Help
RSS
API
Feed
Maltego
Contact
Domain > dev.vigilance-ingestion.gkoutsa.people.amazon.dev
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-10-04
3.167.69.4
(
ClassC
)
2025-09-19
3.169.173.70
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Fri, 19 Sep 2025 23:58:44 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://dev.vigilance-ingestion.gkoutsa.people.amazon.dev/X-Cache: Redirect from cloudfrontVia: 1.1 08437041a08295a47ee88412dbd8c35a.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P4X-Amz-Cf-Id: Er0zOgTXt06d0oC6pLeY2OB1ULm4ouDc5An9r5KflBrnv2wE9lUfWgX-Frame-Options: DENY html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 403 ForbiddenContent-Type: text/htmlContent-Length: 8772Connection: keep-aliveLast-Modified: Wed, 05 Jun 2024 05:57:13 GMTx-amz-server-side-encryption: AES256x-amz-version-id: Pb9vnnSSmik580zmB5phMXMq5bYq6nP9Accept-Ranges: bytesServer: AmazonS3Date: Fri, 19 Sep 2025 02:17:07 GMTETag: 64bed79a7d6df170ae9c806611e29960X-Cache: Error from cloudfrontVia: 1.1 cb2339b8008ceeabfc2dd9e6cfbc465c.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P4X-Amz-Cf-Id: K6DiBwhUqHQa_QBi4ak_Fuy-fIZ6ddP5TPeOfOuLkDKXnxXts9r8UgAge: 78098X-Frame-Options: DENY !DOCTYPE html>html>head> script typetext/javascript> function getParameterByName(name, url) { if (!url) url window.location.href; name name.replace(/\\/g, \\$&); var regex new RegExp(?& + name + ((^*)|&|#|$)), results regex.exec(url); if (!results) return null; if (!results2) return ; return decodeURIComponent(results2.replace(/\+/g, )); } function getValidURL(url) { try { return new URL(url); } catch (e) { return null; } } /*! * JavaScript Cookie v2.1.4 * https://github.com/js-cookie/js-cookie * * Copyright 2006, 2015 Klaus Hartl & Fagner Brack * Released under the MIT license */ ;(function (factory) { var registeredInModuleLoader false; if (typeof define function && define.amd) { define(factory); registeredInModuleLoader true; } if (typeof exports object) { module.exports factory(); registeredInModuleLoader true; } if (!registeredInModuleLoader) { var OldCookies window.Cookies; var api window.Cookies factory(); api.noConflict function () { window.Cookies OldCookies; return api; }; } }(function () { function extend () { var i 0; var result {}; for (; i arguments.length; i++) { var attributes arguments i ; for (var key in attributes) { resultkey attributeskey; } } return result; } function init (converter) { function api (key, value, attributes) { var result; if (typeof document undefined) { return; } // Write if (arguments.length > 1) { attributes extend({ path: / }, api.defaults, attributes); if (typeof attributes.expires number) { var expires new Date(); expires.setMilliseconds(expires.getMilliseconds() + attributes.expires * 864e+5); attributes.expires expires; } // Were using expires because max-age is not supported by IE attributes.expires attributes.expires ? attributes.expires.toUTCString() : ; try { result JSON.stringify(value); if (/^\{\/.test(result)) { value result; } } catch (e) {} if (!converter.write) { value encodeURIComponent(String(value)) .replace(/%(23|24|26|2B|3A|3C|3E|3D|2F|3F|40|5B|5D|5E|60|7B|7D|7C)/g, decodeURIComponent); } else { value converter.write(value, key); } key encodeURIComponent(String(key)); key key.replace(/%(23|24|26|2B|5E|60|7C)/g, decodeURIComponent); key key.replace(/\(\)/g, escape); var stringifiedAttributes ; for (var attributeName in attributes) { if (!attributesattributeName) { continue; } stringifiedAttributes + ; + attributeName; if (attributesattributeName true) { continue; } stringifiedAttributes + + attributesattributeName; } return (document.cookie key + + value + stringifiedAttributes); } // Read if (!key) { result {}; } // To prevent the for loop in the first place assign an empty array // in case there are no cookies at all. Also prevents odd result when // calling get() var cookies document.cookie ? document.cookie.split(; ) : ; var rdecode /(%0-9A-Z{2})+/g; var i 0; for (; i cookies.length; i++) { var parts cookiesi.split(); var cookie parts.slice(1).join(); if (cookie.charAt(0) ) { cookie cookie.slice(1, -1); } try { var name parts0.replace(rdecode, decodeURIComponent); cookie converter.read ? converter.read(cookie, name) : converter(cookie, name) || cookie.replace(rdecode, decodeURIComponent); if (this.json) { try { cookie JSON.parse(cookie); } catch (e) {} } if (key name) { result cookie; break; } if (!key) { resultname cookie; } } catch (e) {} } return result; } api.set api; api.get function (key) { return api.call(api, key); }; api.getJSON function () { return api.apply({ json: true }, .slice.call(arguments)); }; api.defaults {}; api.remove function (key, attributes) { api(key, , extend(attributes, { expires: -1 })); }; api.withConverter init; return api; } return init(function () {}); })); var policy getParameterByName(policy); var kpid getParameterByName(kpid); var exp getParameterByName(exp); var sig getParameterByName(sig); var encodedTargetUrl getParameterByName(encodedTargetUrl); var decodedTargetUrl encodedTargetUrl && decodeURIComponent(encodedTargetUrl); var validTargetURL getValidURL(decodedTargetUrl) if (policy && kpid && exp && sig) { var curr_origin window.location.origin; Cookies.set(CloudFront-Policy, policy, { secure: true, sameSite: None, expires: 1 }); Cookies.set(CloudFront-Key-Pair-Id, kpid, { secure: true, sameSite: None, expires: 1 }); Cookies.set(CloudFront-Expiration, exp, { secure: true, sameSite: None, expires: 1 }); Cookies.set(CloudFront-Signature, sig, { secure: true, sameSite: None, expires: 1 }); if(validTargetURL && curr_origin validTargetURL.origin) { window.location.replace(decodedTargetUrl); } else { window.location.replace(curr_origin); } } else if (Cookies.get(CloudFront-Policy)){ //Nothing to do. } else { var referrer window.location var encodedUrl encodeURIComponent(referrer.href) window.location.replace(https://cloudfrontsigner.ninjas.security.a2z.com/sign?encodedTargetUrl+encodedUrl); } /script>/head>body>p>Redirecting you for Auth/p>!-- This one should be a Bindle that doesnt exist, and triggers a 400 response from ECS. -->div styledisplay:none idbindlediv>amzn1.bindle.resource.35vyrxkbsccxf67kg7tym2l3q/div>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]