Help
RSS
API
Feed
Maltego
Contact
Domain > jungologic.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-04-06
3.18.250.49
(
ClassC
)
2024-10-03
3.14.37.13
(
ClassC
)
2024-11-24
3.14.116.247
(
ClassC
)
2024-12-31
3.131.75.14
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Thu, 03 Oct 2024 10:18:47 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://jungologic.com:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Thu, 03 Oct 2024 10:18:47 GMTContent-Type: text/html; charsetUTF-8Content-Length: 7229Connection: keep-aliveX-Content-Type-Option: nosniffCache-control: no-cacheX-Frame-Options: S !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.01 Transitional//EN>html langen>head>title>Jungologic Login/title>meta http-equivexpires content0>meta http-equivContent-Security-Policy content default-src jungo1.jungologic.com jungologic.com jungomail.jungologic.com *.jungologic.com *.cloudfront.net *.googleadservices.com />link relstylesheet typetext/css href/domcfg.nsf/cssLogin?ReadForm>link relstylesheet href/js/bootstrap/4.5.2/css/bootstrap.min.css>!-- Optional JavaScript -->!-- jQuery first, then Popper.js, then Bootstrap JS -->script src/js/jquery-3.4.1.min.js>/script>script src/js/popper.min.js>/script>script src/js/bootstrap/4.5.2/js/bootstrap.min.js>/script>script languageJavaScript typetext/javascript>!-- //SPR# KMOA6YUDZ3: ignore any focus errors in case the focus cant be set (form invisible, etc)window.onerror new Function(return true;);function setFormFocus() { document.forms0.Username.focus(); document.forms0.Username.select();}// -->/script>/head>body text#000000 bgcolor#FFFFFF onloadsetFormFocus();>form onsubmitvar rf document.forms0.RedirectTo;var rdirrf.value;var nrdir rdir.replace(/http:/gi, "https:");//alert(nrdir);rf.value nrdirreturn true; methodpost action/names.nsf?Login name_jungologin>input typehidden name%%ModDate value8906823700000000>table border0 width100% height70%>tr>td aligncenter> style> .bd-placeholder-img { font-size: 1.125rem; text-anchor: middle; -webkit-user-select: none; -moz-user-select: none; user-select: none; } /style>div classcontainer> form>div classrow> div classcol-6>br> img src/domcfg.nsf/23fe28a16cd16139862586b200475f76/$Body/0.3A8?OpenElement&FieldElemFormatgif width300 height110> /div>/div>div classcol-6>/div>/div> div classform-group row> label forUsername classcol-xs-3 col-sm-3 col-md-4 control-label>defaultUsername/>/label> div classcol-xs-9 col-sm-7 col-md-5 col-lg-3> input typetext size35 classform-control idUsernamee nameUsername placeholderUsername/> /div> /div> div classform
Subdomains
Date
Domain
IP
www.jungologic.com
2024-11-24
3.19.153.117
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]