Help
RSS
API
Feed
Maltego
Contact
Domain > files-digitaloverdose.ractf.cloud
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2022-05-02
52.85.75.14
(
ClassC
)
2026-02-11
3.175.34.81
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Wed, 11 Feb 2026 08:20:51 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://files-digitaloverdose.ractf.cloud/X-Cache: Redirect from cloudfrontVia: 1.1 0f2e998c974188ba76236f3dadfba890.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P3X-Amz-Cf-Id: crTEHr5ZPCKE2K9yW_iPafVvEYAEhZPeXNHZE1sdWc91uB3sPiJVzw html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 2885Connection: keep-aliveDate: Wed, 11 Feb 2026 08:20:52 GMTLast-Modified: Thu, 31 Mar 2022 20:56:31 GMTETag: bd80a182c145a2ccc4c99d3b7f9c5e1dAccept-Ranges: bytesServer: AmazonS3Strict-Transport-Security: max-age63072000; includeSubdomains; preloadX-Content-Type-Options: nosniffX-Frame-Options: DENYX-XSS-Protection: 1; modeblockReferrer-Policy: same-originVary: Accept-EncodingX-Cache: Miss from cloudfrontVia: 1.1 fd84a98fca0c092bda874136d6c8db62.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P3X-Amz-Cf-Id: DTVJEFkoIiDC9Z26jdhxugh9zcJt53MzMpAGCUMBE-6bIk_BaAvl2A !DOCTYPE html>html>head> meta nameviewport contentwidthdevice-width, initial-scale1.0> title>RACTF Static Files/title> style> @import url(https://fonts.googleapis.com/css2?familyLato:wght@700&displayswap); body { font-family: Lato, sans-serif; color: #dfddeb; background-color: #000000; padding: 0px; } .error-wrap { width: 100%; height: 100%; text-align: center; position: fixed; top: 50%; left: 50%; transform: translate(-50%, -15%); } #flicker-wrap { width: 100%; height: 100%; position: fixed; background-color: #181626; display: block; top: 0px; left: 0px; } h1 { font-size: 450%; padding: 0px; margin: 0px; } h3 { font-size: 150%; padding-top: 2px; margin-block-start: 0.3em; } a { color: #aaa; } /style>/head>body> div idflicker-wrap> div classerror-wrap idflicker> h1>404/h1> h3 iddescription>File not found/h3> a href//ractf.co.uk>Back to safety/a> /div> /div> script> // Easter egg if (Math.floor((Math.random() * 10) + 1) 9) { document.getElementById(description).innerHTML This site is experiencing multiple keter and euclid class containment breaches; enableFlicker() } // Flicker effect function enableFlicker() { let ticksSinceLoad 0; let ticksSinceFullFlicker 0; const scpUrl https://vignette.wikia.nocookie.net/scp-secret-laboratory-wiki/images/9/9d/SCP-173.png/revision/latest?cb20200109013200; setInterval(function() { if (Math.floor((Math.random() * 3) + 1) 2) { ticksSinceLoad + 1; ticksSinceFullFlicker + 1; let rand Math.random(); if (rand > 0.25) { document.getElementById(flicker).style.opacity rand; document.getElementById(flicker-wrap).style.opacity rand*2; } else { if (ticksSinceLoad > 15 && ticksSinceFullFlicker > 7) { ticksSinceFullFlicker 0; document.getElementById(flicker).style.opacity 0; document.getElementById(flicker-wrap).style.opacity 0; if (!document.getElementById(scp)) { let img document.createElement(img); img.src scpUrl; img.id scp img.style.position absolute; img.style.height 20%; document.getElementById(flicker-wrap).appendChild(img) } document.getElementById(scp).style.top Math.floor((Math.random() * 80) + 11) + %; document.getElementById(scp).style.left Math.floor((Math.random() * 80) + 11) + %; } } } }, 100) } /script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]