Help
RSS
API
Feed
Maltego
Contact
Domain > brunozwergler.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Whois
Property
Value
NameServer
NS2.GOEDKOPEWEBHOSTER.ORG
Created
2008-07-08 00:00:00
Changed
2016-07-09 00:00:00
Expires
2017-07-08 00:00:00
Registrar
THE REGISTRAR COMPAN
DNS Resolutions
Date
IP Address
2024-11-15
62.166.217.162
(
ClassC
)
Port 80
HTTP/1.1 401 Access DeniedServer: Microsoft-IIS/5.0Date: Fri, 28 Jun 2024 01:27:23 GMTWWW-Authenticate: NegotiateWWW-Authenticate: NTLMConnection: closeContent-Length: 4033Content-Type: text/html !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 3.2 Final//EN>html dirltr>head>style>a:link {font:8pt/11pt verdana; color:FF0000}a:visited {font:8pt/11pt verdana; color:#4e4e4e}/style>META NAMEROBOTS CONTENTNOINDEX>title>You are not authorized to view this page/title>META HTTP-EQUIVContent-Type Contenttext-html; charsetWindows-1252>/head>script> function Homepage(){!--// in real bits, urls get returned to our script like this:// res://shdocvw.dll/http_404.htm#http://www.DocURL.com/bar.htm //For testing use DocURL res://shdocvw.dll/http_404.htm#https://www.microsoft.com/bar.htm DocURLdocument.URL; //this is where the http or https will be, as found by searching for :// but skipping the res:// protocolIndexDocURL.indexOf(://,4); //this finds the ending slash for the domain server serverIndexDocURL.indexOf(/,protocolIndex + 3); //for the href, we need a valid URL to the domain. We search for the # symbol to find the begining //of the true URL, and add 1 to skip it - this is the BeginURL value. We use serverIndex as the end marker. //urlresultDocURL.substring(protocolIndex - 4,serverIndex); BeginURLDocURL.indexOf(#,1) + 1; urlresultDocURL.substring(BeginURL,serverIndex); //for display, we need to skip after http://, and go to the next slash displayresultDocURL.substring(protocolIndex + 3 ,serverIndex); InsertElementAnchor(urlresult, displayresult);}function HtmlEncode(text){ return text.replace(/&/g, &).replace(//g, ").replace(//g, <).replace(/>/g, >);}function TagAttrib(name, value){ return +name++HtmlEncode(value)+;}function PrintTag(tagName, needCloseTag, attrib, inner){ document.write( + tagName + attrib + > + HtmlEncode(inner) ); if (needCloseTag) document.write( / + tagName +> );}function URI(href){ IEVer window.navigator.appVersion; IEVer IEVer.substr( IEVer.indexOf(MSIE) + 5, 3 ); return (IEVer.charAt(1). && IEVer > 5.5) ? encodeURI(href) : escape(href).replace(/%3A/g, :).replace(/%3B/g, ;);}function InsertElementAnchor(href, te
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]