Help
RSS
API
Feed
Maltego
Contact
Domain > booking.mangias.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-12-28
46.28.4.85
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Fri, 30 Aug 2024 17:56:04 GMTServer: ApacheX-XSS-Protection: 1; modeblockX-Content-Type-Options: nosniffLocation: https://booking.mangias.com/Content-Length: 236Con !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://booking.mangias.com/>here/a>./p>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Fri, 30 Aug 2024 17:56:05 GMTServer: ApacheX-XSS-Protection: 1; modeblockX-Content-Type-Options: nosniffUpgrade: h2Connection: UpgradeLast-Modified: Wed, 28 Aug 2024 08:54:11 GMTA !DOCTYPE html>html>head>title>ErmesHotels/title>meta charsetutf-8>meta namedescription contentErmesHotels - Official Booking Engine>meta nameformat-detection contenttelephoneno>meta namemsapplication-tap-highlight contentno>meta nameviewport contentuser-scalableno,initial-scale1,maximum-scale1,minimum-scale1,widthdevice-width>link relicon hrefstatics/quasar-logo.png typeimage/x-icon>link relicon typeimage/png sizes32x32 hrefstatics/icons/favicon-32x32.png>link relicon typeimage/png sizes16x16 hrefstatics/icons/favicon-16x16.png>script>window.dataLayer window.dataLayer || /script>style>.CookieDeclaration { display: none !important; } #CybotCookiebotDialogBodyLevelButtonLevelOptinAllowallSelectionWrapper a { color: white !important; }/style>script srchttps://holipay-api.web.app/holipay.js>/script>script srchttps://cdn.scalapay.com/js/scalapay-widget/webcomponents-bundle.js>/script>script typemodule srchttps://cdn.scalapay.com/widget/v3/js/scalapay-widget.esm.js>/script>script nomodule srchttps://cdn.scalapay.com/widget/v3/js/scalapay-widget.js>/script>script srchttps://static.sojern.com/utils/sjrn_autocx.js data-cookieconsentignore>/script>script srchttps://pay.axepta.it/sdk/axepta-pg-redirect.js>/script>script defer srchttps://api.takyon.io/scripts/info>/script>script>(function(A,D,v,e,n,t,o,r,i){ AtAt||{};oAt.qAt.q||function(){(o.qo.q||).push(arguments)};o.l1*new Date();o.he; rD.createElement(v),iD.getElementsByTagName(v)0;r.async1;r.srchttps://+e+n;i.parentNode.insertBefore(r,i) })(window,document,script,eu.adventori.com,/lp/sitetracker/v4/tag.js,ADventori);/script>link hrefcss/app.fec0faae.css relstylesheet>/head>body>div idq-app>/div>script srchttps://js.stripe.com/v3/ >/script>script>/* if (window && window.location) { if (window.location.href) { if (window.location.href.indexOf(#) > -1) { window.location.href window.location.href.replace(#/, ) } } } */ try { const posChar window.location.h
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]