Help
RSS
API
Feed
Maltego
Contact
Domain > ams.dreamsports.co.in
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-04-13
15.207.168.1
(
ClassC
)
2024-04-21
13.234.135.242
(
ClassC
)
2024-07-15
3.7.238.118
(
ClassC
)
2025-01-30
65.1.5.157
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Sat, 13 Apr 2024 19:11:56 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://ams.dreamsports.co.in:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sat, 13 Apr 2024 19:11:57 GMTContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveServer: nginx/1.18.0 (Ubuntu) !doctype html>html langen>head> meta charsetutf-8 /> link relicon href/favicon.ico /> meta nameviewport contentwidthdevice-width,initial-scale1,minimal-ui,maximum-scale1,shrink-to-fitno /> meta nametheme-color content#000000 /> base href/ /> meta namedescription contentAthlete management System /> link relapple-touch-icon sizes180x180 href/apple-touch-icon.png> link relicon typeimage/png sizes32x32 href/favicon-32x32.png> link relicon typeimage/png sizes16x16 href/favicon-16x16.png> link relmanifest href/site.webmanifest> link relmask-icon href/safari-pinned-tab.svg color#5bbad5> meta namemsapplication-TileColor content#da532c> link relstylesheet hrefhttps://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.3/css/all.min.css /> link relmanifest href/manifest.json /> title>AMS/title> link relstylesheet href./css/main.css /> link href/static/css/2.012dea2a.chunk.css relstylesheet> link href/static/css/main.afd7172b.chunk.css relstylesheet>/head>body> noscript>You need to enable JavaScript to run this app./noscript> div idroot>/div> script>!function (e) { function r(r) { for (var n, i, l r0, a r1, f r2, p 0, s ; p l.length; p++)i lp, Object.prototype.hasOwnProperty.call(o, i) && oi && s.push(oi0), oi 0; for (n in a) Object.prototype.hasOwnProperty.call(a, n) && (en an); for (c && c(r); s.length;)s.shift()(); return u.push.apply(u, f || ), t() } function t() { for (var e, r 0; r u.length; r++) { for (var t ur, n !0, l 1; l t.length; l++) { var a tl; 0 ! oa && (n !1) } n && (u.splice(r--, 1), e i(i.s t0)) } return e } var n {}, o { 1: 0 }, u ; function i(r) { if (nr) return nr.exports; var t nr { i: r, l: !1, exports: {} }; return er.call(t.exports, t, t.exports, i), t.l !0, t.exports } i.m e, i.c n, i.d function (e, r, t) { i.o(e, r) || Object.defineProperty(e, r, { enumerable: !0, get: t }) }, i.r function (e) { undefined ! typeof Symbol && Symbol.toStringTag && Object.defineProperty(e, Symbol.toStringTag, { value: Module }),
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]