Help
RSS
API
Feed
Maltego
Contact
Domain > cheongyang.go.kr
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-25
27.101.61.30
(
ClassC
)
Port 80
HTTP/1.1 400 Bad RequestDate: Fri, 31 May 2024 07:43:29 GMTConnection: closeContent-Length: 1414Content-Type: text/html; charsetUTF-8 !DOCTYPE html>html>head> meta charsetutf-8> meta nameviewport contentwidthdevice-width> title>400 Bad Request/title> style typetext/css> body { font-family: Calibri, Verdana, Geneva, sans-serif; } .layer { position: absolute; top: 0; left: 0; width: 100%; height: 100%; text-align: center } .layer .content{ display: inline-block; margin: auto; margin-top: 100px; height: 185px; background: #fff; text-align: left; vertical-align: middle; } .t_level1 { font-size: 70px; font-weight: bold; } .t_level2 { font-size: 25px; font-weight: normal; color: #787878; } .t_level3 { font-size: 14px; color: #C30; } .t_level4 { font-size: 14px; color: #0000FF; } /style>/head>body> div classlayer> br> div classcontent> div classtextbox> span classt_level1>400/span> span classt_level2>Bad Request/span> br> span classt_level3>The server cannot or will not process the request due to an apparent client error (e.g., malformed request syntax, invalid request message framing, or deceptive request routing)./span> br> span classt_level4>If you have any questions, please contact the administrator with the following code. 797E43F93A32B9867CC3511A97A3F2DC/span> br> /div> /div> /div>/body>/html>
Port 443
HTTP/1.1 400 Bad RequestDate: Fri, 31 May 2024 07:43:30 GMTConnection: closeContent-Length: 1414Content-Type: text/html; charsetUTF-8 !DOCTYPE html>html>head> meta charsetutf-8> meta nameviewport contentwidthdevice-width> title>400 Bad Request/title> style typetext/css> body { font-family: Calibri, Verdana, Geneva, sans-serif; } .layer { position: absolute; top: 0; left: 0; width: 100%; height: 100%; text-align: center } .layer .content{ display: inline-block; margin: auto; margin-top: 100px; height: 185px; background: #fff; text-align: left; vertical-align: middle; } .t_level1 { font-size: 70px; font-weight: bold; } .t_level2 { font-size: 25px; font-weight: normal; color: #787878; } .t_level3 { font-size: 14px; color: #C30; } .t_level4 { font-size: 14px; color: #0000FF; } /style>/head>body> div classlayer> br> div classcontent> div classtextbox> span classt_level1>400/span> span classt_level2>Bad Request/span> br> span classt_level3>The server cannot or will not process the request due to an apparent client error (e.g., malformed request syntax, invalid request message framing, or deceptive request routing)./span> br> span classt_level4>If you have any questions, please contact the administrator with the following code. DBF7C16D90E3569E0A483C7A1622B3B9/span> br> /div> /div> /div>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]