Help
RSS
API
Feed
Maltego
Contact
Domain > app2.x2m5sz.click
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-11-12
198.16.61.27
(
ClassC
)
2025-10-18
119.9.94.119
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginxDate: Sat, 18 Oct 2025 19:29:10 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-aliveLocation: https://app2.x2m5sz.click/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginxDate: Sat, 18 Oct 2025 19:29:11 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveVary: Accept-EncodingVary: Accept-EncodingVary: Accept-EncodingX-RateLimit-Limit: 300X-RateLimit-Remaining: 299Set-Cookie: _sessionHandler133adc814dd37c76d37a7e60d77a510d626a04c88a5dde2f720affbb567f9f2a; path/Access-Control-Allow-Credentials: trueAccess-Control-Allow-Methods: POST, PUT, GET, DELETE, HEAD, OPTIONAccess-Control-Allow-Headers: X-Requested-With, Content-Type, Authorization, Source, Accept-CurrencyAccess-Control-Max-Age: 86400Access-Control-Expose-Headers: Authorization, Set-CookieCache-Control: private !-- The File Build on Tue Oct 14 2025 13:57:32 GMT+0800 (GMT+08:00) -->!DOCTYPE html>html lang> head> meta charsetUTF-8 /> meta nameviewport contentwidthdevice-width, initial-scale1.0, maximum-scale1.0, minimum-scale1.0, user-scalableno> meta http-equivX-UA-Compatible contentIEedge /> meta namerenderer contentwebkit /> link relshortcut icon href/webx/xy6/static/favicon.ico> title>XYUN Loto/title> script> (function redirect(){ if(production dev){ return; } if(/Android|webOS|iPhone|iPod|BlackBerry/i.test(navigator.userAgent) && localStorage.getItem(stay_status) ! PC && location.pathname.indexOf(webapp) -1) { location.href /webapp; } })() /script> script> window.__CDN_PUBLIC_PATH__ /webx/; /script> meta namecache-control contentc4b51ef7-clear>link href/webx/xy6/desktop/styles/0.26862682810b68ebdd8b.css?v23.12.02.62535 relstylesheet>link href/webx/xy6/desktop/styles/index.2686.css?v23.12.02.62535 relstylesheet>/head> body> div classroot idroot classview>/div> div idoverLazy> /div> script typetext/javascript src/webx/xy6/desktop/javascript/chunk.vendor.7506.js?v23.12.02.62535>/script>script typetext/javascript src/webx/xy6/desktop/javascript/base.2686.js?v23.12.02.62535>/script>script typetext/javascript src/webx/xy6/desktop/javascript/bootstrap.2686.js?v23.12.02.62535>/script>script typetext/javascript src/webx/xy6/desktop/javascript/index.2686.js?v23.12.02.62535>/script>/body>/html>!--8725fb777f25776ffa9076e44fcfd776-->
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]