Help
RSS
API
Feed
Maltego
Contact
Domain > api.csewhy.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-11-24
34.0.9.145
(
ClassC
)
2025-01-23
34.131.224.239
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginx/1.22.1Date: Wed, 13 Nov 2024 12:49:00 GMTContent-Type: text/htmlContent-Length: 169Connection: keep-aliveLocation: https://api.csewhy.com/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/1.22.1/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginx/1.22.1Date: Wed, 13 Nov 2024 12:49:01 GMTContent-Type: text/htmlContent-Length: 1854Connection: keep-aliveetag: o5spyelink: ./_app/immutable/assets/0.36wdHgLm.css>; relpre !doctype html>html langen> head> meta charsetutf-8 /> link relicon href./favicon.png /> meta nameviewport contentwidthdevice-width, initial-scale1 /> link href./_app/immutable/assets/0.36wdHgLm.css relstylesheet> /head> body data-sveltekit-preload-datahover classbox-border> div styledisplay: contents> section classflex flex-col h-screen>nav data-svelte-hsvelte-1sz265c>span classflex items-center justify-center p-3>img src/images/logo/logo.png altCSE Why classh-16>/span>/nav> main classflex justify-center items-center flex-grow gap-10>div data-svelte-hsvelte-oxj68d>img src/images/auth/app-boy.png altCSE Why classh-80>/div> div classflex flex-col gap-10>h2 classtext-xl max-w-sm text-center font-bold data-svelte-hsvelte-5mwq8w>Your span classtext-primary>Bal. Buddhi. Vidya./span> to succeed in UPSC Civil Services/h2> div classw-full>div classflex flex-col gap-4 items-center w-full>button classbg-primary text-white px-4 py-2 rounded-md drop-shadow-primary w-full>Continue with Email/button> span classtext-sm text-black data-svelte-hsvelte-1k3dpa3>OR/span> div idgoogle-signin-button classw-full>/div>/div> /div> /div>/main>/section> script> { __sveltekit_91ws5 { base: new URL(., location).pathname.slice(0, -1) }; const element document.currentScript.parentElement; const data null,null; Promise.all( import(./_app/immutable/entry/start.q6BpP4DA.js), import(./_app/immutable/entry/app.akkTkwxs.js) ).then((kit, app) > { kit.start(app, element, { node_ids: 0, 4, data, form: null, error: null }); }); } /script> /div> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]