Help
RSS
API
Feed
Maltego
Contact
Domain > filetransferpickup.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-15
50.198.156.205
(
ClassC
)
Port 80
HTTP/1.1 200 OKCache-Control: privateContent-Type: text/htmlServer: Microsoft-IIS/10.0Set-Cookie: ASPSESSIONIDASCRQBQAFKOEFKHBPFMFLMJLPEGCJMPF; path/X-Powered-By: ASP.NETAccess-Control-Allow-Origin: * !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.01 Transitional//EN>html>meta nameIMPORTANT contentThis page is part of a simulated phishing attack initiated by Office IT Solutions on behalf of its customers. />meta nameIMPORTANT contentIf you have any questions please contact support@oits.com. />meta contentIEedge,chrome1 http-equivX-UA-Compatible />meta http-equivContent-Type contenttext/html; charsetutf-8 />meta nameIMPORTANT contentThis page is part of a simulated phishing attack initiated by Office IT Solutions on behalf of its customers. />meta nameIMPORTANT contentIf you have any questions please contact support@oits.com. />script srchttps://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js>/script>link hrefhttps://s3.amazonaws.com/helpimg/landing_pages/css/dd.css relstylesheet typetext/css />link hrefhttps://s3.amazonaws.com/helpimg/landing_pages/css/flags.css relstylesheet typetext/css />script> eval(function (p, a, c, k, e, r) { e function (c) { return (c a ? : e(parseInt(c / a))) + ((c c % a) > 35 ? String.fromCharCode(c + 29) : c.toString(36)) }; if (!.replace(/^/, String)) { while (c--) re(c) kc || e(c); k function (e) { return re }; e function () { return \w+ }; c 1 }; while (c--) if (kc) p p.replace(new RegExp(\b + e(c) + \b, g), kc); return p }(4 1A1A||{};(6($){1A{3w:3.0,3x:52 53,2R:20,3y:6(v){5(v!12){$(.2D).1l({1u:2S,23:4a})}1b{$(.2D).1l({1u:4b,23:2T})}},2U:\,2V:6(a,b,c){cc||3z;4 d;1W(c.2E()){1h3z:1h4c:d$(a).2W(b).1d(1O);1i}14 d}};$.2X{};$.2W{};$.2F(11,$.2X,1A);$.2F(11,$.2W,1A);5($.1L.241v){$.1L.24$.1L.54}5($.1L.181v){$.1L.18$.1L.55;$.1L.1y$.1L.56}5(1w $.2Y.4d6){$.2Y:.3A$.2Y.4d(6(b){14 6(a){14 $(a).1n().2Z().4e(b.2Z())>0}})}1b{$.2Y:.3A6(a,i,m){14 $(a).1n().2Z().4e(m3.2Z())>0}}6 1O(q,t){4 u$.2F(11,{1H:{1d:1e,1k:0,3B:1e,25:0,1P:12,30:57},4f:1O,1u:58,2d:7,31:0,32:11,1X:59,2e:12,4g:5a,3C:1M,4h:2S,2p:11,1I:\,4i:0.7,3D:11,18:{2V:1e,2q:1e,33:1e,1Y:1e,1B:1e,34:1e,4j:1e,1M:1e,3E:1e,3F:1e,2f:1e,2r:1e,4k:1e,2g:1e,2h:1e}},t);4 x15;4 y{3G:5b,1Q:5c,3H:5d,2i:5e,1m:5f};4 z{1O:u.4f,2G:2G,3I:3I 5g,3
Port 443
HTTP/1.1 200 OKCache-Control: privateContent-Type: text/htmlServer: Microsoft-IIS/10.0Set-Cookie: ASPSESSIONIDAWCRQBQAHKOEFKHBDIOIKDJCJEOFOMKI; secure; path/X-Powered-By: ASP.NETAccess-Control-Allow-O !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.01 Transitional//EN>html>meta nameIMPORTANT contentThis page is part of a simulated phishing attack initiated by Office IT Solutions on behalf of its customers. />meta nameIMPORTANT contentIf you have any questions please contact support@oits.com. />meta contentIEedge,chrome1 http-equivX-UA-Compatible />meta http-equivContent-Type contenttext/html; charsetutf-8 />meta nameIMPORTANT contentThis page is part of a simulated phishing attack initiated by Office IT Solutions on behalf of its customers. />meta nameIMPORTANT contentIf you have any questions please contact support@oits.com. />script srchttps://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js>/script>link hrefhttps://s3.amazonaws.com/helpimg/landing_pages/css/dd.css relstylesheet typetext/css />link hrefhttps://s3.amazonaws.com/helpimg/landing_pages/css/flags.css relstylesheet typetext/css />script> eval(function (p, a, c, k, e, r) { e function (c) { return (c a ? : e(parseInt(c / a))) + ((c c % a) > 35 ? String.fromCharCode(c + 29) : c.toString(36)) }; if (!.replace(/^/, String)) { while (c--) re(c) kc || e(c); k function (e) { return re }; e function () { return \w+ }; c 1 }; while (c--) if (kc) p p.replace(new RegExp(\b + e(c) + \b, g), kc); return p }(4 1A1A||{};(6($){1A{3w:3.0,3x:52 53,2R:20,3y:6(v){5(v!12){$(.2D).1l({1u:2S,23:4a})}1b{$(.2D).1l({1u:4b,23:2T})}},2U:\,2V:6(a,b,c){cc||3z;4 d;1W(c.2E()){1h3z:1h4c:d$(a).2W(b).1d(1O);1i}14 d}};$.2X{};$.2W{};$.2F(11,$.2X,1A);$.2F(11,$.2W,1A);5($.1L.241v){$.1L.24$.1L.54}5($.1L.181v){$.1L.18$.1L.55;$.1L.1y$.1L.56}5(1w $.2Y.4d6){$.2Y:.3A$.2Y.4d(6(b){14 6(a){14 $(a).1n().2Z().4e(b.2Z())>0}})}1b{$.2Y:.3A6(a,i,m){14 $(a).1n().2Z().4e(m3.2Z())>0}}6 1O(q,t){4 u$.2F(11,{1H:{1d:1e,1k:0,3B:1e,25:0,1P:12,30:57},4f:1O,1u:58,2d:7,31:0,32:11,1X:59,2e:12,4g:5a,3C:1M,4h:2S,2p:11,1I:\,4i:0.7,3D:11,18:{2V:1e,2q:1e,33:1e,1Y:1e,1B:1e,34:1e,4j:1e,1M:1e,3E:1e,3F:1e,2f:1e,2r:1e,4k:1e,2g:1e,2h:1e}},t);4 x15;4 y{3G:5b,1Q:5c,3H:5d,2i:5e,1m:5f};4 z{1O:u.4f,2G:2G,3I:3I 5g,3
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]