Help
RSS
API
Feed
Maltego
Contact
Domain > cometd4.ecn.cl
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-04-05
169.57.132.196
(
ClassC
)
Port 80
HTTP/1.1 200 OKDate: Wed, 04 Oct 2023 16:22:17 GMTAccept-Ranges: bytesContent-Type: text/htmlContent-Length: 1348Last-Modified: Fri, 11 Apr 2014 16:00:58 GMTServer: Jetty(8.1.15.v20140411) HTML> HEAD> TITLE>Powered By Jetty/TITLE> META http-equivPragma contentno-cache> META http-equivCache-Control contentno-cache,no-store> /HEAD>BODY>A HREFhttp://www.eclipse.org/jetty>IMG SRCjetty_banner.gif>/A>h1>Welcome to Jetty 8 - REMOTE ACCESS!!/h1>p>This is the Test webapp for the Jetty 8 HTTP Server and Servlet Container. For more information about Jetty, please visit oura hrefhttp://www.eclipse.org/jetty>website/a>or a hrefhttp://www.eclipse.org/jetty/documentation/>documentation/a>. Commercial support for Jetty is available via a hrefhttp://www.webtide.com>webtide/a>./p>p>This test context serves several demo filters and servletsthat are not safe for deployment on the internet, since (by design) they contain cross domain scripting vulnerabilities and reveal private information. This pageis displayed because you have accessed this context from a non local IP address./p>p>You can disable the remote address checking by editing contexts/test.d/override-web.xml, uncommenting the definition of the TestFilter, and changing theremote init parameter to true./p>p>This webapp is deployed in $JETTY_HOME/webapp/test.war and configured by $JETTY_HOME/contexts/test.xml and $JETTY_HOME/contexts/test.d/override-web.xml/p>/BODY>/HTML>
Port 443
HTTP/1.1 200 OKServer: nginxDate: Wed, 04 Oct 2023 16:22:18 GMTContent-Type: text/htmlContent-Length: 1348Connection: keep-aliveAccept-Ranges: bytesLast-Modified: Fri, 11 Apr 2014 16:00:58 GMT HTML> HEAD> TITLE>Powered By Jetty/TITLE> META http-equivPragma contentno-cache> META http-equivCache-Control contentno-cache,no-store> /HEAD>BODY>A HREFhttp://www.eclipse.org/jetty>IMG SRCjetty_banner.gif>/A>h1>Welcome to Jetty 8 - REMOTE ACCESS!!/h1>p>This is the Test webapp for the Jetty 8 HTTP Server and Servlet Container. For more information about Jetty, please visit oura hrefhttp://www.eclipse.org/jetty>website/a>or a hrefhttp://www.eclipse.org/jetty/documentation/>documentation/a>. Commercial support for Jetty is available via a hrefhttp://www.webtide.com>webtide/a>./p>p>This test context serves several demo filters and servletsthat are not safe for deployment on the internet, since (by design) they contain cross domain scripting vulnerabilities and reveal private information. This pageis displayed because you have accessed this context from a non local IP address./p>p>You can disable the remote address checking by editing contexts/test.d/override-web.xml, uncommenting the definition of the TestFilter, and changing theremote init parameter to true./p>p>This webapp is deployed in $JETTY_HOME/webapp/test.war and configured by $JETTY_HOME/contexts/test.xml and $JETTY_HOME/contexts/test.d/override-web.xml/p>/BODY>/HTML>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]