Help
RSS
API
Feed
Maltego
Contact
Domain > buga-2009.de
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-04-03
195.192.158.177
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Mon, 18 Nov 2024 21:24:32 GMTServer: Apache/2.4.52 (Ubuntu)Location: https://buga-2009.de/Content-Length: 307Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://buga-2009.de/>here/a>./p>hr>address>Apache/2.4.52 (Ubuntu) Server at buga-2009.de Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Mon, 18 Nov 2024 21:24:33 GMTServer: Apache/2.4.52 (Ubuntu)Upgrade: h2Connection: UpgradeLast-Modified: Thu, 16 Mar 2017 09:52:28 GMTETag: 22d2-54ad604dfc8feAccept-Ranges: bytesCo !-- Quirksmode -->!DOCTYPE html PUBLIC -//W3C//DTD XHTML 1.0 Transitional//EN http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd> html xmlnshttp://www.w3.org/1999/xhtml xml:langen langen> head> title>Bundesgartenschau 2009 in Schwerin/title> !--ignore--> meta namekeywords contentbuga, buga 2009, bundesgartenschau, schwerin, schweriner schloss /> meta namedescription contentbuga, buga 2009, bundesgartenschau, schwerin, schweriner schloss /> link relalternate typeapplication/rss+xml titleNews hrefhttp://www.buga-2009.de/de/rss/news/ /> link relalternate typeapplication/rss+xml titleVeranstaltungen hrefhttp://www.buga-2009.de/de/rss/veranstaltungen/ /> link relalternate typeapplication/rss+xml titlePressemitteilungen hrefhttp://www.buga-2009.de/de/rss/pressemitteilungen/ /> link relalternate typeapplication/rss+xml titleGewinnspiele hrefde/rss/gewinnspiele/index.html /> script srcccds_library/script/lib/prototype.js typetext/javascript>/script> script srcccds_library/script/src/scriptaculous.js typetext/javascript>/script> script typetext/javascript srcccds_library/script/src/effects.js> /script> script typetext/javascript srcjs/lightbox.js>/script> script typetext/javascript srcjs/swfobject.js>/script> script typetext/javascript srcjs/audio-player.js>/script> link relstylesheet typetext/css hrefinc/style.css mediascreen /> link relstylesheet typetext/css hrefinc/tinymce.css mediascreen /> link relstylesheet typetext/css hrefinc/print.css mediaprint /> link relstylesheet typetext/css hrefinc/lightbox.css mediascreen /> script typetext/javascript srcinc/alphaload.js>/script> script typetext/javascript> !-- function send(ma) { var m ma.split(#); document.location.href mailto:+m0+@+m1; } function openBrWindow(theURL,winName,b,h,features) { var eigenschaft,fenster02; x (screen.width-b)/2; y (screen.height-h)/2; var eigenschaftenleft+x+,top+y+,screenX+x+,scr
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]