Help
RSS
API
Feed
Maltego
Contact
Domain > categoriazap.pwa.app.br
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2020-12-22
54.224.90.229
(
ClassC
)
2024-10-11
130.117.9.110
(
ClassC
)
2025-01-27
154.56.81.110
(
ClassC
)
Port 80
HTTP/1.1 301 Moved Permanentlyserver: openresty/1.19.9.1date: Fri, 11 Oct 2024 07:45:30 GMTcontent-type: text/htmlcontent-length: 175location: https://categoriazap.pwa.app.br/connection: close html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>openresty/1.19.9.1/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginxDate: Fri, 11 Oct 2024 07:45:30 GMTContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveKeep-Alive: timeout20vary: Accept-Encodingx-ssr: 1x- !DOCTYPE html>html style--visible-tabbar-height:0px;--visible-safe-area-inset-bottom:env(safe-area-inset-bottom);--visible-safe-header-inset-bottom:0px; langpt-br>head> base href/> title>Categoria Zap/title> meta http-equivX-UA-Compatible contentIEedge> meta http-equivContent-Type contenttext/html; CharsetUTF-8> meta nameviewport contentwidthdevice-width, initial-scale1.0, viewport-fitcover> meta namemsapplication-tap-highlight contentno> meta nameapple-mobile-web-app-capable contentyes> link relmanifest href/front-assets/manifest.json> link relpreconnect hrefhttps://back.ww-cdn.com/ crossorigin> link relpreload href/apiv4/getSettings?platformwebapp crossorigin asfetch> link relpreload href/apiv3/getLanguage crossorigin asfetch> script>window.gb {storage: {}, user: {}, request: {}};/script> style typetext/css> @font-face {font-family: Roboto;font-display: swap;src: url(https://back.ww-cdn.com/assets/fonts/Roboto-Regular.woff2) format(woff2), url(https://back.ww-cdn.com/assets/fonts/Roboto-Regular.ttf) format(truetype);} @font-face {font-family: Material Icons;font-style: normal;font-weight: 400;src: url(https://back.ww-cdn.com/assets/fonts/MaterialIcons-Regular.woff2) format(woff2), url(https://back.ww-cdn.com/assets/fonts/MaterialIcons-Regular.ttf) format(truetype);} .material-icons {font-family: Material Icons;font-weight: normal;font-style: normal;font-size: 24px;line-height: 1;letter-spacing: normal;text-transform: none;display: inline-block;white-space: nowrap;word-wrap: normal;direction: ltr;-webkit-font-feature-settings: liga;-webkit-font-smoothing: antialiased;} /style>style>html{line-height:1.15;-webkit-text-size-adjust:100%}body{margin:0}html{line-height:1.5;font-family:Roboto,sans-serif;font-weight:400;color:#000000de}@media only screen and (min-width: 0){html{font-size:14px}}@media only screen and (min-width: 1280px){html{font-size:14.5px}}@media only screen and (min-width: 1440px){html{font-size:15px}}:root{--gbuigrid-gutter:16px}@media
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]