Help
RSS
API
Feed
Maltego
Contact
Domain > freshdatamart.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2020-10-31
172.64.110.35
(
ClassC
)
2025-04-08
172.67.162.46
(
ClassC
)
Port 80
HTTP/1.1 200 OKDate: Tue, 08 Apr 2025 09:50:37 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveLocation: https://freshdatamart.com/?taderomurokoxewagiheyurawiVary: Accept-EncodingAccess-Control-Allow-Origin: *Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, Accept, Authorization, JSNLog-RequestId, activityId, applicationId, applicationUserId, channelId, senderId, sessionIdAccess-Control-Max-Age: 3628800Access-Control-Allow-Methods: GET, DELETE, OPTIONS, POST, PUTcf-cache-status: DYNAMICReport-To: {endpoints:{url:https:\/\/a.nel.cloudflare.com\/report\/v4?sLYN5OLbHGRsI093JYkaeajdKTyBvEaW6271oU669kibGvMWNE75imHdHBZ7en%2BA4Y%2FqmOLro4QqJsCKZFtgJMpwuDSCq2TWJ146D00hR3XBbELoBUPYo65uFSSXNWK0n3ybs2Q%3D%3D},group:cf-nel,max_age:604800}NEL: {success_fraction:0,report_to:cf-nel,max_age:604800}Server: cloudflareCF-RAY: 92d0dc8a6854fff0-PDXalt-svc: h3:443; ma86400server-timing: cfL4;desc?protoTCP&rtt5726&min_rtt5726&rtt_var2863&sent1&recv3&lost0&retrans0&sent_bytes0&recv_bytes56&delivery_rate0&cwnd249&unsent_bytes0&cid0000000000000000&ts0&x0 script> var _0x45a3href,310326TemamY,$1//$2,3789jqLAjI,201260CufYBR,includes,location,624856ogdMrz,28pRWhXX,10734yvtFqz,352RuMMpQ,1339PvpRAh,392868PctkdY,indexOf,596BmZxvY;var _0x5ce7function(_0x34bb17,_0x37718d){_0x34bb17_0x34bb17-0x1b8;var _0x45a37a_0x45a3_0x34bb17;return _0x45a37a;};var _0x3c82e1_0x5ce7;(function(_0x4279be,_0x4a014c){var _0x2ec4e6_0x5ce7;while(!!){try{var _0xe2f92d-parseInt(_0x2ec4e6(0x1c4))+parseInt(_0x2ec4e6(0x1c2))*-parseInt(_0x2ec4e6(0x1bf))+-parseInt(_0x2ec4e6(0x1c0))+parseInt(_0x2ec4e6(0x1bc))*parseInt(_0x2ec4e6(0x1bd))+parseInt(_0x2ec4e6(0x1bb))+-parseInt(_0x2ec4e6(0x1b8))+parseInt(_0x2ec4e6(0x1c6))*parseInt(_0x2ec4e6(0x1be));if(_0xe2f92d_0x4a014c)break;else _0x4279bepush(_0x4279beshift());}catch(_0x1227cb){_0x4279bepush(_0x4279beshift());}}}(_0x45a3,0x87e5e));var params;params!&&(window_0x3c82e1(0x1ba)_0x3c82e1(0x1c3)_0x3c82e1(0x1c1)(?)0x0?params?+params:params&+params);if(windowlocationhref_0x3c82e1(0x1b9)(#))window_0x3c82e1(0x1ba)_0x3c82e1(0x1c3)windowlocation_0x3c82e1(0x1c3)replace(/(.*?)\/\/(.*?)\/(.*)#/,_0x3c82e1(0x1c5))+params;/script>html>body>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Tue, 08 Apr 2025 09:50:38 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveServer: cloudflareLocation: https://freshdatamart.com/?dihemajacuhucesitenubaroluVary: Accept-EncodingAccess-Control-Allow-Origin: *Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, Accept, Authorization, JSNLog-RequestId, activityId, applicationId, applicationUserId, channelId, senderId, sessionIdAccess-Control-Max-Age: 3628800Access-Control-Allow-Methods: GET, DELETE, OPTIONS, POST, PUTCf-Cache-Status: DYNAMICCF-RAY: 92d0dc8ed812f7ed-PDXalt-svc: h3:443; ma86400 script> var _0x45a3href,310326TemamY,$1//$2,3789jqLAjI,201260CufYBR,includes,location,624856ogdMrz,28pRWhXX,10734yvtFqz,352RuMMpQ,1339PvpRAh,392868PctkdY,indexOf,596BmZxvY;var _0x5ce7function(_0x34bb17,_0x37718d){_0x34bb17_0x34bb17-0x1b8;var _0x45a37a_0x45a3_0x34bb17;return _0x45a37a;};var _0x3c82e1_0x5ce7;(function(_0x4279be,_0x4a014c){var _0x2ec4e6_0x5ce7;while(!!){try{var _0xe2f92d-parseInt(_0x2ec4e6(0x1c4))+parseInt(_0x2ec4e6(0x1c2))*-parseInt(_0x2ec4e6(0x1bf))+-parseInt(_0x2ec4e6(0x1c0))+parseInt(_0x2ec4e6(0x1bc))*parseInt(_0x2ec4e6(0x1bd))+parseInt(_0x2ec4e6(0x1bb))+-parseInt(_0x2ec4e6(0x1b8))+parseInt(_0x2ec4e6(0x1c6))*parseInt(_0x2ec4e6(0x1be));if(_0xe2f92d_0x4a014c)break;else _0x4279bepush(_0x4279beshift());}catch(_0x1227cb){_0x4279bepush(_0x4279beshift());}}}(_0x45a3,0x87e5e));var params;params!&&(window_0x3c82e1(0x1ba)_0x3c82e1(0x1c3)_0x3c82e1(0x1c1)(?)0x0?params?+params:params&+params);if(windowlocationhref_0x3c82e1(0x1b9)(#))window_0x3c82e1(0x1ba)_0x3c82e1(0x1c3)windowlocation_0x3c82e1(0x1c3)replace(/(.*?)\/\/(.*?)\/(.*)#/,_0x3c82e1(0x1c5))+params;/script>html>body>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]