Help
RSS
API
Feed
Maltego
Contact
Domain > androgov.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-09-04
209.43.47.39
(
ClassC
)
2025-01-08
15.197.183.30
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyContent-Type: text/html; charsetUTF-8Location: https://www.androgov.com/Server: Content-Security-Policy: frame-ancestors self;Strict-Transport-Security: max-age31536000; head>title>Document Moved/title>/head>body>h1>Object Moved/h1>This document may be found a HREFhttps://www.androgov.com/>here/a>/body>
Port 443
HTTP/1.1 200 OKContent-Type: text/html; charsetISO-8859-1Server: Set-Cookie: egu505B970C-03C0-C181-699E-5AF719727390; expiresSat, 31-May-2025 03:16:50 GMT; Max-Age31557600; path/Set-Cookie: egs2815CD6 !DOCTYPE html>html xmlnshttp://www.w3.org/1999/xhtml langen xml:langen> head> meta http-equivcontent-type contenttext/html; charsetiso-8859-1 />meta namerobots contentall />meta namerobots contentindex,follow />meta namedescription contentOnline payments from AndroGov - Payments for governments and schools />meta namekeywords contentgovernment, payments, government payments, school payments, schools, andoscoggin, androscoggin bank, bank />meta nameviewport contentwidthdevice-width, initial-scale1.0 />title>AndroGov / Home/title>link typetext/css relstylesheet href/include/css/styles.css mediascreen />link typetext/css relstylesheet href/include/css/print.css mediaprint />link typetext/css relstylesheet href/include/css/top-nav.css mediascreen />link typetext/css relstylesheet href/include/css/font-awesome.min.css mediascreen />script typetext/javascript src/include/js/mootools-1.3.2-core.js>/script>script typetext/javascript src/include/js/mootools-1.3.2-more.js>/script>script typetext/javascript src/include/js/utilities.js>/script>!--if IE > script typetext/javascript src/include/js/css3-mediaqueries.js>/script>!endif-->!--if lt IE 9> script srchttp://ie7-js.googlecode.com/svn/version/2.1(beta4)/IE9.js>/script>!endif--> /head> body classbodyHome> div classmainContent clearfix> !-- begin header -->a classskipLink titleSkip over navigation href#startcontent accesskey2>Skip over navigation/a>div classheader> div classwrap clearfix> h1 classsiteTitle>a href/ accesskey1>AndroGov/a>/h1> h2>Online Payments for Governments and Schools/h2> div classmainNav> !-- begin search --> div classclearfix> div classsearchWrapper> form classsearchForm methodpost ideGovQuickSearch action/egov/apps/search.egov> input typehidden nameview valuebasic idview /> input typehidden nameact valueresult idact /> input typehidden namepage value1 idpage /> div classsearchInputWrapper> label foreGov_searchTerms>Search/label> input nameeGov_searhTerms ideGov_searchTerms classsearchInp
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]