Help
RSS
API
Feed
Maltego
Contact
Domain > bubi-mayer.de
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-03-20
195.4.234.15
(
ClassC
)
Port 80
HTTP/1.1 302 FoundDate: Mon, 18 Nov 2024 21:23:49 GMTServer: Apache/2.4.62 (Debian)Location: https://bubi-mayer.de/Content-Length: 285Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>302 Found/title>/head>body>h1>Found/h1>p>The document has moved a hrefhttps://bubi-mayer.de/>here/a>./p>hr>address>Apache/2.4.62 (Debian) Server at bubi-mayer.de Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 Date: Mon, 18 Nov 2024 21:23:51 GMTServer: Apache/2.4.62 (Debian)Content-Type: text/html;charsetutf-8Set-Cookie: JSESSIONIDCCB161340A77EB64EF1E46A5428BA38B; Path/; HttpOnly; SecureVary: A !doctype html>html langde>head>link relstylesheet typetext/css href/files/css/5205>meta keywordsMayer>meta descriptionMayer Buchbinderei>title>Mayer Buchbinderei/title>script initial>if (!(CSSLayerBlockRule in window)) { window.location.searchv-roldbrowser;}/script>script initial>window.Vaadin window.Vaadin || {};window.Vaadin.TypeScript {};/script>base href.>script typetext/javascript>window.JSCompiler_renameProperty function(a) { return a;}/script>meta charsetUTF-8>meta nameviewport contentwidthdevice-width, initial-scale1>style>body, #outlet { width: 100%; margin: 0; position: relative;}/style>!-- index.ts is included here automatically (either by the dev server or during the build) --> script typemodule crossorigin src./VAADIN/build/indexhtml-B12uQAdJ.js>/script>style>.v-reconnect-dialog,.v-system-error {position: absolute;color: black;background: white;top: 1em;right: 1em;border: 1px solid black;padding: 1em;z-index: 10000;max-width: calc(100vw - 4em);max-height: calc(100vh - 4em);overflow: auto;} .v-system-error {color: indianred;pointer-events: auto;} .v-system-error h3, .v-system-error b {color: red;}/style>style>hidden { display: none !important; }/style>!--CSSImport end-->!--Stylesheet end-->script>function toggleSelectedMenuStyle(href){ var selected document.querySelector(li.selected); if(selected ! null) selected.classList.remove(selected); var toSelect document.querySelector(li.\ + href); if(toSelect ! null) toSelect.classList.add(selected); document.querySelectorAll(li.hasSelectedDescendant).forEach((i) > i.classList.remove(hasSelectedDescendant)); document.querySelectorAll(liclass*x\ + href + ).forEach((descendentSelected) > descendentSelected.classList.add(hasSelectedDescendant)); }/script>script>function handleHamburgerMenu(href, maxMenuLevel, useResponsiveOnClickFunction){ const checkBoxHamburger document.querySelector(#hamburg); if(!useResponsiveOnClickFunction){ checkBoxHamburger.checked false; return; } const menuEntry document.querySelector(li.\ + href); const menuEntryCSSNam
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]