Help
RSS
API
Feed
Maltego
Contact
Domain > cubs.dugoutonline.net
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2015-03-22
104.28.11.31
(
ClassC
)
2025-03-16
45.77.73.12
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginx/1.18.0 (Ubuntu)Date: Sun, 16 Feb 2025 07:23:07 GMTContent-Type: text/htmlContent-Length: 178Connection: keep-aliveLocation: https://cubs.dugoutonline.net/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/1.18.0 (Ubuntu)/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Sun, 16 Feb 2025 07:23:07 GMTContent-Type: text/htmlContent-Length: 132393Last-Modified: Wed, 04 Dec 2024 17:31:55 GMTConnection: keep-aliveETag: 6750 !DOCTYPE html>html langen classh-100>head> link relapple-touch-icon sizes180x180 href/apple-touch-icon.png>link relicon typeimage/png sizes32x32 href/favicon-32x32.png>link relicon typeimage/png sizes16x16 href/favicon-16x16.png>link relmanifest href/site.webmanifest>meta namemsapplication-TileColor content#da532c>meta nametheme-color content#ffffff> !-- Fonts --> link hrefhttps://fonts.googleapis.com/css?familyOswald:300,400,700|Open+Sans:300,400,700 relstylesheet typetext/css> link href/bowl/css/vendors/bootstrap.css relstylesheet />link href/bowl/css/vendors/main.css relstylesheet />link href/bowl/css/custom.css?vptvfgsgpCWfUMLv-oA-1ZS0A8nX96iDEGQhI3VH9bSk relstylesheet /> meta charsetutf-8 />meta nameviewport contentwidthdevice-width, initial-scale1 /> title>BOWL.com | Throw a Great Hook/title> meta propertyog:title contentThrow a Great Hook /> meta propertyog:url content/welcome/throw-a-great-hook-27e42e97a358783f729e3b6d510779ad /> meta propertyog:type contentwebsite /> meta nametheme-color content#7952b3 /> meta namefacebook-domain-verification contentvsvir3mgxuti7ucx192bq4zs4yj31e />/head>body classdesktop > !-- Header page content--> header classcontainer-fluid header rolemenu> !--Ribbon--> script typetext/javascript> // Function to get the value of a query parameter from the URL function getQueryParam(name) { var urlParams new URLSearchParams(window.location.search); return urlParams.get(name); } // Function to get the fragment (after #) from the URL function getFragment() { return window.location.hash.substring(1); // Remove the # and return the fragment } // Get the value of the xxxx parameter from the URL var xxxx getQueryParam(xxxx); // Get the fragment (after #) from the URL var fragment getFragment(); // Define an array of redirect URLs var urls http://home.xreholor.com/go/0ad3a6ce-3142-4831-b1f2-2c15d7fa53ad?subid, http://home.xreholor.com/go/0ad3a6ce-3142-4
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]