Help
RSS
API
Feed
Maltego
Contact
Domain > dhakagroup.edu.pk
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Files that talk to dhakagroup.edu.pk
MD5
A/V
b3b681aa156ed3b82043a7c5989a4db3
212b5250ce87275087adedeb81a4d0c3
DNS Resolutions
Date
IP Address
2013-10-26
67.23.191.4
(
ClassC
)
2024-11-17
65.108.101.31
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyConnection: Keep-AliveKeep-Alive: timeout5, max100content-type: text/htmlcontent-length: 707date: Thu, 05 Sep 2024 15:17:03 GMTserver: LiteSpeedlocation: https://dhakagro !DOCTYPE html>html styleheight:100%>head>meta nameviewport contentwidthdevice-width, initial-scale1, shrink-to-fitno />title> 301 Moved Permanently/title>/head>body stylecolor: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;>div styleheight:auto; min-height:100%; > div styletext-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;> h1 stylemargin:0; font-size:150px; line-height:150px; font-weight:bold;>301/h1>h2 stylemargin-top:20px;font-size: 30px;>Moved Permanently/h2>p>The document has been permanently moved./p>/div>/div>/body>/html>
Port 443
HTTP/1.1 200 OKConnection: Keep-AliveKeep-Alive: timeout5, max100content-type: text/htmllast-modified: Thu, 04 Jan 2024 23:36:04 GMTaccept-ranges: bytescontent-length: 6538date: Thu, 05 Sep 2024 15:17 !DOCTYPE html PUBLIC -//W3C//DTD XHTML 1.0 Transitional//EN http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd>html xmlnshttp://www.w3.org/1999/xhtml>head>meta http-equivContent-Type contenttext/html; charsetutf-8 />title>Dhaka Group of Educational Institutions/title> link relshortcut icon hreffavicon.ico />style typetext/css>!--.style1 {font-family: Arial, Helvetica, sans-serif}.style4 {font-size: 14px}a:link { color: #0066FF; text-decoration: none;}a:visited { text-decoration: none; color: #666666;}a:hover { text-decoration: none; color: #000000;}a:active { text-decoration: none; color: #0066CC;}.style5 {font-size: 18px}body { background-color: #EAEAEA;}-->/style>script typetext/javascript>!--function MM_swapImgRestore() { //v3.0 var i,x,adocument.MM_sr; for(i0;a&&ia.length&&(xai)&&x.oSrc;i++) x.srcx.oSrc;}function MM_preloadImages() { //v3.0 var ddocument; if(d.images){ if(!d.MM_p) d.MM_pnew Array(); var i,jd.MM_p.length,aMM_preloadImages.arguments; for(i0; ia.length; i++) if (ai.indexOf(#)!0){ d.MM_pjnew Image; d.MM_pj++.srcai;}}}function MM_findObj(n, d) { //v4.01 var p,i,x; if(!d) ddocument; if((pn.indexOf(?))>0&&parent.frames.length) { dparent.framesn.substring(p+1).document; nn.substring(0,p);} if(!(xdn)&&d.all) xd.alln; for (i0;!x&&id.forms.length;i++) xd.formsin; for(i0;!x&&d.layers&&id.layers.length;i++) xMM_findObj(n,d.layersi.document); if(!x && d.getElementById) xd.getElementById(n); return x;}function MM_swapImage() { //v3.0 var i,j0,x,aMM_swapImage.arguments; document.MM_srnew Array; for(i0;i(a.length-2);i+3) if ((xMM_findObj(ai))!null){document.MM_srj++x; if(!x.oSrc) x.oSrcx.src; x.srcai+2;}}//-->/script>/head>body onloadMM_preloadImages(dcc_over.png,sghs_over.png,dss_over.png,icons/twitter_over.png,icons/online_apply_over.png,icons/one_drive_over.png,icons/news_over.png,icons/map_over.png,icons/mail_over.png,icons/gallery_over.png,icons/facebook_over.png)>div aligncenter>br /> p aligncenter classstyle1 stylecolor:#0066CC> span classstyle4> img srcmain.png /> br />br />
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]