Help
RSS
API
Feed
Maltego
Contact
Domain > ams.oilmin.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2019-03-05
65.99.229.13
(
ClassC
)
2024-11-04
65.254.95.208
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Wed, 31 Jul 2024 01:13:03 GMTServer: ApacheLocation: https://ams.oilmin.com/Content-Length: 231Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://ams.oilmin.com/>here/a>./p>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Wed, 31 Jul 2024 01:13:04 GMTServer: ApacheContent-Length: 3342Content-Type: text/html; charsetUTF-8 !DOCTYPE html PUBLIC -//W3C//DTD XHTML 1.0 Transitional//EN http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd>html xmlnshttp://www.w3.org/1999/xhtml>head>meta http-equivContent-Type contenttext/html; charsetutf-8 />title>OMHL AMS Login Page/title>link relstylesheet hrefhttps://maxcdn.bootstrapcdn.com/bootstrap/3.4.0/css/bootstrap.min.css>link hrefbootstrap.css relstylesheet typetext/css />link relicon typeimage/png hrefimages/oilmin.png/>link hreflala.css relstylesheet typetext/css/>link hrefjquery-ui-1.8.21.custom.css relstylesheet typetext/css />script srchttps://ajax.googleapis.com/ajax/libs/jquery/3.4.0/jquery.min.js>/script>script srchttps://maxcdn.bootstrapcdn.com/bootstrap/3.4.0/js/bootstrap.min.js>/script>script srcgen_jquery_functions.js>/script>script>function Clear(){document.getElementById(uId).value ;}function validateEmail() { var email document.getElementById(uId).value; var emailFilter /^(a-z0-9_-.)+@(a-z_.)+.(a-z{2,4})$/; if (!emailFilter.test(email)) { alert(Please enter a valid e-mail address.); return false; } return true;}/script>/head>body>div classmainBoder>div classcontainer>table> tr> td width 100% aligncenter > img styleborder-radius: 10px; width100% srcimages/ams_banner.jpg /> /td> /tr>/table>/div>div classappInvoice >form actionlogin.php methodpost>div classcontainer>table width60% aligncenter border0> tr> td width20%>b>User ID : /b>span classglyphicon glyphicon-user>/span>/td> td width80%>input nameuName typetext data-toggletooltip titleEnter User ID (e-mail) styleheight:5%;width:60%; maxlength2000 iduId onblurvalidateEmail(this.value);/>/td> /tr> tr> td>b>Password : /b>span classglyphicon glyphicon-lock>/span>/td> td>input namepWord typepassword data-toggletooltip titleEnter Password styleheight:5%;width:60%; maxlength10 />/td> /tr> tr>td>input namesubmit classbtn btn-default typesubmit valueLogin />/td>/tr>/table>/div>/form>/div>/div>!DOCTYPE html PUBLIC -//W3C//DTD XHTML 1.0 Transitional//EN http://www.w3.org/TR/xhtml1/DTD
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]