Help
RSS
API
Feed
Maltego
Contact
Domain > guffgpt.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2023-12-24
198.54.116.73
(
ClassC
)
2025-01-31
104.21.35.183
(
ClassC
)
Port 80
HTTP/1.1 301 Moved Permanentlykeep-alive: timeout5, max100content-type: text/htmlcontent-length: 707date: Sun, 24 Dec 2023 20:34:17 GMTserver: LiteSpeedlocation: https://guffgpt.com/x-turbo-charged-by !DOCTYPE html>html styleheight:100%>head>meta nameviewport contentwidthdevice-width, initial-scale1, shrink-to-fitno />title> 301 Moved Permanently/title>/head>body stylecolor: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;>div styleheight:auto; min-height:100%; > div styletext-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;> h1 stylemargin:0; font-size:150px; line-height:150px; font-weight:bold;>301/h1>h2 stylemargin-top:20px;font-size: 30px;>Moved Permanently/h2>p>The document has been permanently moved./p>/div>/div>/body>/html>
Port 443
HTTP/1.1 200 OKkeep-alive: timeout5, max100x-powered-by: Expressaccept-ranges: bytescache-control: public, max-age0last-modified: Sun, 15 Oct 2023 17:54:24 GMTetag: W/d91-18b34799318content-type: text !DOCTYPE html>html langen>head> meta charsetUTF-8> meta nameviewport contentwidthdevice-width, initial-scale1.0> title>GuffGPT/title> link relstylesheet typetext/css hrefstyle.css> link relstylesheet hrefhttps://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.0.0-beta3/css/all.min.css> link hrefhttps://fonts.googleapis.com/css2?familyRoboto:wght@400;500&displayswap relstylesheet>/head>body> div idchat-window classlight-theme> div classheader> div classmain-title>GuffGPT 2.0/div> /div> div idchat-messages>/div> form idchat-form> input typetext idchat-input autocompleteoff placeholderType your message here required /> button typesubmit idsend-button> i classfas fa-paper-plane>/i> /button> /form> script> document.addEventListener(DOMContentLoaded, () > { const chatWindow document.getElementById(chat-window); const form document.getElementById(chat-form); const input document.getElementById(chat-input); const messages document.getElementById(chat-messages); form.addEventListener(submit, async (e) > { e.preventDefault(); const message input.value; input.value ; appendUserMessage(message); const typingIndicator document.createElement(div); typingIndicator.className message bot-message typing-indicator; messages.appendChild(typingIndicator); simulateTyping(typingIndicator); let chatbotResponse ; try { const response await fetch(/chat, { method: POST, headers: { Content-Type: application/json, }, body: JSON.stringify({ message: { content: message, author: { id: user-id } } }), }); chatbotResponse await response.text(); } catch (error) {
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]