Help
RSS
API
Feed
Maltego
Contact
Domain > gruppe.sternsingen.at
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-12-30
168.119.79.157
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Tue, 29 Aug 2023 00:11:59 GMTServer: Apache/2.4.52 (Ubuntu)Location: https://gruppe.sternsingen.at/Content-Length: 325Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://gruppe.sternsingen.at/>here/a>./p>hr>address>Apache/2.4.52 (Ubuntu) Server at gruppe.sternsingen.at Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Tue, 29 Aug 2023 00:11:59 GMTServer: Apache/2.4.52 (Ubuntu)Set-Cookie: ci_session935i0eea22ts6mp2rgrie9vk36lebogn; expiresTue, 29-Aug-2023 02:11:59 GMT; Max-Age7200; path/; HttpOn !DOCTYPE html>html langde>head>meta charsetutf-8 />meta namemsapplication-tap-highlight contentno />meta nameviewport content initial-scale1, maximum-scale1, minimum-scale1, widthdevice-width />!-- user-scalableno, --> link relmanifest href/manifest.json> meta nametheme-color content#007883> link relicon typeimage/x-icon href/favicon.ico> link relapple-touch-icon href/assets/icon/ios/touch.png>!-- https://build.phonegap.com/apps/3352866/installThis is a wide open CSP declaration. To lock this down for production, see below. -->!--meta http-equivContent-Security-Policy contentdefault-src * unsafe-inline; style-src self unsafe-inline; media-src * />this was inj works-->!-- Good default declaration: * gap: is required only on iOS (when using UIWebView) and is needed for JS->native communication * https://ssl.gstatic.com is required only on Android and is needed for TalkBack to function properly * Disables use of eval() and inline scripts in order to mitigate risk of XSS vulnerabilities. To change this: * Enable inline JS: add unsafe-inline to default-src * Enable eval(): add unsafe-eval to default-src * Create your own at http://cspisawesome.com -->!-- meta http-equivContent-Security-Policy contentdefault-src self data: gap: unsafe-inline https://ssl.gstatic.com; style-src self unsafe-inline; media-src * /> -->!-- meta http-equivContent-Security-Policy contentdefault-src self data: gap: *;script-src self unsafe-inline unsafe-eval *;style-src self unsafe-inline unsafe-eval *;media-src self unsafe-inline unsafe-eval *;img-src self unsafe-inline unsafe-eval *;connect-srv self unsafe-inline unsafe-eval *>--> !--WORKSmeta http-equivContent-Security-Policy contentdefault-src gap: file://* *; style-src * unsafe-inline; script-src * unsafe-inline unsafe-eval; img-src * data: unsafe-inline; connect-src * unsafe-inline; />-->!--link relstylesheet typetext/css hrefhttps://fonts.googleapis.com/css?familyFira+Sans:400,500,700 mediaall>-->link relstylesheet typetext/css href/cust
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]