Help
RSS
API
Feed
Maltego
Contact
Domain > gosca-1.co.kr
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-05-06
52.78.31.69
(
ClassC
)
2024-06-13
15.164.113.22
(
ClassC
)
2024-09-22
43.201.137.13
(
ClassC
)
2024-10-06
13.125.160.128
(
ClassC
)
2025-01-10
52.79.162.76
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Mon, 06 May 2024 03:06:47 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://gosca-1.co.kr:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 Date: Mon, 06 May 2024 03:06:48 GMTContent-Type: text/html;charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveServer: nginx/1.24.0X-Content-Type-Options: nosniffX-XSS-Protection: !DOCTYPE html>html>head>meta charsetutf-8>meta nameviewport contentwidthdevice-width,initial-scale1.0,minimum-scale1.0,maximum-scale1.0,, user-scalableno>!-- script src../js/jquery.min.js>/script>script src../js/main.js>/script> -->!-- link relstylesheet hrefhttps://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css> --> link href//fonts.googleapis.com/css?familyNoto+Sans relstylesheet typetext/css>link hrefhttps://fonts.googleapis.com/css?familyRoboto relstylesheet>script src../js/jquery.min.js>/script>script src../js/ALOGIN_V100.js?ver-1.453>/script>script src../js/popup.js?ver-1.453>/script>link href../css/popup.css?ver-1.453 relstylesheet>link href../css/reset.css?ver-1.453 relstylesheet>!-- link th:href@{../css/login.css relstylesheet> -->link href../css/user.css?ver-1.453 relstylesheet>link href../css/common.css?ver-1.453 relstylesheet>link href../css/icon.css?ver-1.453 relstylesheet>link relstylesheet hrefhttps://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css>!--구글 애드센스-->script async srchttps://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?clientca-pub-2338451340894630crossoriginanonymous>/script>!-- link href../css/icon.css relstylesheet> -->title>고스카 로그인/title>/head>body>!-- div classcontainer login> div classtitle> span>Brilliant study place,/span> span>GOSCA/span> /div> form classinputform> input classsubinput no1 typenumber nameloginid placeholder휴대폰 번호를 입력해주세요/> div classline no1>/div> input classsubinput no2 typenumber nameupwd placeholder비밀번호 maxlength6 pattern0-9* inputmodenumeric min111111 max999999 style-webkit-text-security: disc; oninputmaxLengthCheck(this)/> div classline no2>/div> label classcheckbox-wrap>input typecheckbox>span classcheck-icon>/span>/label>span>아이디 기억하기/span> input typehidden iddeviceyn namedeviceyn value> /form> div classbluebtn login>로그인/div> div classwhitebtn>회원가입/div> div classcaustext>비밀번호
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]