Help
RSS
API
Feed
Maltego
Contact
Domain > img.gothru.org
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-12-27
209.182.235.208
(
ClassC
)
2025-02-02
208.87.130.13
(
ClassC
)
Port 443
HTTP/1.1 200 OKAccept-Ranges: bytesAccess-Control-Allow-Origin: *Alt-Svc: h3:443; ma2592000Cache-Control: max-age31536000Cache-Control: publicContent-Length: 7703Content-Type: application/x-httpd-phpD ?php/* ini_set(display_errors, 1); ini_set(display_startup_errors, 1); error_reporting(E_ALL); */include_once (/var/www/html/image_server/classes/ImageServer.class.php);$folderImages /ghbackup/moderation;$oImageServer new ImageServer();$urlData parse_url($_SERVERREQUEST_URI);if (isset($urlDataquery)) $queries explode(&, $urlDataquery);else $queries array();$count count($queries);if(!($count>0)){ header(HTTP/1.0 400 Bad Request); die();}foreach ($queries as $k > $i) { if (strpos($queries$k, crop) ! false) { $tmp explode(crop, $queries$k); if (isset($tmp1)) $aRequestcrop $tmp1; } if (strpos($queries$k, resize) ! false) { $t explode(resize, $queries$k); if (isset($t1)) { $aRequestresize str_replace(,fill, , $t1); $tmpexplode(x, $aRequestresize); if($tmp11) $aRequestresize$tmp0.x.$tmp0/2; if(is_array($tmp) && empty($tmp1)){ $rh$tmp0/2; $aRequestresize $aRequestresize.$rh; } } } if (strpos($queries$k, save) ! false) $GETsave explode(save, $queries$k)1; if (strpos($queries$k, pad) ! false) $GETpad explode(pad, $queries$k)1;}$aRequestimage_path $folderImages . ($urlDatapath ?? $urlDatapath ?? null);$resolution 8k;$bUseEqImage0;$version-1;if (isset($GETpad)){ $versionintVal(str_replace(bg:,,$GETpad)); if (strpos($GETpad, bg:000016) ! false) $resolution 16k;}if (isset($GETsave)) { $a explode(,qual:, $GETsave); if (is_array($a) && (isset($a1) && strlen($a1) > 0) && (isset($aRequestcrop) || isset($aRequestresize))) $aRequestquality intVal($a1); else $aRequestquality 70;}if (isset($GETpad)) if (strpos($GETpad, bg:640000) ! false && strpos($aRequestimage_path, cube) ! false) $bUseEqImage1; $aRequestformat pathinfo($aRequestimage_path, PATHINFO_EXTENSION);$bIsTourPreview 0;if (strpos($aRequestimage_path, cube) ! false && e
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]