Help
RSS
API
Feed
Maltego
Contact
Domain > brand.treez.io
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2020-12-14
13.249.93.90
(
ClassC
)
2021-05-11
13.226.178.29
(
ClassC
)
2021-05-11
52.84.23.111
(
ClassC
)
2021-09-22
13.249.135.15
(
ClassC
)
2024-02-18
99.84.66.107
(
ClassC
)
2024-09-30
99.84.66.95
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Sun, 18 Feb 2024 02:26:40 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://brand.treez.io/X-Cache: Redirect fr html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 5683Connection: keep-aliveVary: Accept-EncodingDate: Sun, 18 Feb 2024 02:26:41 GMTLast-Modified: Wed, 02 Nov 2022 09:24:36 GMTx-amz-version-id: Ec !DOCTYPE html>html> head> base href/ /> title>BrandTreez/title> link hrefhttps://assets.treez.io/icons/favicon.ico relshortcut icon /> link hrefhttps://cdnjs.cloudflare.com/ajax/libs/normalize/8.0.1/normalize.min.css relstylesheet /> link charsetUTF-8 hrefhttps://cdnjs.cloudflare.com/ajax/libs/slick-carousel/1.6.0/slick.min.css relstylesheet typetext/css /> link hrefhttps://cdnjs.cloudflare.com/ajax/libs/slick-carousel/1.6.0/slick-theme.min.css relstylesheet typetext/css /> link hrefmain.710038eb1ac32212650a.css?710038eb1ac32212650a relstylesheet>/head> body> div idroot>/div> div idPOPOVER>/div> div idMODAL>/div> script crossorigin srchttps://unpkg.com/react@16.8.6/umd/react.development.js>/script> script crossorigin srchttps://unpkg.com/react-dom@16.8.6/umd/react-dom.development.js >/script> script crossorigin srchttps://unpkg.com/react-router-dom@5.0.1/umd/react-router-dom.js >/script> !-- Pendo script-include-snippet: --> script> (function (apiKey) { (function (p, e, n, d, o) { var v, w, x, y, z; o pd pd || {}; o._q o._q || ; v initialize, identify, updateOptions, pageLoad, track; for (w 0, x v.length; w x; ++w) (function (m) { om om || function () { o._qm v0 ? unshift : push( m.concat(.slice.call(arguments, 0)) ); }; })(vw); y e.createElement(n); y.async !0;
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]