Help
RSS
API
Feed
Maltego
Contact
Domain > cliffmap.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-10-11
5.75.153.179
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginx/1.18.0 (Ubuntu)Date: Sat, 01 Jun 2024 23:55:41 GMTContent-Type: text/htmlContent-Length: 178Connection: keep-aliveLocation: https://cliffmap.com/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/1.18.0 (Ubuntu)/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Sat, 01 Jun 2024 23:55:42 GMTContent-Type: text/htmlContent-Length: 1880Last-Modified: Tue, 27 Jun 2023 18:23:03 GMTConnection: keep-aliveETag: 649b29 !DOCTYPE html>html>head> !-- If you are serving your web app in a path other than the root, change the href value below to reflect the base path you are serving from. The path provided below has to start and end with a slash / in order for it to work correctly. For more details: * https://developer.mozilla.org/en-US/docs/Web/HTML/Element/base This is a placeholder for base href that will be replaced by the value of the `--base-href` argument provided to `flutter build`. --> base href/> meta charsetUTF-8> meta contentIEEdge http-equivX-UA-Compatible> meta contentFind Cliff diving spots near you! namedescription> !-- iOS meta tags & icons --> meta contentyes nameapple-mobile-web-app-capable> meta contentblack nameapple-mobile-web-app-status-bar-style> meta contentCliffmap nameapple-mobile-web-app-title> link hreficons/Icon-192.png relapple-touch-icon> !-- Favicon --> link hreffavicon.png relicon typeimage/png/> title>Cliffmap/title> link hrefmanifest.json relmanifest> script> // The value below is injected by flutter build, do not touch. var serviceWorkerVersion 1818285115; /script> !-- This script adds the flutter initialization JS code --> script defer srcflutter.js>/script>/head>body>script> window.addEventListener(load, function(ev) { // Download main.dart.js _flutter.loader.loadEntrypoint({ serviceWorker: { serviceWorkerVersion: serviceWorkerVersion, } }).then(function(engineInitializer) { return engineInitializer.initializeEngine(); }).then(function(appRunner) { return appRunner.runApp(); }); });/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]