Help
RSS
API
Feed
Maltego
Contact
Domain > ajuscoecuador.info
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-01
50.21.179.44
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Fri, 15 Nov 2024 12:13:43 GMTServer: Apache/2.4.41 (Ubuntu)Location: https://ajuscoecuador.info/Content-Length: 319Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://ajuscoecuador.info/>here/a>./p>hr>address>Apache/2.4.41 (Ubuntu) Server at ajuscoecuador.info Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Fri, 15 Nov 2024 12:13:43 GMTServer: Apache/2.4.41 (Ubuntu)Set-Cookie: s1721924866va6euqdlj0vrgiqsg9r3pt42j0; path/Cache-Control: no-cache, no-store, max-age0, must-revalidatePrag !DOCTYPE html>HTML >HEAD> META http-equivX-UA-Compatible contentIEEdge> TITLE> Ajusco /TITLE> LINK hrefimages/logoicon.png relicon typeimage/png> META http-equivContent-Type contenttext/html; charsetutf-8> LINK hrefstyles/default.css relstylesheet typetext/css> LINK hrefstyles/general.css relstylesheet typetext/css>LINK hrefstyles/Fancy1Blue_white1/style.css relstylesheet typetext/css>LINK hrefpagestyles/login2.css relstylesheet typetext/css> META nameGENERATOR contentMSHTML 11.00.10570.1001> /HEAD> BODY classFancy1Blue_white1 page-login2 function-login >script typetext/javascript srcinclude/loadfirst.js>/script>script typetext/javascript srcinclude/lang/Spanish.js>/script>form methodpost actionlogin.php idform1 nameform1> input typehidden namebtnSubmit valueLogin>A hrefmenu.php>IMG styleborder: 0px currentColor; border-image: none; width: 215px; height: 73px; altAjusco srcimages/Ajusco.png>/A> DIV classrnr-page>DIV classrnr-top >div classrnr-cw-login rnr-s-1 asbuttons Fancy1Blue_white1>DIV classrnr-c rnr-cv rnr-c-login>DIV classrnr-brickcontents style2 rnr-b-loginheader >SPAN>H1>Conectar /H1>/SPAN> /DIV>DIV classrnr-brickcontents style1 rnr-b-wrapper rnr-wrapper rnr-cbw-fields>div classrnr-cw-fields rnr-s-fields asbuttons Fancy1Blue_white1>DIV classrnr-c rnr-cv rnr-c-fields>DIV classrnr-brickcontents style1 rnr-b-loginfields >TABLE classfieldGrid> TBODY> TR> TD>FONT size+1>Nombre de usuario:/FONT> /TD> TD classrnr-control>INPUT nameusername typetext value> /TD>/TR> TR> TD>FONT size+1>Contraseña:/FONT> /TD> TD classrnr-control>INPUT namepassword typepassword value> /TD>/TR> TR> TD>FONT size+1>Recordar contraseña:/FONT> /TD> TD>INPUT typecheckbox nameremember_password value1> /TD>/TR>/TBODY>/TABLE> /DIV>DIV classrnr-brickcontents style2 rnr-b-loginbuttons >A classrnr-button main href# idsubmitLogin1> Presentar /A> /DIV>/DIV>/div>/DIV>/DIV> /div>/DIV>DIV classrnr-middle>DIV classrnr-left >/DIV>DIV classrnr-center >/DIV>DIV classrnr-right >/DIV>/DIV>DIV classrnr-bottom >/DI
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]