Help
RSS
API
Feed
Maltego
Contact
Domain > fly.demo.surfairdev.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-03-27
3.226.69.3
(
ClassC
)
2025-07-19
52.1.171.38
(
ClassC
)
2025-07-29
52.45.185.21
(
ClassC
)
2025-09-16
34.231.235.101
(
ClassC
)
2025-09-19
3.226.159.31
(
ClassC
)
2026-01-22
34.226.156.61
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyContent-Type: text/html; charsetutf-8Location: https://fly.demo.surfairdev.com/Date: Sat, 19 Jul 2025 09:56:42 GMTContent-Length: 67 a hrefhttps://fly.demo.surfairdev.com/>Moved Permanently/a>.
Port 443
HTTP/1.1 200 OKAccess-Control-Allow-Headers: X-reqed-WithAccess-Control-Allow-Origin: *Content-Type: text/html; charsetutf-8Date: Sat, 19 Jul 2025 09:56:43 GMTSet-Cookie: galaxy-stickyGWCtEpuJaw4CEq7P !DOCTYPE html>html>head> link relstylesheet typetext/css class__meteor-css__ href/221e2fc3497501ffa5ea5f011b83c2153f41898e.css?meteor_css_resourcetrue>meta charsetutf-8 /> title>Surf Air/title> meta namedescription contentSurf Air /> meta nameviewport contentwidthdevice-width, initial-scale1, minimal-ui, maximum-scale1, minimum-scale1 /> link relicon sizes16x16 32x32 href/favicon.ico /> link relshortcut icon typeimage/png href/favicon.png?v1 sizes16x16 32x32 64x64 /> link relapple-touch-icon sizes120x120 href/apple-touch-icon-precomposed.png /> meta nameapple-mobile-web-app-status-bar-style contentblack-translucent> !-- Preconnect to services --> link relpreconnect hrefhttps://connect.facebook.net> !-- Google tag (gtag.js) --> script async srchttps://www.googletagmanager.com/gtag/js?idAW-535336471>/script> script> window.dataLayer window.dataLayer || ; function gtag() { dataLayer.push(arguments); } gtag(js, new Date()); gtag(config, AW-535336471); /script>!-- script data-siteidk49VWlZaRg-->!-- srchttps://api.cartstack.com/js/customer-tracking/surfair.com_d6a827932c177ec890ae60d4b84b7a08.js-->!-- typetext/javascript>/script>--> script typetext/javascript src//script.crazyegg.com/pages/scripts/0121/9214.js asyncasync>/script> !-- Start VWO Async SmartCode --> link relpreconnect hrefhttps://dev.visualwebsiteoptimizer.com /> script typetext/javascript idvwoCode> window._vwo_code || (function () { var account_id 833290, version 2.0, settings_tolerance 2000, hide_element body, hide_element_style opacity:0 !important;filter:alpha(opacity0) !important;background:none !important, /* DO NOT EDIT BELOW THIS LINE */ f false, w window, d document, v d.querySelector(#vwoCode), cK _vwo_ + account_id + _settings, cc {}; try { var c JSON.parse(localStorage.getItem(_vwo_ + account_id + _config)); cc c && typeof c object ? c : {}; } catch (e) { } var stT cc.stT session ? w.sessionStorage : w.localStorage; code { use_existing_jqu
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]