Help
RSS
API
Feed
Maltego
Contact
Domain > linxz.fun
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-27
8.218.72.177
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginx/1.18.0 (Ubuntu)Date: Sun, 02 Jun 2024 11:04:46 GMTContent-Type: text/htmlContent-Length: 178Connection: keep-aliveLocation: https://linxz.fun/Access-Control html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/1.18.0 (Ubuntu)/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Sun, 02 Jun 2024 11:04:47 GMTContent-Type: text/html; charsetutf-8Content-Length: 6922Connection: keep-aliveVary: RSC, Next-Router-State-Tree, Next-Ro !DOCTYPE html>html langen>head>meta charSetutf-8/>meta nameviewport contentwidthdevice-width, initial-scale1/>link relpreload href/_next/static/media/c9a5bc6a7c948fb0-s.p.woff2 asfont crossorigin typefont/woff2/>link relpreload href/_next/static/media/9b8c15de1de72117-s.p.woff2 asfont crossorigin typefont/woff2/>link relstylesheet href/_next/static/css/57954e6fc48dbd88.css crossorigin data-precedencenext/>link relstylesheet href/_next/static/css/c2dd205d42d617a0.css crossorigin data-precedencenext/>link relpreload href/_next/static/chunks/webpack-7ac3d23c35b47e49.js asscript fetchPrioritylow crossorigin/>script src/_next/static/chunks/fd9d1056-68adf00e9db859ca.js async crossorigin>/script>script src/_next/static/chunks/864-b31496625293226c.js async crossorigin>/script>script src/_next/static/chunks/main-app-db349801016ce314.js async crossorigin>/script>title>linxz/title>meta namedescription contentlinxz personal website/>link relicon href/favicon.ico typeimage/x-icon sizes16x16/>meta namenext-size-adjust/>script src/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js crossorigin noModule>/script>/head>body class__className_e66fe9>div classflex items-center justify-center min-h-screen bg-gray-800>div classflex flex-col items-start ml-10 mt-10>h1 classtext-xl md:text-3xl font-bold text-purple-400 __className_1cc524>linxz:$span classtext-gray-500> type ls to start/span>/h1>p classtext-base text-gray-300 mt-10>Visit a hrefhttps://www.linxiaozhong.club classtext-teal-200>Normal Website/a>/p>p classtext-8px md:text-base text-gray-300 mt-10 __className_1cc524>θ/007 ~ span classtext-teal-200>>> $ /span>input classmt-4 bg-gray-800 text-white p-2 rounded focus:outline-none value/>/p>/div>/div>script src/_next/static/chunks/webpack-7ac3d23c35b47e49.js crossorigin async>/script>script>(self.__next_fself.__next_f||).push(0);self.__next_f.push(2,null)/script>script>self.__next_f.push(1,1:HL/_next/static/media/c9a5bc6a7c948fb0-s.p.woff2,font,{crossOrigin:\, ype:font/woff2} 2:HL/_next/static/css/57954e6fc48dbd88.css,style,
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]