Help
RSS
API
Feed
Maltego
Contact
Domain > ect.com.hk
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-05-13
15.235.163.65
(
ClassC
)
2025-02-05
172.67.208.240
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginxDate: Mon, 13 May 2024 01:21:33 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-aliveLocation: https://ect.com.hk/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginxDate: Mon, 13 May 2024 01:21:34 GMTContent-Type: text/html; charsetUTF-8Content-Length: 154310Connection: keep-aliveX-Powered-By: PHP/7.4.33Expires: Thu, 19 Nov 1981 08:52: !DOCTYPE html>html langtc> head> meta charsetutf-8> title>主頁 - ECT/title> meta namedescription content /> meta namekeywords content /> meta propertyog:title content主頁 - ECT/> meta propertyog:description content/> meta propertyog:image content/> meta nameviewport contentwidthdevice-width, initial-scale1> link relcanonical hrefhttps://ect.com.hk /> !-- CSRF Token --> meta namecsrf-token contentZ19YOnGKtvOjDCsQgmk8auzta7tLPu3lilLLVSfE> link hrefhttps://ect.com.hk/assets/frontend/common/css/normalize.css relstylesheet typetext/css> link hrefhttps://ect.com.hk/assets/frontend/common/css/components.css relstylesheet typetext/css> link hrefhttps://ect.com.hk/assets/frontend/common/css/ect-v11-ysd.css relstylesheet typetext/css> link relstylesheet hrefhttps://fonts.googleapis.com/css?familyNoto+Sans+TC:100,300,regular,500,700,900%7CNoto+Serif+TC:regular,500&subsetchinese-traditional,latin,chinese-traditional,latin mediaall> !-- if lt IE 9>script srchttps://cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.3/html5shiv.min.js typetext/javascript>/script>!endif --> script typetext/javascript> ! function(o, c) { var n c.documentElement, t w-mod-; n.className + t + js, (ontouchstart in o || o.DocumentTouch && c instanceof DocumentTouch) && (n.className + t + touch) }(window, document); /script> link hrefhttps://ect.com.hk/assets/frontend/common/images/ect_favicon.png relshortcut icon typeimage/x-icon> link hrefhttps://ect.com.hk/assets/frontend/common/images/webclip.jpg relapple-touch-icon> link hrefhttps://ect.com.hk/assets/frontend/common/css/swiper-bundle.min.css relstylesheet> link hrefhttps://ect.com.hk/assets/frontend/common/css/jquery.toast.min.css relstylesheet> link hrefhttps://ect.com.hk/assets/frontend/common/css/website.css?31 relstylesheet> script> var config {
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]