Help
RSS
API
Feed
Maltego
Contact
Domain > bhutansuper.in
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-07-15
199.79.62.19
(
ClassC
)
Port 80
HTTP/1.1 302 FoundDate: Thu, 02 May 2024 01:54:36 GMTServer: nginx/1.21.6Content-Type: text/html; charsetiso-8859-1Content-Length: 211Location: https://www.bhutansuper.in/X-Server-Cache: trueX-Proxy-C !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>302 Found/title>/head>body>h1>Found/h1>p>The document has moved a hrefhttps://www.bhutansuper.in/>here/a>./p>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Thu, 02 May 2024 01:54:36 GMTServer: nginx/1.21.6Content-Type: text/html; charsetUTF-8Expires: Thu, 19 Nov 1981 08:52:00 GMTCache-Control: no-store, no-cache, must-revalidatePragm !doctype html>html>head> !-- Google tag (gtag.js) -->script async srchttps://www.googletagmanager.com/gtag/js?idG-YF8DEDZEET>/script>script> window.dataLayer window.dataLayer || ; function gtag(){dataLayer.push(arguments);} gtag(js, new Date()); gtag(config, G-YF8DEDZEET);/script> meta charsetutf-8> title>Bhutan Super/title> meta nameviewport contentwidthdevice-width, initial-scale1.0> meta http-equivX-UA-Compatible contentIEedge> link hrefhttps://bhutansuper.in//css/bootstrap.min.css relstylesheet> link hrefhttps://bhutansuper.in//css/custom.css relstylesheet> link hrefhttps://bhutansuper.in//font-awesome/css/font-awesome.min.css relstylesheet> link relstylesheet hrefhttps://bhutansuper.in//menu/styles.css> script srcjhttps://bhutansuper.in//s/jquery-latest.min.js typetext/javascript>/script> script srchttps://bhutansuper.in//menu/script.js>/script> !--------Date Function -------------> script typetext/javascript srchttp://ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js>/script> !--Load Script and Stylesheet --> script typetext/javascript srchttps://bhutansuper.in//jquery.simple-dtpicker.js>/script> link typetext/css hrefhttps://bhutansuper.in//jquery.simple-dtpicker.css relstylesheet /> !-------------End--------> script languagejavascript>var xmlHttp1function result(str){ //alert(str);xmlHttp1GetXmlHttpObject()if (xmlHttp1null) { alert (Browser does not support HTTP request) return }var url1ajax_result.phpurl1url1+?q+strxmlHttp1.onreadystatechangestateChanged1 xmlHttp1.open(GET,url1,true)xmlHttp1.send(null)}function stateChanged1() { if (xmlHttp1.readyState4 || xmlHttp1.readyStatecomplete) { document.getElementById(resultvalues).style.displayblock; document.getElementById(resultvalues).innerHTMLxmlHttp1.responseText }}function GetXmlHttpObject(){var xmlHttp1null;try { // Firefox, Opera 8.0+, Safari xmlHttp1new XMLHttpRequest(); }catch (e) { //Internet Explorer try { xmlHttp1new ActiveXObject(Msxml2.XMLHTTP); } catch (e) { xmlHttp1new ActiveXObject(Microsoft.X
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]