Help
RSS
API
Feed
Maltego
Contact
Domain > hosts.tweedge.net
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-07-04
143.244.50.82
(
ClassC
)
2024-11-19
169.150.249.169
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Thu, 04 Jul 2024 03:26:25 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-aliveServer: BunnyCDN-LA1-953CDN-PullZone: 1121858CDN-Uid: e4e5934f-0fb3-41b html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Thu, 04 Jul 2024 03:26:26 GMTContent-Type: text/htmlContent-Length: 3358Connection: keep-aliveVary: Accept-EncodingServer: BunnyCDN-LA1-953CDN-PullZone: 1121858CDN-Uid: e4e5934f-0 html>head>link relapple-touch-icon sizes180x180 href/apple-touch-icon.png>link relicon typeimage/png sizes32x32 href/favicon-32x32.png>link relicon typeimage/png sizes16x16 href/favicon-16x16.png>link relmanifest href/site.webmanifest>link relmask-icon href/safari-pinned-tab.svg color#5bbad5>meta namemsapplication-TileColor content#da532c>meta nametheme-color content#ffffff>/head>body>code> (Unofficial) Emerging Threats DNS blocklistsbr>br>Project repository: a hrefhttps://github.com/tweedge/emerging-threats-pihole>https://github.com/tweedge/emerging-threats-pihole/a>br>br>strong>FILES AVAILABLE:/strong>br> a hrefhttps://hosts.tweedge.net/malicious.txt>malicious.txt/a> (recommended)br> a hrefhttps://hosts.tweedge.net/suspicious.txt>suspicious.txt/a>br> a hrefhttps://hosts.tweedge.net/informational.txt>informational.txt/a>br>br>strong>WHAT:/strong>br>These blocklists are intended for use in PiHole or similar DNS-level filters. They are generated automatically from part of the current Emerging Threats Open ruleset, which is threat intelligence and signatures provided by the Emerging Threats research team and contributed to by security researchers around the world.br>br>strong>TECHNICAL NOTICE:/strong>br>While these lists provide some DNS filtering coverage, the provided filter is NOT comparable to protection offered by Emerging Threats signatures when implemented in an IPS such as Snort or Suricata. This is because IDS can perform advanced matching functionality and make bypassing the filter much more difficult. Some key examples:br>br> * If a particular strain of malware queries the public DNS resolver 8.8.8.8 directly, this could bypass PiHole on your network.br> * Emerging Threats includes much more than blocking specific domains, such as detecting and blocking DNS exfiltration attacks based on different parts of the DNS payload that PiHole would simply ignore.br> * And of course, Emerging Threats covers 100s of different
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]