Help
RSS
API
Feed
Maltego
Contact
Domain > edpl.co
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2026-02-19
13.235.198.212
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyContent-Type: text/html; charsetUTF-8Location: https://edpl.co/Server: Microsoft-IIS/10.0X-Powered-By: ASP.NETX-Powered-By-Plesk: PleskWinDate: Sun, 19 Jan 2025 23:49:30 head>title>Document Moved/title>/head>body>h1>Object Moved/h1>This document may be found a HREFhttps://edpl.co/>here/a>/body>
Port 443
HTTP/1.1 200 OKContent-Type: text/html; charsetUTF-8Server: Microsoft-IIS/10.0X-Powered-By: ASP.NETX-Powered-By-Plesk: PleskWinDate: Sun, 19 Jan 2025 23:49:30 GMTContent-Length: 4886 script typetext/javascript languagejavascript> var objisSystems 1; var objBckgrnd .$bckgrnd.; var objPubImages .$pubimages.; var objClass .$Class.; var objGroupContent .$grpdesc.; var objModContent .$moddesc.; var objAplay .$aplay.; var objIntro .$introlink.; var objProceed .$proceedlink.; var objWalkthru .$walkthrulink.; var objPricing .$pricinglink.; var objeNav .$enavigation.; var objpNav .$pnavigation.; var objAboutus ERP New Version ,Note for Approval,SOP (EPC Portal),SOP DoA,HRSTOP Portal,Payroll,DMS System,DMS Structure,Emp Induction,Sell DO; var objLink https://server4.farvisioncloud.com,/*http://10.1.2.233/farvision*/http://10.1.4.62:8081,https://experion.interfacing.com,/*http://edpl.co/images/DOA_Experion_V5_23042021.pdf*/,https://experion.hrstop.com,https://dkmsince1968.in/Login.aspx, /* http://10.1.2.232:9080/navigator*/http://10.1.4.62:8080/omnidocs/dist/#/web,/*http://edpl.co/dmsstructure.php*/,http://edpl.co/InductionDocs.php,https://app.sell.do; var objPname erp,nfa,sop,doa,emp,pay,dms,dmsstr,Induction,misdash; var objPublic .$public.; var objPubname .$pubname.; var objPubTitle .$pubtitle.; var objImages images/erp1.png,images/nfa-logo.png,images/sop.png,images/doa.png,images/employeeportal.png,images/payroll.png, images/dms.png,images/dmsstructure.png,images/induction.png,images/selldo.png; var objDisabled1 .$disabled1link.; var objDisabled2 .$disabled2link.;//#005B94 // #A6CE39 /script> script typetext/javascript srcprojects/lib/startup.js>/script>script typetext/javascript languagejavascript> var objisSystems 1; var objBckgrnd images/Untitled1.png,images/Untitled1.png,images/Untitled2.png,images/Untitled3.png,images/Untitled4.png,images/Untitled1.png,images/Untitled2.png,images/Untitled3.png,images/Untitled4.png; var objPubImages {1:images/Logo-01.png,2:images/Logo-0234.png,3:images/linkedin.png,4:images/facebook.png,5:images/windchants.png,6:images/heartsong.png,7:images/westerlies.png,8:images/manual.png,9:images/Vigil_Mechanism_Policy.
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]