Help
RSS
API
Feed
Maltego
Contact
Domain > flight-nccl.nordea.dk
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-11-24
23.50.50.17
(
ClassC
)
2025-01-07
23.50.50.16
(
ClassC
)
Port 443
HTTP/1.1 200 OKCache-Control: private, no-cache, no-store, proxy-revalidate, no-transformPragma: no-cacheExpires: 0X-Frame-Options: SAMEORIGINX-Content-Type-Options: nosniffX-XSS-Protection: 1; modebl !DOCTYPE html>html ng-appmainApp ng-csp>head> meta charsetUTF-8> meta nameviewport contentwidthdevice-width, initial-scale1> meta nameformat-detection contenttelephoneno> meta namegoogle valuenotranslate> link relshortcut icon href/favicon.ico typeimage/x-icon/> title>Nordea/title> link href/vendor-f9b41e6cc0.css relstylesheet typetext/css /> link href/common-5d2e1000ef.css relstylesheet typetext/css /> link href/modules-d6e1107b32.css relstylesheet typetext/css /> link href/main-da55124389.css relstylesheet typetext/css /> script async src//policy.cookiereports.com/735544c3_panel-da-dk.js>/script>/head>body>div ui-view> div classmain-spinner>div>/div>div>/div>div>/div>div>/div>/div>/div>script typeapplication/javascript> var COUNTRY DK; var SEGMENT household; var APP_VERSION 2.0.12; var ENV PROD; var PRODUCT ; var CLIENT_ID NDHWDK;/script>script typeapplication/javascript> var DEPENDENCY_VERSION {dbw-authsign:4.1.21,dbw-common:11.2.3,dbw-core:3.7.11,dbw-labels:0.1.2442,dbw-lobby-common:1.2.14,dbw-localization:2.3.0,dbw-login:5.1.3,dbw-nccl-origination-dk:1.2.107,dbw-overdraft-origination-dk:1.0.65,dbw-vendor:1.2.11};/script>script typetext/javascript> if (window.location.href.split(subject_token).length 2) { var jwt_subject_token window.location.href.split(subject_token)1.match(/a-zA-Z-_0-9.+/)0; } if (window.location.href.split(language).length 2) { var language window.location.href.split(language)1.match(/a-zA-Z{2}/)0; if (language) { document.cookie dbw.locale + language.toLowerCase() + -DK;expiresFri, 31 Dec 9999 23:59:59 GMT;path/; } } var GET_PARAMETERS {}; var params location.search.slice(1).split(&); for (var i 0; i params.length; i++) { var splitParam paramsi.split(); GET_PARAMETERSsplitParam0 splitParam1; } if (GET_PARAMETERScode && GET_PARAMETERSstate) { window.history.replaceState(null, null, window.location.pathname + wi
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]