Help
RSS
API
Feed
Maltego
Contact
Domain > cutopia.app
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2022-08-31
18.64.236.118
(
ClassC
)
2022-09-09
108.139.15.34
(
ClassC
)
2022-09-09
108.139.15.42
(
ClassC
)
2023-05-25
18.164.96.118
(
ClassC
)
2024-02-11
99.84.66.108
(
ClassC
)
2024-11-06
18.161.6.86
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Sun, 11 Feb 2024 09:57:51 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://cutopia.app/X-Cache: Redirect from html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 3069Connection: keep-aliveDate: Sun, 11 Feb 2024 09:57:52 GMTServer: AmazonS3Accept-Ranges: bytesETag: 3a9e820ee4d1cf1c65986e47b0e06817Last-Modifi !DOCTYPE html>html>head>meta nameviewport contentwidthdevice-width/>meta charSetutf-8/>title>CUtopia - CUHK Course Review and Planning Platform/title>meta namerobots contentindex,follow/>meta namedescription contentCUtopia is a course review and timetable planning website for CUHK students. It provides a platform for students to share their opinions and pick the course that best fits them./>meta propertyog:title contentCUtopia - CUHK Course Review and Planning Platform/>meta propertyog:description contentCUtopia is a course review and timetable planning website for CUHK students. It provides a platform for students to share their opinions and pick the course that best fits them./>meta namenext-head-count content7/>link relicon href/cutopia-logo.png/>link relapple-touch-icon href/cutopia-logo.png/>link relpreconnect hrefhttps://fonts.googleapis.com/>link relpreconnect hrefhttps://fonts.gstatic.com/>link relstylesheet data-hrefhttps://fonts.googleapis.com/css2?familyPacifico&displayswap/>link relpreload href/_next/static/css/c51f57f39639e2d6.css asstyle/>link relstylesheet href/_next/static/css/c51f57f39639e2d6.css data-n-g/>link relpreload href/_next/static/css/3cba44d2ed355c3a.css asstyle/>link relstylesheet href/_next/static/css/3cba44d2ed355c3a.css data-n-p/>noscript data-n-css>/noscript>script defer nomodule src/_next/static/chunks/polyfills-5cd94c89d3acac5f.js>/script>script src/_next/static/chunks/webpack-a2a4331e74c49efc.js defer>/script>script src/_next/static/chunks/framework-03c1643fa40d3053.js defer>/script>script src/_next/static/chunks/main-72e31fc9ddbb5b32.js defer>/script>script src/_next/static/chunks/pages/_app-cc786f3726425d7c.js defer>/script>script src/_next/static/chunks/e5908a55-f76239575fb2d4b2.js defer>/script>script src/_next/static/chunks/e2070dfd-2e500a90d3dc9de1.js defer>/script>script src/_next/static/chunks/049d0497-c8e18674e7f09074.js defer>/script>script src/_next/static/chunks/316-bebffb59778abf82.js defer>/script>script src/_next/static/chunks/26-96fb96b5ff352e60.js defer>/scr
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]