Help
RSS
API
Feed
Maltego
Contact
Domain > admin.web-max.ca
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-23
45.79.198.182
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sun, 02 Jun 2024 20:48:53 GMTServer: Apache/2.4.41 (Fedora) OpenSSL/1.1.1dLocation: https://admin.web-max.ca/Content-Length: 233Content-Type: text/html; charsetiso- !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://admin.web-max.ca/>here/a>./p>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 02 Jun 2024 20:48:53 GMTServer: Apache/2.4.41 (Fedora) OpenSSL/1.1.1dX-Powered-By: PHP/7.2.24Vary: Accept-EncodingTransfer-Encoding: chunkedContent-Type: text/html; charsetUT !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.01 Transitional//EN http://www.w3.org/TR/html4/loose.dtd>html>head>meta http-equivContent-Type contenttext/html; charsetutf8>meta namedescription contentWeb Max Admin>title>Web Max/title>meta nameviewport contentwidthdevice-width, initial-scale1>meta namerobots contentnoindex> link href//fonts.googleapis.com/css?familyRaleway:400,300,600 relstylesheet typetext/css>link relstylesheet hrefcss/normalize.css>link relstylesheet hrefcss/skeleton.css>/head>body>div idcontainer>div classrow idheader>div stylepadding-top:30px>/div>/div> div classpad-row> div classtwelve columns>h2>Login/h2>form nameform1 methodpost action/admin/login.php>p>input nameusername typetext classbodytext idusername size30>/p> p>input namepassword typepassword classbodytext idpassword size30>/p>p>input nameSubmit typesubmit classreadonly valueLogin >/p>/form> /div>/div> div classrow> script languageJavaScript typetext/javascript>!-- local_d new Date();local_t local_d.getFullYear()+-+(local_d.getMonth()+1)+-+local_d.getDate()+ +local_d.getHours()+:+local_d.getMinutes()+:+local_d.getSeconds();document.write(IMG HEIGHT0 WIDTH0 SRC//tracker.web-max.ca/tracker.php?local_time+escape(local_t)+&site15&ref+escape(document.referrer.replace(/%26/gi,{and}))+>);//-->/script> /div>/div> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]