Help
RSS
API
Feed
Maltego
Contact
Domain > base64.puzan.io
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-07-07
104.21.29.95
(
ClassC
)
2024-09-14
172.67.148.186
(
ClassC
)
Port 80
HTTP/1.1 200 OKDate: Sat, 14 Sep 2024 10:08:47 GMTContent-Type: text/html;charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveReport-To: {endpoints:{url:https:\/\/a.nel.cloudflare.com\/report\/v4?sTBSluGocwYSpdCl2eBll2bYxWxtHxcvbqVFfdDHwe31D2jBqLs2vQ4rTPkWfuEeBhv2K3Wm1wJNJz3hnWu4Rfic%2FXDD%2BxPdOH0gT3zmc%2FDZeIpNSu0wR9aLaQD%2FoBbPu8%2Bs%3D},group:cf-nel,max_age:604800}NEL: {success_fraction:0,report_to:cf-nel,max_age:604800}Server: cloudflareCF-RAY: 8c2f93e58fd98e60-PDXalt-svc: h3:443; ma86400 !doctype html>html>head>meta charsetutf-8>meta nameviewport contentwidthdevice-width, initial-scale1 />script typetext/javascript srchttps://r2.puzan.io/brython.js>/script>script typetext/javascript srchttps://r2.puzan.io/brython_modules.js>/script>!--script srchttps://cdn.jsdelivr.net/npm/brython@3/brython.min.js>/script>script srchttps://cdn.jsdelivr.net/npm/brython@3/brython_stdlib.js>/script>-->link hrefhttps://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/bootstrap.min.css relstylesheet integritysha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC crossoriginanonymous>/head>title>Base64 File Encoder/title>body onloadbrython(0)>style> body { background-color: #18191A; }/style>div classcontainer-fluid> div classrow> div classcol-6 p-2> input classform-control form-control-lg idfile_upload typefile/> /div> /div> div classrow> div classcol-6 p-2> h6 classtext-light>Image:/h6> img classimg-thumbnail rounded mx-auto d-block idupload_img> /div> div classcol-6 p-2> h6 classtext-light>Base64 Encoded String:/h6> textarea classform-control idbase64 rows20 cols80>/textarea> /div> /div>/div>script typetext/python>from browser import aio, ajax, bind, document, html, windowdef file_read(e): def onload(e): documentbase64.value e.target.result documentupload_img.src e.target.result file documentfile_upload.files0 reader window.FileReader.new() reader.readAsDataURL(file) reader.bind(load, onload)documentfile_upload.bind(input, file_read)/script>script srchttps://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/bootstrap.bundle.min.js integritysha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM crossoriginanonymous>/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]