Help
RSS
API
Feed
Maltego
Contact
Domain > beta.fortune.profit-intelligence.selling-partners.a2z.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2021-01-27
99.84.174.102
(
ClassC
)
2021-01-27
99.84.174.20
(
ClassC
)
2021-01-27
99.84.174.65
(
ClassC
)
2024-10-01
3.163.24.7
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Tue, 01 Oct 2024 14:09:04 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://beta.fortune.profit-intelligence.selling-partners.a2z.com/X-Cache: Redirect from cloudfrontVia: 1.1 e2ad8d56b8dbdb69144113ad1c008e02.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P2X-Amz-Cf-Id: 2GP5jRWdLZ5FaKsrFf8GeZNqng3aQ1m4puEII52TI5VdS5P3tlepiA html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 403 ForbiddenContent-Type: text/html; charsetutf-8Content-Length: 8069Connection: keep-aliveDate: Tue, 01 Oct 2024 14:09:05 GMTLast-Modified: Fri, 27 Sep 2024 09:59:31 GMTETag: 2c29647035bf42c0f4d600ae678dddfcx-amz-server-side-encryption: AES256x-amz-version-id: eKN8cM6LMUYoX_xc0wsFa7mYSduG1CeVAccept-Ranges: bytesServer: AmazonS3Vary: Accept-EncodingX-Cache: Error from cloudfrontVia: 1.1 1f941fcf288b6d0259a0f708c955afae.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P2X-Amz-Cf-Id: ore2Cuu3494YMu-YS292Zdmi3JQYNpagCwGMvh2NhXvyow7i5OMj3w !DOCTYPE html>html> head> script typetext/javascript> function getParameterByName(name, url) { if (!url) url window.location.href; name name.replace(/\\/g, \\$&); var regex new RegExp(?& + name + ((^*)|&|#|$)), results regex.exec(url); if (!results) return null; if (!results2) return ; return decodeURIComponent(results2.replace(/\+/g, )); } function getValidURL(url) { try { return new URL(url); } catch (e) { return null; } }/*! * JavaScript Cookie v2.1.4 * https://github.com/js-cookie/js-cookie * * Copyright 2006, 2015 Klaus Hartl & Fagner Brack * Released under the MIT license */;(function (factory) { var registeredInModuleLoader false; if (typeof define function && define.amd) { define(factory); registeredInModuleLoader true; } if (typeof exports object) { module.exports factory(); registeredInModuleLoader true; } if (!registeredInModuleLoader) { var OldCookies window.Cookies; var api window.Cookies factory(); api.noConflict function () { window.Cookies OldCookies; return api; }; }}(function () { function extend () { var i 0; var result {}; for (; i arguments.length; i++) { var attributes arguments i ; for (var key in attributes) { resultkey attributeskey; } } return result; } function init (converter) { function api (key, value, attributes) { var result; if (typeof document undefined) { return; } // Write if (arguments.length > 1) { attributes extend({ path: / }, api.defaults, attributes); if (typeof attributes.expires number) { var expires new Date(); expires.setMilliseconds(expires.getMilliseconds() + attributes.expires * 864e+5); attributes.expires expires; } // Were using expires because max-age is not supported by IE attributes.expires attributes.expires ? attributes.expires.toUTCString() : ; try { result JSON.stringify(value); if (/^\{\/.test(result)) { value result; } } catch (e) {} if (!converter.write) { value encodeURIComponent(String(value)) .replace(/%(23|24|26|2B|3A|3C|3E|3D|2F|3F|40|5B|5D|5E|60|7B|7D|7C)/g, decodeURIComponent); } else { value converter.write(value, key); } key encodeURIComponent(String(key)); key key.replace(/%(23|24|26|2B|5E|60|7C)/g, decodeURIComponent); key key.replace(/\(\)/g, escape); var stringifiedAttributes ; for (var attributeName in attributes) { if (!attributesattributeName) { continue; } stringifiedAttributes + ; + attributeName; if (attributesattributeName true) { continue; } stringifiedAttributes + + attributesattributeName; } return (document.cookie key + + value + stringifiedAttributes); } // Read if (!key) { result {}; } // To prevent the for loop in the first place assign an empty array // in case there are no cookies at all. Also prevents odd result when // calling get() var cookies document.cookie ? document.cookie.split(; ) : ; var rdecode /(%0-9A-Z{2})+/g; var i 0; for (; i cookies.length; i++) { var parts cookiesi.split(); var cookie parts.slice(1).join(); if (cookie.charAt(0) ) { cookie cookie.slice(1, -1); } try { var name parts0.replace(rdecode, decodeURIComponent); cookie converter.read ? converter.read(cookie, name) : converter(cookie, name) || cookie.replace(rdecode, decodeURIComponent); if (this.json) { try { cookie JSON.parse(cookie); } catch (e) {} } if (key name) { result cookie; break; } if (!key) { resultname cookie; } } catch (e) {} } return result; } api.set api; api.get function (key) { return api.call(api, key); }; api.getJSON function () { return api.apply({ json: true }, .slice.call(arguments)); }; api.defaults {}; api.remove function (key, attributes) { api(key, , extend(attributes, { expires: -1 })); }; api.withConverter init; return api; } return init(function () {});})); var policy getParameterByName(policy); var kpid getParameterByName(kpid); var exp getParameterByName(exp); var sig getParameterByName(sig); var encodedTargetUrl getParameterByName(encodedTargetUrl); var decodedTargetUrl encodedTargetUrl && decodeURIComponent(encodedTargetUrl); var validTargetURL getValidURL(decodedTargetUrl); var hash window.location.hash; if (policy && kpid && exp && sig) { var curr_origin window.location.origin; Cookies.set(CloudFront-Policy, policy, { secure: true, sameSite: None, expires: 1 }); Cookies.set(CloudFront-Key-Pair-Id, kpid, { secure: true, sameSite: None, expires: 1 }); Cookies.set(CloudFront-Expiration, exp, { secure: true, sameSite: None, expires: 1 }); Cookies.set(CloudFront-Signature, sig, { secure: true, sameSite: None, expires: 1 }); // Preserve that hash through to the original caller. if(validTargetURL && curr_origin validTargetURL.origin) { window.location.replace(decodedTargetUrl + hash); } else { window.location.replace(curr_origin + hash); } } else if (Cookies.get(CloudFront-Policy)){ //Nothing to do. } else { // Put the hash on the end of the cloudfront signer URL, not inside the encodedTargetUrl, so that it gets // preserved through the authentication process and doesnt impact midway or CFSigners url limits. var referrer window.location.href.split(#)0; var encodedUrl encodeURIComponent(referrer); window.location.replace(https://cloudfrontsigner.ninjas.security.a2z.com/sign?encodedTargetUrl + encodedUrl + hash); } /script> /head> body> p>Redirecting you for Auth/p> !-- This one should be a Bindle that doesnt exist, and triggers a 400 response from ECS. --> div styledisplay:none idbindlediv>amzn1.bindle.resource.4wqeiypdzqft2wuovxkq/div> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]