Help
RSS
API
Feed
Maltego
Contact
Domain > admin.ptea.edubenchmark.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2021-12-24
54.230.15.47
(
ClassC
)
2022-02-22
108.156.120.59
(
ClassC
)
2022-04-24
13.35.122.61
(
ClassC
)
2024-10-02
3.0.133.33
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginx/1.18.0 (Ubuntu)Date: Mon, 29 Jul 2024 12:39:21 GMTContent-Type: text/htmlContent-Length: 178Connection: keep-aliveLocation: https://admin.ptea.edubenchmark. html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/1.18.0 (Ubuntu)/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Mon, 29 Jul 2024 12:39:21 GMTContent-Type: text/htmlContent-Length: 2854Last-Modified: Tue, 23 Jul 2024 12:35:06 GMTConnection: keep-aliveETag: 669fa3 !doctype html>html langen>head>meta charsetutf-8/>title>Benchmark Education/title>meta nameviewport contentwidthdevice-width,initial-scale1/>link relmanifest href/manifest.json/>link href//fonts.googleapis.com/css?familyPoppins:300,400,500,600,700%7CRoboto:300,400,500,600,700 relstylesheet/>link hrefhttps://fonts.googleapis.com/icon?familyMaterial+Icons relstylesheet/>link relstylesheet hrefhttps://fonts.googleapis.com/css?familyRoboto:300,400,500/>link relstylesheet idlayout-styles-anchor href/css/splash-screen.css/>script crossoriginanonymous srchttps://polyfill.io/v3/polyfill.min.js?featureses2017%2Cdefault%2Ces2015%2Ces2016%2CIntl>/script>link href/static/css/2.61f8dacc.chunk.css relstylesheet>link href/static/css/main.79a7d9ed.chunk.css relstylesheet>/head>body idkt_body>noscript>You need to enable JavaScript to run this app./noscript>div idroot>/div>div idsplash-screen classkt-splash-screen>h5>Benchmark Education/h5>svg classsplash-spinner viewBox0 0 50 50>circle classpath cx25 cy25 r20 fillnone stroke-width5>/circle>/svg>/div>div idlayout-portal>/div>script>!function(i){function e(e){for(var r,t,ne0,oe1,ue2,l0,f;ln.length;l++)tnl,Object.prototype.hasOwnProperty.call(p,t)&&pt&&f.push(pt0),pt0;for(r in o)Object.prototype.hasOwnProperty.call(o,r)&&(iror);for(s&&s(e);f.length;)f.shift()();return c.push.apply(c,u||),a()}function a(){for(var e,r0;rc.length;r++){for(var tcr,n!0,o1;ot.length;o++){var uto;0!pu&&(n!1)}n&&(c.splice(r--,1),el(l.st0))}return e}var t{},p{1:0},c;function l(e){if(te)return te.exports;var rte{i:e,l:!1,exports:{}};return ie.call(r.exports,r,r.exports,l),r.l!0,r.exports}l.mi,l.ct,l.dfunction(e,r,t){l.o(e,r)||Object.defineProperty(e,r,{enumerable:!0,get:t})},l.rfunction(e){undefined!typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:Module}),Object.defineProperty(e,__esModule,{value:!0})},l.tfunction(r,e){if(1&e&&(rl(r)),8&e)return r;if(4&e&&objecttypeof r&&r&&r.__esModule)return r;var tObject.create(null);if(l.r(t),Object.defineProperty(t,default,{enumerable
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]