Help
RSS
API
Feed
Maltego
Contact
Domain > lhcapg1038.dnsuser.de
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-25
5.132.160.135
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sun, 24 Nov 2024 19:05:49 GMTServer: Apache/2.4.41 (Ubuntu)Location: https://lhcapg1038.dnsuser.de/Content-Length: 325Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://lhcapg1038.dnsuser.de/>here/a>./p>hr>address>Apache/2.4.41 (Ubuntu) Server at lhcapg1038.dnsuser.de Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 24 Nov 2024 19:05:50 GMTServer: Apache/2.4.41 (Ubuntu)Strict-Transport-Security: max-age63072000Upgrade: h2Connection: UpgradeAccept-Ranges: bytesVary: Accept-EncodingTransfe html itemscope itemtypehttp://schema.org/Product prefixog: http://ogp.me/ns# xmlnshttp://www.w3.org/1999/html> head> meta charsetutf-8> meta http-equivcontent-type contenttext/html;charsetutf-8> meta nameviewport contentwidthdevice-width, initial-scale1.0> meta nametheme-color content#2A3A4B> base href/ /> link relapple-touch-icon hrefimages/apple-touch-icon.png> link relstylesheet hrefcss/all.css?v4628> link relmanifest idmanifest-placeholder> script> // Dynamically generate the manifest location URL. It must be served from the document origin, and we may have // the base pointing to the CDN. This way we can generate a full URL which will bypass the base. document.querySelector(#manifest-placeholder).setAttribute(href, window.location.origin + /manifest.json); document.addEventListener(DOMContentLoaded, () > { if (!JitsiMeetJS.app) { return; } JitsiMeetJS.app.renderEntryPoint({ Component: JitsiMeetJS.app.entryPoints.APP }) const isElectron navigator.userAgent.includes(Electron); const shouldRegisterWorker !isElectron && serviceWorker in navigator; if (shouldRegisterWorker) { navigator.serviceWorker .register(window.location.origin + /pwa-worker.js) .then(reg > { console.log(Service worker registered., reg); }) .catch(err > { console.log(err); }); } }); /script> script> // IE11 and earlier can be identified via their user agent and be // redirected to a page that is known to have no newer js syntax. if (window.navigator.userAgent.match(/(MSIE|Trident)/)) { var roomName encodeURIComponent(window.location.pathname); window.location.href static/recommendedBrowsers.html + ?room + roomName; } window.indexLoadedTime w
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]