Help
RSS
API
Feed
Maltego
Contact
Domain > asf.ashtoncs.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-05-11
172.67.147.114
(
ClassC
)
2026-01-19
104.21.71.170
(
ClassC
)
Port 80
HTTP/1.1 200 OKDate: Mon, 19 Jan 2026 09:14:20 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveServer: cloudflareNel: {report_to:cf-nel,success_fraction:0.0,max_age:604800}Speculation-Rules: /cdn-cgi/speculationCache-Control: public, no-cacheReport-To: {group:cf-nel,max_age:604800,endpoints:{url:https://a.nel.cloudflare.com/report/v4?scjSbqV9WUbJX1CxMeQ4rxzQe20t%2B1bx3EWLXUlbTGQkcXApc%2BFom6awvMy%2FIvo35oBnXUJanFWxXSjR7%2F2Stbo%2FtjNqFeKdZXhZvj09DnfM%3D}}Last-Modified: Sat, 27 Dec 2025 15:18:12 GMTVary: Accept-EncodingX-Served-By: asf.ashtoncs.comcf-cache-status: DYNAMICCF-RAY: 9c0538a5889e4598-PDXalt-svc: h3:443; ma86400 !doctype html>html>head>title>ASF/title>meta charsetutf-8>meta namerobots contentnoindex>meta contentIEedge,chrome1 http-equivX-UA-Compatible>meta contentwidthdevice-width,initial-scale1,maximum-scale1,user-scalableno nameviewport>link hrefhttps://fonts.googleapis.com/css?familySource+Sans+Pro:300,400,600 relstylesheet>link href/manifest.json relmanifest crossoriginuse-credentials>link href/images/logo.png relshortcut icon>script deferdefer src/scripts/main.10e9309.bundle.js integritysha256-NHK3fJauMoZTWC08qFJjxAjc8Zop0fHCIihHFpAAJ18 sha384-utLUgIV0Qjo4u1hORH1wrRBkO5z02RsUpbBWXsddICLe/8EZiTZZK9msfan3l3jy crossoriginanonymous>/script>/head>body>div idapp>/div>script>const mainScript document.querySelector(scriptsrc^/scripts/main); mainScript.onerror createErrorHandler(window.location.pathname, mainScript.getAttribute(src), mainScript.getAttribute(integrity)); mainScript.onload createLoadHandler(mainScript.onerror); function addScript(path, integrity) { const scriptElement document.createElement(script); scriptElement.src path; scriptElement.async true; if (integrity) { scriptElement.integrity integrity; scriptElement.crossOrigin anonymous; } document.head.appendChild(scriptElement); return scriptElement; } function stripLastPart(path) { const lastIndexOfSlash path.lastIndexOf(/); return path.slice(0, lastIndexOfSlash); } function createLoadHandler(onError) { return function() { // onLoad is fired when script is loaded. We do not want to be fooled by server returning index.html // Check if the script is indeed working can be achieved by testing __ASF_UI_LOADED__ property set in index.js if (!window.__ASF_UI_LOADED__) return onError(); // It is possible we loaded main script on first attempt if (!window.__BASE_PATH__) { // Other parts of the app use __BASE_PATH__ and __BASE_URL__, set it anyway window.__BASE_URL__ window.location.origin + /; window.__BASE_PATH__ /; // We do not need to update resources, as the default path is already good return; } document.querySelector(linkrelshortcut icon).setAttribute(href, `${__BASE_PATH__}images/logo.png`); document.querySelector(linkrelmanifest).setAttribute(href, `${__BASE_PATH__}manifest.json`); }; } function createErrorHandler(path, scriptPath, integrity) { return function() { // We are likely working with /prefix>. Possible browser path>: // a) We are on /prefix> // b) We are on nested page /prefix>/page> // c) We are on deeply nested page /prefix>/page A>/page B> // Either way, we need to load script from /prefix>/script path> // We start from browser path> and work recursively by striping // parts after last / character: // 1. /prefix>/page A>/page B> // 2. /prefix>/page A> // 3. /prefix> const normalizedPath path.endsWith(/) ? path.slice(0, -1) : path; if (!normalizedPath.length) return; // Give up // These properties needs to be set properly prior to script execution // Otherwise we will be downloading script chunks from base (incorrect) path window.__BASE_URL__ window.location.href.replace(window.location.pathname, normalizedPath + /); window.__BASE_PATH__ normalizedPath + /; // Add new script tag using new path const newScriptPath normalizedPath + scriptPath; const newScript addScript(newScriptPath, integrity); // We found the path! Replace other resources newScript.onerror createErrorHandler(stripLastPart(normalizedPath), scriptPath, integrity); newScript.onload createLoadHandler(newScript.onerror); }; }/script>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Mon, 19 Jan 2026 09:14:20 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveServer: cloudflareSpeculation-Rules: /cdn-cgi/speculationCache-Control: public, no-cacheReport-To: {group:cf-nel,max_age:604800,endpoints:{url:https://a.nel.cloudflare.com/report/v4?sgU%2BKOYbWDnfo%2FKzEr0pBQsb70h6bE2%2BcVJ%2BeK4tl9G%2BEpiAHTMDoLpdMWhKqqHpWW4JSNVD6Gw4xBAWV3NDSif4J9MPMslHyz%2Bx0eYiex3A%3D}}Nel: {report_to:cf-nel,success_fraction:0.0,max_age:604800}last-modified: Sat, 27 Dec 2025 15:18:12 GMTvary: Accept-Encodingx-served-by: asf.ashtoncs.comcf-cache-status: DYNAMICCF-RAY: 9c0538a6fcb91d89-PDXalt-svc: h3:443; ma86400 !doctype html>html>head>title>ASF/title>meta charsetutf-8>meta namerobots contentnoindex>meta contentIEedge,chrome1 http-equivX-UA-Compatible>meta contentwidthdevice-width,initial-scale1,maximum-scale1,user-scalableno nameviewport>link hrefhttps://fonts.googleapis.com/css?familySource+Sans+Pro:300,400,600 relstylesheet>link href/manifest.json relmanifest crossoriginuse-credentials>link href/images/logo.png relshortcut icon>script deferdefer src/scripts/main.10e9309.bundle.js integritysha256-NHK3fJauMoZTWC08qFJjxAjc8Zop0fHCIihHFpAAJ18 sha384-utLUgIV0Qjo4u1hORH1wrRBkO5z02RsUpbBWXsddICLe/8EZiTZZK9msfan3l3jy crossoriginanonymous>/script>/head>body>div idapp>/div>script>const mainScript document.querySelector(scriptsrc^/scripts/main); mainScript.onerror createErrorHandler(window.location.pathname, mainScript.getAttribute(src), mainScript.getAttribute(integrity)); mainScript.onload createLoadHandler(mainScript.onerror); function addScript(path, integrity) { const scriptElement document.createElement(script); scriptElement.src path; scriptElement.async true; if (integrity) { scriptElement.integrity integrity; scriptElement.crossOrigin anonymous; } document.head.appendChild(scriptElement); return scriptElement; } function stripLastPart(path) { const lastIndexOfSlash path.lastIndexOf(/); return path.slice(0, lastIndexOfSlash); } function createLoadHandler(onError) { return function() { // onLoad is fired when script is loaded. We do not want to be fooled by server returning index.html // Check if the script is indeed working can be achieved by testing __ASF_UI_LOADED__ property set in index.js if (!window.__ASF_UI_LOADED__) return onError(); // It is possible we loaded main script on first attempt if (!window.__BASE_PATH__) { // Other parts of the app use __BASE_PATH__ and __BASE_URL__, set it anyway window.__BASE_URL__ window.location.origin + /; window.__BASE_PATH__ /; // We do not need to update resources, as the default path is already good return; } document.querySelector(linkrelshortcut icon).setAttribute(href, `${__BASE_PATH__}images/logo.png`); document.querySelector(linkrelmanifest).setAttribute(href, `${__BASE_PATH__}manifest.json`); }; } function createErrorHandler(path, scriptPath, integrity) { return function() { // We are likely working with /prefix>. Possible browser path>: // a) We are on /prefix> // b) We are on nested page /prefix>/page> // c) We are on deeply nested page /prefix>/page A>/page B> // Either way, we need to load script from /prefix>/script path> // We start from browser path> and work recursively by striping // parts after last / character: // 1. /prefix>/page A>/page B> // 2. /prefix>/page A> // 3. /prefix> const normalizedPath path.endsWith(/) ? path.slice(0, -1) : path; if (!normalizedPath.length) return; // Give up // These properties needs to be set properly prior to script execution // Otherwise we will be downloading script chunks from base (incorrect) path window.__BASE_URL__ window.location.href.replace(window.location.pathname, normalizedPath + /); window.__BASE_PATH__ normalizedPath + /; // Add new script tag using new path const newScriptPath normalizedPath + scriptPath; const newScript addScript(newScriptPath, integrity); // We found the path! Replace other resources newScript.onerror createErrorHandler(stripLastPart(normalizedPath), scriptPath, integrity); newScript.onload createLoadHandler(newScript.onerror); }; }/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]