Help
RSS
API
Feed
Maltego
Contact
Domain > calcium-prdv.univ-pau.fr
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-11-14
194.167.156.117
(
ClassC
)
Port 80
HTTP/1.1 302 FoundDate: Fri, 16 Aug 2024 21:28:43 GMTServer: Apache/2.4.59 (Debian)Location: https://rdv-medical-espacesanteetudiant.univ-pau.fr/Content-Length: 326Content-Type: text/html; charsetiso- !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>302 Found/title>/head>body>h1>Found/h1>p>The document has moved a hrefhttps://rdv-medical-espacesanteetudiant.univ-pau.fr/>here/a>./p>hr>address>Apache/2.4.59 (Debian) Server at calcium-prdv.univ-pau.fr Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 Date: Fri, 16 Aug 2024 21:28:44 GMTServer: Apache/2.4.59 (Debian)Cache-Control: no-cache, no-storePragma: no-cacheExpires: Thu, 01 Jan 1970 00:00:00 GMTX-Content-Type-Options: nosniffX-XS !doctype html>html langfr>head>script typetext/javascript>window.Vaadin window.Vaadin || {}; window.Vaadin.theme window.Vaadin.theme || {};window.Vaadin.theme.flowBootstrap true;/script>meta http-equivContent-Type contenttext/html; charsetutf-8>meta http-equivX-UA-Compatible contentIEedge>base href.>meta nameviewport contentwidthdevice-width, initial-scale1.0>title>Bienvenue - PRdV/title>style typetext/css>body {height:100vh;width:100%;margin:0;}.v-reconnect-dialog, .v-system-error {position: absolute;color: black;background: white;top: 1em;right: 1em;border: 1px solid black;padding: 1em;z-index: 10000;max-width: calc(100vw - 4em);max-height: calc(100vh - 4em);overflow: auto;} .v-system-error {color: red;pointer-events: auto;}/style>script typetext/javascript src./VAADIN/build/webcomponentsjs/webcomponents-loader.js>/script>script typemodule src./VAADIN/build/vaadin-bundle-14648d0409b6f50e1e2d.cache.js data-app-idROOT crossorigin>/script>script typetext/javascript defer src./VAADIN/build/vaadin-bundle.es5-ce30e89cdd9fb9859be8.cache.js nomodule data-app-idROOT>/script>script typetext/javascript defer src./VAADIN/static/push/vaadinPush-min.js?v2.7.14>/script>script typetext/javascript>//!CDATA(function() { var apps {}; var log; if (typeof console undefined || !window.location.search.match(/&?debug(&|$)/)) { /* If no console.log present, just use a no-op */ log function() {}; } else if (typeof console.log function) { /* If its a function, use it with apply */ log function() { console.log.apply(console, arguments); }; } else { /* In IE, its a native function for which apply is not defined, but it works without a proper this reference */ log console.log; } var isInitializedInDom function(appId) { var appDiv document.getElementById(appId); if (!appDiv) { return false; } for ( var i 0; i appDiv.childElementCount; i++) { var className appDiv.childNodesi.className; /* If the app div contains a child with the class v-app-loading we have on
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]