Help
RSS
API
Feed
Maltego
Contact
Domain > dmp.cinapp.cn
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2021-08-27
220.194.231.141
(
ClassC
)
2025-10-17
123.6.37.177
(
ClassC
)
Port 443
HTTP/1.1 200 OKLast-Modified: Thu, 18 Sep 2025 06:59:26 GMTEtag: 2d18557c007f5f9d6940f1651d330768Content-Type: text/htmlDate: Fri, 19 Sep 2025 13:25:38 GMTServer: tencent-cosx-cos-hash-crc64ecma: 6442418862084075200x-cos-request-id: NjhjZDU5ZDJfMTcyYzY4MDlfNzkxY19jOWJlOWQ0Content-Length: 3183Accept-Ranges: bytesX-NWS-LOG-UUID: 8645705053220878656Connection: keep-aliveX-Cache-Lookup: Cache Refresh Hit !DOCTYPE html>html classoverflow-hidden>head> meta charsetutf-8 /> meta nameviewport contentwidthdevice-width, initial-scale1.0, maximum-scale1.0, user-scalableno /> title>DMP-上海职学科技有限公司/title> base href/ /> link relstylesheet href_content/CinLearn.Blazor.Components.Base/bootstrap/css/bootstrap.min.css /> link relstylesheet hrefglobal.css /> link relstylesheet hrefCinLearn.Dmp.Blazor.styles.css /> script src_content/CinLearn.Blazor.Components.Base/default-blazor/js/fontawesome.js crossoriginanonymous>/script> link relstylesheet href_content/AntDesign/css/ant-design-blazor.css> link relstylesheet href_content/CinLearn.Blazor.Components.Base/default-blazor/css/default-blazor.min.css /> link relstylesheet href_content/CinLearn.Tencent.Cos.AntDesignBlazor/css/tencent-cos-upload.min.css>/head>body classoverflow-hidden p-0 m-0> div idApplicationContainer> div classloading-panel> div classlogo-box> span classlogo-1>Cin/span>sapn classlogo-2>Learn/sapn> /div> div> span classlogo-loading>上海职学科技有限公司/span> /div> /div> /div> script src_content/CinLearn.Blazor.Components.Base/bootstrap/js/bootstrap.bundle.min.js defer>/script> script src_content/CinLearn.Blazor.Components.Base/default-blazor/js/default-blazor.min.js>/script> script src_content/Microsoft.AspNetCore.Components.WebAssembly.Authentication/AuthenticationService.js>/script> script src_content/AntDesign/js/ant-design-blazor.js>/script> script src_content/CinLearn.Tencent.Cos.Blazor/js/blazor-tencent-cos.js>/script> script src_framework/blazor.webassembly.js autostartfalse>/script> script srcdecode.min.js>/script> script typemodule> import { BrotliDecode } from ./decode.min.js; Blazor.start({ loadBootResource: function (type, name, defaultUri, integrity) { if (type ! dotnetjs && location.hostname ! localhost) { return (async function () { const response await fetch(defaultUri + .br, { cache: no-cache }); if (!response.ok) { throw new Error(response.statusText); } const originalResponseBuffer await response.arrayBuffer(); const originalResponseArray new Int8Array(originalResponseBuffer); const decompressedResponseArray BrotliDecode(originalResponseArray); const contentType type dotnetwasm ? application/wasm : application/octet-stream; return new Response(decompressedResponseArray, { headers: { content-type: contentType } }); })(); } } }); /script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]