Help
RSS
API
Feed
Maltego
Contact
Domain > cubiqz.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-02-08
83.217.93.75
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginxDate: Thu, 23 May 2024 07:46:26 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-aliveLocation: https://cubiqz.com/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/center>/body>/html>
Port 443
HTTP/1.1 500 Internal Server ErrorServer: nginxDate: Thu, 23 May 2024 07:46:27 GMTContent-Type: text/plain;charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveSet-Cookie: PHPSESSIDqrkf6cqdlpns Exception: Deprecated Functionality: preg_match(): Passing null to parameter #2 ($subject) of type string is deprecated in /data/web/magento2/vendor/amasty/module-page-speed-tools/Lib/MobileDetect.php on line 1267 in /data/web/magento2/vendor/magento/framework/App/ErrorHandler.php:62Stack trace:#0 internal function: MagentoFrameworkAppErrorHandler->handler()#1 /data/web/magento2/vendor/amasty/module-page-speed-tools/Lib/MobileDetect.php(1267): preg_match()#2 /data/web/magento2/vendor/amasty/module-page-speed-tools/Lib/MobileDetect.php(1216): AmastyPageSpeedToolsLibMobileDetect->match()#3 /data/web/magento2/vendor/amasty/module-page-speed-tools/Model/DeviceDetect.php(110): AmastyPageSpeedToolsLibMobileDetect->isTablet()#4 /data/web/magento2/vendor/amasty/module-page-speed-tools/Model/DeviceDetect.php(86): AmastyPageSpeedToolsModelDeviceDetect->detectDevice()#5 /data/web/magento2/vendor/amasty/module-page-speed-tools/Model/DeviceDetect.php(96): AmastyPageSpeedToolsModelDeviceDetect->getDeviceParams()#6 /data/web/magento2/vendor/amasty/module-lazy-load/Plugin/Framework/App/Http/Context.php(43): AmastyPageSpeedToolsModelDeviceDetect->getDeviceType()#7 /data/web/magento2/vendor/magento/framework/Interception/Interceptor.php(121): AmastyLazyLoadPluginFrameworkAppHttpContext->beforeGetVaryString()#8 /data/web/magento2/vendor/magento/framework/Interception/Interceptor.php(153): MagentoFrameworkAppHttpContextInterceptor->MagentoFrameworkInterception{closure}()#9 /data/web/magento2/generated/code/Magento/Framework/App/Http/Context/Interceptor.php(23): MagentoFrameworkAppHttpContextInterceptor->___callPlugins()#10 /data/web/magento2/vendor/magento/framework/App/Response/Http.php(109): MagentoFrameworkAppHttpContextInterceptor->getVaryString()#11 /data/web/magento2/generated/code/Magento/Framework/App/Response/Http/Interceptor.php(32): MagentoFrameworkAppResponseHttp->sendVary()#12 /data/web/magento2/vendor/magento/module-page-cache/Model/App/Response/HttpPlugin.php(29): MagentoFrameworkAppResponseHttpInterceptor->sendVary()
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]