Help
RSS
API
Feed
Maltego
Contact
Domain > anhang-1.zip
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2023-05-28
172.67.218.8
(
ClassC
)
2025-08-04
104.21.112.1
(
ClassC
)
Port 443
HTTP/1.1 200 OKDate: Mon, 04 Aug 2025 16:51:43 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveServer: cloudflareCf-Cache-Status: DYNAMICNel: {report_to:cf-nel,success_fraction:0.0,max_age:604800}Report-To: {group:cf-nel,max_age:604800,endpoints:{url:https://a.nel.cloudflare.com/report/v4?stFT9znxJmAiKKeRLaJY8TnwtBx7CmcqMJE1OSlLrp%2BS0Jcl7%2FmhRNYyTSgws7fwwcZV%2BNR0OkPYb5GyxcFrdbZz32wspSnLB26I%3D}}CF-RAY: 969f8fa0df32fefe-PDXalt-svc: h3:443; ma86400 center>h1>YOUVE BEEN FOOLED!/h1>pre>Oops, looks like you opened a link you werent supposed to!But how did that happen?This site is using an @ symbol in its link - thats weird, isnt that an email thing?With the @ in a domain, youre passing credentials to it, similar to how you pass an adress to an email server.As you know: when sending a mail to a href/cdn-cgi/l/email-protection class__cf_email__ data-cfemail59383438233637773d3c193e36363e353c773a3634>email protected/a> youre sending it to google.comSame with this: when visiting a href/cdn-cgi/l/email-protection class__cf_email__ data-cfemailb2d5ddddd5ded79cd1dddff2d3dcdad3dcd59f839cc8dbc2>email protected/a> youre visitng anhang-1.zipFor your own safety: simply refuse to open links containing an @ in the future :)/pre>/center>script data-cfasyncfalse src/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js>/script>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]