Help
RSS
API
Feed
Maltego
Contact
Domain > jangstore.kr
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-09-09
183.111.174.80
(
ClassC
)
Port 443
HTTP/1.1 200 OKServer: nginxDate: Sun, 27 Aug 2023 18:54:53 GMTContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveVary: Accept-EncodingX-Powered-By: PHP/7.0.0p1P3P: C !doctype html>html langko>head>meta charsetutf-8>meta http-equivimagetoolbar contentno>meta http-equivX-UA-Compatible contentIE10,chrome1>title>장스토어/title>link relstylesheet hrefhttps://jangstore.kr/theme/basic/css/default_shop.css?ver161020>link relstylesheet hrefhttps://jangstore.kr/theme/basic/skin/shop/basic/style.css?ver161020>link relstylesheet hrefhttps://jangstore.kr/theme/basic/skin/latest/shop_basic/style.css?ver161020>script srchttps://use.fontawesome.com/916deebf20.js>/script>!--if lte IE 8>script srchttps://jangstore.kr/js/html5.js>/script>!endif-->script>// 자바스크립트에서 사용하는 전역변수 선언var g5_url https://jangstore.kr;var g5_bbs_url https://jangstore.kr/bbs;var g5_is_member ;var g5_is_admin ;var g5_is_mobile ;var g5_bo_table ;var g5_sca ;var g5_editor ;var g5_cookie_domain ;/script>script srchttps://jangstore.kr/js/jquery-1.8.3.min.js>/script>script src//code.jquery.com/ui/1.12.0/jquery-ui.min.js>/script>script srchttps://jangstore.kr/js/jquery.shop.menu.js?ver161020>/script>script srchttps://jangstore.kr/js/common.js?ver161020>/script>script srchttps://jangstore.kr/js/wrest.js?ver161020>/script>!-- begin 네이버 공통유입스크립트 -->script typetext/javascript src//wcs.naver.net/wcslog.js>/script>script typetext/javascript>if(!wcs_add) var wcs_add {};wcs_addwa s_dc7507d36ea;wcs.inflow(jangstore.kr);/script>!-- end 네이버 공통유입스크립트 -->/head>body>!-- 상단 시작 { -->div idhd class> h1 idhd_h1>장스토어/h1> div idskip_to_container>a href#container>본문 바로가기/a>/div> !-- 팝업레이어 시작 { -->div idhd_pop> h2>팝업레이어 알림/h2>span classsound_only>팝업레이어 알림이 없습니다./span>/div>script>$(function() { $(.hd_pops_reject).click(function() { var id $(this).attr(class).split( ); var ck_name id1; var exp_time parseInt(id2); $(#+id1).css(display, none); set_cookie(ck_name, 1, exp_time, g5_cookie_domain); }); $(.hd_p
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]