Help
RSS
API
Feed
Maltego
Contact
Domain > cdg.taskowner.herald.fargate.aws.a2z.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2021-10-12
65.8.56.30
(
ClassC
)
2021-10-12
65.8.56.72
(
ClassC
)
2024-11-18
204.246.191.37
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Mon, 18 Nov 2024 19:21:38 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://cdg.taskowner.herald.fargate.aws.a2z.com/X-Cache: Redirect from cloudfrontVia: 1.1 c9ce112dce78418fe2a7bbe639a34f78.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO50-C2X-Amz-Cf-Id: rMj4HJ1Rq2J1xgxQt9F5-0nxSeWZ5zxY-AmCtLSnRqEXLR62rWOXHA html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 403 ForbiddenContent-Type: text/html; charsetutf-8Content-Length: 8069Connection: keep-aliveDate: Mon, 18 Nov 2024 19:21:39 GMTLast-Modified: Wed, 05 Jun 2024 05:19:40 GMTETag: 2f8add8634e7592fdcd4775db0712f16x-amz-server-side-encryption: AES256x-amz-version-id: VQtVCyGS6uwc1gaAmZhOa4waozLU5MA0Accept-Ranges: bytesServer: AmazonS3X-Cache: Error from cloudfrontVia: 1.1 925a9355525ad52853e1025fe231bef8.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO50-C2X-Amz-Cf-Id: nGYVMrWKcOizGZuTwgtnDdqxJX2Irzk1pEva852wEFxXbZCmWRFoRQ !DOCTYPE html>html> head> script typetext/javascript> function getParameterByName(name, url) { if (!url) url window.location.href; name name.replace(/\\/g, \\$&); var regex new RegExp(?& + name + ((^*)|&|#|$)), results regex.exec(url); if (!results) return null; if (!results2) return ; return decodeURIComponent(results2.replace(/\+/g, )); } function getValidURL(url) { try { return new URL(url); } catch (e) { return null; } }/*! * JavaScript Cookie v2.1.4 * https://github.com/js-cookie/js-cookie * * Copyright 2006, 2015 Klaus Hartl & Fagner Brack * Released under the MIT license */;(function (factory) { var registeredInModuleLoader false; if (typeof define function && define.amd) { define(factory); registeredInModuleLoader true; } if (typeof exports object) { module.exports factory(); registeredInModuleLoader true; } if (!registeredInModuleLoader) { var OldCookies window.Cookies; var api window.Cookies factory(); api.noConflict function () { window.Cookies OldCookies; return api; }; }}(function () { function extend () { var i 0; var result {}; for (; i arguments.length; i++) { var attributes arguments i ; for (var key in attributes) { resultkey attributeskey; } } return result; } function init (converter) { function api (key, value, attributes) { var result; if (typeof document undefined) { return; } // Write if (arguments.length > 1) { attributes extend({ path: / }, api.defaults, attributes); if (typeof attributes.expires number) { var expires new Date(); expires.setMilliseconds(expires.getMilliseconds() + attributes.expires * 864e+5); attributes.expires expires; } // Were using expires because max-age is not supported by IE attributes.expires attributes.expires ? attributes.expires.toUTCString() : ; try { result JSON.stringify(value); if (/^\{\/.test(result)) { value result; } } catch (e) {} if (!converter.write) { value encodeURIComponent(String(value)) .replace(/%(23|24|26|2B|3A|3C|3E|3D|2F|3F|40|5B|5D|5E|60|7B|7D|7C)/g, decodeURIComponent); } else { value converter.write(value, key); } key encodeURIComponent(String(key)); key key.replace(/%(23|24|26|2B|5E|60|7C)/g, decodeURIComponent); key key.replace(/\(\)/g, escape); var stringifiedAttributes ; for (var attributeName in attributes) { if (!attributesattributeName) { continue; } stringifiedAttributes + ; + attributeName; if (attributesattributeName true) { continue; } stringifiedAttributes + + attributesattributeName; } return (document.cookie key + + value + stringifiedAttributes); } // Read if (!key) { result {}; } // To prevent the for loop in the first place assign an empty array // in case there are no cookies at all. Also prevents odd result when // calling get() var cookies document.cookie ? document.cookie.split(; ) : ; var rdecode /(%0-9A-Z{2})+/g; var i 0; for (; i cookies.length; i++) { var parts cookiesi.split(); var cookie parts.slice(1).join(); if (cookie.charAt(0) ) { cookie cookie.slice(1, -1); } try { var name parts0.replace(rdecode, decodeURIComponent); cookie converter.read ? converter.read(cookie, name) : converter(cookie, name) || cookie.replace(rdecode, decodeURIComponent); if (this.json) { try { cookie JSON.parse(cookie); } catch (e) {} } if (key name) { result cookie; break; } if (!key) { resultname cookie; } } catch (e) {} } return result; } api.set api; api.get function (key) { return api.call(api, key); }; api.getJSON function () { return api.apply({ json: true }, .slice.call(arguments)); }; api.defaults {}; api.remove function (key, attributes) { api(key, , extend(attributes, { expires: -1 })); }; api.withConverter init; return api; } return init(function () {});})); var policy getParameterByName(policy); var kpid getParameterByName(kpid); var exp getParameterByName(exp); var sig getParameterByName(sig); var encodedTargetUrl getParameterByName(encodedTargetUrl); var decodedTargetUrl encodedTargetUrl && decodeURIComponent(encodedTargetUrl); var validTargetURL getValidURL(decodedTargetUrl); var hash window.location.hash; if (policy && kpid && exp && sig) { var curr_origin window.location.origin; Cookies.set(CloudFront-Policy, policy, { secure: true, sameSite: None, expires: 1 }); Cookies.set(CloudFront-Key-Pair-Id, kpid, { secure: true, sameSite: None, expires: 1 }); Cookies.set(CloudFront-Expiration, exp, { secure: true, sameSite: None, expires: 1 }); Cookies.set(CloudFront-Signature, sig, { secure: true, sameSite: None, expires: 1 }); // Preserve that hash through to the original caller. if(validTargetURL && curr_origin validTargetURL.origin) { window.location.replace(decodedTargetUrl + hash); } else { window.location.replace(curr_origin + hash); } } else if (Cookies.get(CloudFront-Policy)){ //Nothing to do. } else { // Put the hash on the end of the cloudfront signer URL, not inside the encodedTargetUrl, so that it gets // preserved through the authentication process and doesnt impact midway or CFSigners url limits. var referrer window.location.href.split(#)0; var encodedUrl encodeURIComponent(referrer); window.location.replace(https://cloudfrontsigner.ninjas.security.a2z.com/sign?encodedTargetUrl + encodedUrl + hash); } /script> /head> body> p>Redirecting you for Auth/p> !-- This one should be a Bindle that doesnt exist, and triggers a 400 response from ECS. --> div styledisplay:none idbindlediv>amzn1.bindle.resource.jkg3af6dcioxfoionmza/div> /body>/html>
Subdomains
Date
Domain
IP
dub.taskowner.herald.fargate.aws.a2z.com
2024-09-01
3.163.24.15
cdg.taskowner.herald.fargate.aws.a2z.com
2024-11-18
204.246.191.37
bah.taskowner.herald.fargate.aws.a2z.com
2024-07-20
99.84.66.5
arn.taskowner.herald.fargate.aws.a2z.com
2024-01-09
204.246.191.29
cpt.taskowner.herald.fargate.aws.a2z.com
2024-02-24
99.84.66.67
tnaren.beta.plm.fargate.aws.a2z.com
2024-07-22
3.143.118.210
iad7.zeta.plm.fargate.aws.a2z.com
2024-06-09
54.80.85.106
cmh50.prod.plm.fargate.aws.a2z.com
2024-04-19
52.14.35.26
cmh51.prod.plm.fargate.aws.a2z.com
2024-06-11
18.190.17.50
arn51.prod.plm.fargate.aws.a2z.com
2024-05-27
51.21.12.148
fra52.prod.plm.fargate.aws.a2z.com
2023-11-24
3.78.28.218
cmh52.prod.plm.fargate.aws.a2z.com
2024-06-11
3.136.195.123
fra53.prod.plm.fargate.aws.a2z.com
2024-06-09
3.123.119.57
fra54.prod.plm.fargate.aws.a2z.com
2024-05-14
18.193.241.251
lhr54.prod.plm.fargate.aws.a2z.com
2024-05-30
18.168.102.95
sin4.prod.plm.fargate.aws.a2z.com
2024-05-30
18.139.69.127
iad6.prod.plm.fargate.aws.a2z.com
2024-05-27
3.217.60.191
iad7.prod.plm.fargate.aws.a2z.com
2024-06-09
52.72.177.7
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]