Help
RSS
API
Feed
Maltego
Contact
Domain > alireza-25.jotiyaw925.workers.dev
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-07-17
172.67.198.2
(
ClassC
)
2025-01-01
104.21.60.156
(
ClassC
)
Port 443
HTTP/1.1 200 OKDate: Wed, 17 Jul 2024 01:34:23 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveReport-To: {endpoints:{url:https://a.nel.cloudflare.com/report/v4?sJA4VqB7FpNUS !DOCTYPE html> html> head> meta charsetutf8 /> link hrefhttps://cdn.jsdelivr.net/npm/bootstrap@5.3.1/dist/css/bootstrap.min.css relstylesheet integritysha384-4bw+/aepP/YC94hEpVNVgiZdgIC5+VKNBQNGCHeKRQN+PtmoHDEXuppvnDJzQIu9 crossoriginanonymous> /head> body dirltr> div classcontainer border p-0> div classp-3 bg-primary text-white> div classtext-nowrap fs-4 fw-bold text-center>V2RAY Worker - Control Panel/div> div classtext-nowrap fs-6 text-center> Version 2.0 by a hrefhttps://twitter.com/vahidfarid target_blank classtext-white>Vahid Farid/a> /div> /div> div classpx-4 py-2 bg-light> label forsub-link classform-label fw-bold> Your subscription link for v2ray clients/ span dirrtl>لینک ثبت نام شما برای کلاینتهای v2ray/span> (v2rayN, v2rayNG, v2rayA, Matsuri, Nekobox, Nekoray...) /label> input idsub-link readonly valuehttps://alireza-25.jotiyaw925.workers.dev/sub classp-1 stylewidth: calc(100% - 150px)> button onclickvar tmpdocument.getElementById(sub-link);tmp.select();tmp.setSelectionRange(0,99999);navigator.clipboard.writeText(tmp.value) classbtn btn-primary p-1 mb-1>Copy/button> /div> div classpx-4 py-2 bg-light> label forclash-link classform-label fw-bold> Your subscription link for clash clients/ span dirrtl>لینک ثبت نام شما برای کلاینتهای کلش/span> (Clash, ClashX, ClashMeta...) /label> input idclash-link readonly valuehttps://alireza-25.jotiyaw925.workers.dev/clash classp-1 stylewidth: calc(100% - 150px)> button onclickvar tmpdocument.getElementById(clash-link);tmp.select();tmp.setSelectionRange(0,99999);navigator.clipboard.writeText(tmp.value) classbtn btn-primary p-1 mb-1>Copy/button> /div> form classpx-4 py-4 border-top methodpost> div classmb-3 p-3> label forincludes classform-lab
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]