Help
RSS
API
Feed
Maltego
Contact
Domain > buy-n-play.ru
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2014-09-23
37.140.192.171
(
ClassC
)
2025-03-22
95.154.199.172
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginx/1.26.1Date: Sat, 28 Sep 2024 03:54:57 GMTContent-Type: text/htmlContent-Length: 169Connection: keep-aliveLocation: https://buy-n-play.ru/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/1.26.1/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginx/1.26.1Content-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveCache-Control: no-cache, privateDate: Sat, 28 Sep 2024 03:54:57 GMTSet-Cookie: X !DOCTYPE html>html langru classdark> head> meta charsetutf-8> meta nameviewport contentwidthdevice-width, initial-scale1> meta namecsrf-token contentMkbKwXYoamINIhKWDzm1BEPCLpLf2k5ur8hXBWNc> title>Покупай и Играй :: интернет-магазин цифровых товаров/title> link relicon hrefhttps://buy-n-play.ru/favicon.svg> !-- Fonts --> link relpreconnect hrefhttps://fonts.googleapis.com> link relpreconnect hrefhttps://fonts.gstatic.com crossorigin> link hrefhttps://fonts.googleapis.com/css2?familyMontserrat:ital,wght@0,100..900;1,100..900&displayswap relstylesheet> !-- Scripts --> link relpreload asstyle hrefhttps://buy-n-play.ru/build/assets/app-BAT431Od.css />link relmodulepreload hrefhttps://buy-n-play.ru/build/assets/app-CZ0peLaz.js />link relstylesheet hrefhttps://buy-n-play.ru/build/assets/app-BAT431Od.css />script typemodule srchttps://buy-n-play.ru/build/assets/app-CZ0peLaz.js>/script> /head> body classfont-sans antialiased> div classmin-h-screen bg-gray-950 flex flex-col> div class> div classmax-w-7xl mx-auto px-4 sm:px-6 lg:px-8> div classflex justify-between h-16> !-- Logo --> div classshrink-0 flex items-center> a hrefhttps://buy-n-play.ru> a hrefhttps://buy-n-play.ru classblock> svg viewBox0 0 1328 480 fillnone xmlnshttp://www.w3.org/2000/svg hrefhttps://buy-n-play.ru classblock flex-grow-0 h-9 w-auto fill-current text-gray-800 dark:text-gray-200> g clip-pathurl(#clip0_71_77)> path dM1037.33 106.667H1144V213.333H1037.33V106.667Z fillwhite/> path fill-ruleevenodd clip-ruleevenodd dM877.333 0H1285.33V53.3333H1328V266.667H1274.67V320H1090.67V480H877.333V0ZM1037.33 426.667V266.667H1221.33V213.333H1274.67V106.667H1221.33V53.3333H930.667V426.667H1037.33Z fillwhite/> path dM504 213.333H557.333V480H504V213.333Z fillwhite/> path dM504 160H770.667V213.333H504V160
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]