Help
RSS
API
Feed
Maltego
Contact
Domain > greenviot.cn
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-10-26
1.15.8.120
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginxDate: Thu, 30 May 2024 17:08:39 GMTContent-Type: text/htmlContent-Length: 178Connection: keep-aliveLocation: https://greenviot.cn/ html>head>title>301 Moved Permanently/title>/head>body bgcolorwhite>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginxDate: Thu, 30 May 2024 17:08:40 GMTContent-Type: text/html; charsetutf-8Content-Length: 2968Last-Modified: Mon, 03 Jan 2022 08:31:50 GMTConnection: keep-aliveETag: 61d2b476 !DOCTYPE html>html langen> head> meta charsetUTF-8 /> meta http-equivX-UA-Compatible contentIEedge /> meta nameviewport contentwidthdevice-width, initial-scale1.0 /> title>企业微信信息绑定/title> link relstylesheet href/assets/css/style.default.css /> link relstylesheet href/assets/css/bootstrap.min.css /> style> html, body { height: 100%; } /style> /head> body> div style display: flex; flex-direction: column; justify-content: center; align-items: center; height: 100%; > !--div styledisplay: flex;align-items: center;margin-bottom: 30px;> label classcontrol-label>员工类型:/label> div> select iduserType classform-control> option value0>普通员工/option> option value1>保安/option> option value2>行政/option> /select> /div> /div>--> !-- 授权绑定 --> a idbtnOk classbtn btn-primary>确定授权注册/a> /div> !-- 选择用户类型 --> script src/assets/js/jquery.min.js>/script> script src/assets/js/drp.core.js?v0.0.2>/script> !-- script typetext/javascript srchttps://res.wx.qq.com/open/js/jweixin-1.3.2.js>/script> --> !-- script srchttps://cdn.bootcss.com/vConsole/3.3.0/vconsole.min.js>/script> --> script> // init vConsole var vConsole new VConsole(); console.log(Hello world); /script> script> var pager (function () { var openId request(openId); var code request(code); //alert(location.href); //alert(openId:+openId+,code:+code); var bindEmployee function () { var employeeType $(#userType).val()||0//alert(openId);//alert(code);//return; console.log(openId + + employeeType ); dataService.ajaxPost( https://greenviot.cn/api/outer/auth/BindEmployee, { OpenId: openId, AuthCode: code, employeeType },
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]