Help
RSS
API
Feed
Maltego
Contact
Domain > americanratcontrol-mobil.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-11-11
192.254.189.213
(
ClassC
)
Port 80
HTTP/1.1 200 OKDate: Sat, 16 Dec 2023 11:02:57 GMTServer: ApacheUpgrade: h2,h2cConnection: UpgradeLast-Modified: Mon, 17 Jun 2019 16:33:40 GMTAccept-Ranges: noneVary: Accept-Encoding,User-AgentContent ?phpfunction ValidateEmail($email){ $pattern /^(0-9a-z(-.w*0-9a-z)*@((0-9a-z)+(-w*0-9a-z)*.)+a-z{2,6})$/i; return preg_match($pattern, $email);}if ($_SERVERREQUEST_METHOD POST && isset($_POSTformid) && $_POSTformid form1){ $mailto yourname@yourdomain.com; $mailfrom isset($_POSTemail) ? $_POSTemail : $mailto; $subject Website form; $message Values submitted from web site form:; $success_url ; $error_url ; $error ; $eol ; $boundary md5(uniqid(time())); $header From: .$mailfrom.$eol; $header . Reply-To: .$mailfrom.$eol; $header . MIME-Version: 1.0.$eol; $header . Content-Type: multipart/mixed; boundary.$boundary..$eol; $header . X-Mailer: PHP v.phpversion().$eol; if (!ValidateEmail($mailfrom)) { $error . The specified email address is invalid! br>; } if (!empty($error)) { $errorcode file_get_contents($error_url); $replace ##error##; $errorcode str_replace($replace, $error, $errorcode); echo $errorcode; exit; } $internalfields array (submit, reset, send, filesize, formid, captcha_code, recaptcha_challenge_field, recaptcha_response_field, g-recaptcha-response); $message . $eol; $message . IP Address : ; $message . $_SERVERREMOTE_ADDR; $message . $eol; $logdata ; foreach ($_POST as $key > $value) { if (!in_array(strtolower($key), $internalfields)) { if (!is_array($value)) { $message . ucwords(str_replace(_, , $key)) . : . $value . $eol; } else { $message . ucwords(str_replace(_, , $key)) . : . implode(,, $value) . $eol; } } } $body This is a multi-part message in MIME format..$eol.$eol; $body . --.$boundary.$eol; $body . Content-Type: text/plain; charsetISO-8859-1.$eol; $body . Content-Transfer-Encoding: 8bit.$eol; $body . $eol.stripslashes($message).$eol; if (!empty($_FILES)) { foreach ($_FILES as $key > $value) { if ($_FILES$keyerror 0) { $body . --.$boundary.
Port 443
HTTP/1.1 200 OKDate: Sat, 16 Dec 2023 11:02:57 GMTServer: ApacheUpgrade: h2,h2cConnection: UpgradeLast-Modified: Mon, 17 Jun 2019 16:33:40 GMTAccept-Ranges: bytesContent-Length: 9086Vary: Accept-Encod ?phpfunction ValidateEmail($email){ $pattern /^(0-9a-z(-.w*0-9a-z)*@((0-9a-z)+(-w*0-9a-z)*.)+a-z{2,6})$/i; return preg_match($pattern, $email);}if ($_SERVERREQUEST_METHOD POST && isset($_POSTformid) && $_POSTformid form1){ $mailto yourname@yourdomain.com; $mailfrom isset($_POSTemail) ? $_POSTemail : $mailto; $subject Website form; $message Values submitted from web site form:; $success_url ; $error_url ; $error ; $eol ; $boundary md5(uniqid(time())); $header From: .$mailfrom.$eol; $header . Reply-To: .$mailfrom.$eol; $header . MIME-Version: 1.0.$eol; $header . Content-Type: multipart/mixed; boundary.$boundary..$eol; $header . X-Mailer: PHP v.phpversion().$eol; if (!ValidateEmail($mailfrom)) { $error . The specified email address is invalid! br>; } if (!empty($error)) { $errorcode file_get_contents($error_url); $replace ##error##; $errorcode str_replace($replace, $error, $errorcode); echo $errorcode; exit; } $internalfields array (submit, reset, send, filesize, formid, captcha_code, recaptcha_challenge_field, recaptcha_response_field, g-recaptcha-response); $message . $eol; $message . IP Address : ; $message . $_SERVERREMOTE_ADDR; $message . $eol; $logdata ; foreach ($_POST as $key > $value) { if (!in_array(strtolower($key), $internalfields)) { if (!is_array($value)) { $message . ucwords(str_replace(_, , $key)) . : . $value . $eol; } else { $message . ucwords(str_replace(_, , $key)) . : . implode(,, $value) . $eol; } } } $body This is a multi-part message in MIME format..$eol.$eol; $body . --.$boundary.$eol; $body . Content-Type: text/plain; charsetISO-8859-1.$eol; $body . Content-Transfer-Encoding: 8bit.$eol; $body . $eol.stripslashes($message).$eol; if (!empty($_FILES)) { foreach ($_FILES as $key > $value) { if ($_FILES$keyerror 0) { $body . --.$boundary.
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]