>span classglyphicon glyphicon glyphicon-user aria-hiddentrue>/span> Entrar/button> img idpreloader srcimg/preloader.gif> /div> div classcol-sm-4> /div> /div> /div>/
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]