Help
RSS
API
Feed
Maltego
Contact
Domain > monpassagerencarton.fr
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-03-23
16.12.18.16
(
ClassC
)
2024-09-15
3.163.165.36
(
ClassC
)
2025-08-02
3.163.24.74
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Sun, 15 Sep 2024 21:58:23 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://monpassagerencarton.fr/X-Cache: Red html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 21371Connection: keep-aliveDate: Sun, 15 Sep 2024 21:58:24 GMTLast-Modified: Thu, 11 Apr 2024 13:49:54 GMTx-amz-version-id: hsF3.id7FJ0LuZPbZ__cVs !DOCTYPE html>html langfr>head> meta charsetUTF-8> meta nameviewport contentwidthdevice-width, initial-scale1.0> title>Citygo - Mon Passager En Carton/title> link relapple-touch-icon sizes120x120 href./favicon/apple-touch-icon.png> link relicon typeimage/png sizes32x32 href./favicon/favicon-32x32.png> link relicon typeimage/png sizes16x16 href./favicon/favicon-16x16.png> link relmanifest href./favicon/site.webmanifest> meta namemsapplication-TileColor content#da532c> meta nametheme-color content#ffffff> link relpreconnect hrefhttps://fonts.googleapis.com> link relpreconnect hrefhttps://fonts.gstatic.com crossorigin> link hrefhttps://fonts.googleapis.com/css2?familyOpen+Sans:ital,wght@0,400;0,700;1,400;1,700&displayswap relstylesheet> link relstylesheet hrefhttps://cdn.jsdelivr.net/npm/swiper@8/swiper-bundle.min.css /> link relstylesheet hrefhttps://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.5.1/css/all.min.css integritysha512-DTOQO9RWCH3ppGqcWaEA1BIZOC6xxalwEsw9c2QQeAIftl+Vegovlnee1c9QX4TctnWMn13TZye+giMm8e2LwA crossoriginanonymous referrerpolicyno-referrer /> link relstylesheet hrefcss/main.css> script defer data-domainmonpassagerencarton.fr srchttps://plausible.io/js/script.js>/script> script>window.plausible window.plausible || function() { (window.plausible.q window.plausible.q || ).push(arguments) }/script>/head>body> main> div classpage> !-- HERO --> section classct ct--hero has-mobile> div classct--hero__logo-tuto> img src./images/lestutos.svg width610 altLes Tutos by Roublito loadinglazy> h1 classct--hero__title> Mes passagers br classmobile>en carton /h1> /div> div classct--hero__inner> div classct--hero__buttons> div classct ct--button-app is-app black> img src./images/macaron.png alt loadinglazy> p>* MERCIROUBLITO br classmobile>dans la limite de 30€/p> /div> /div> /div> div classbg js-hero> img classct--hero__background bg-desktop src./images/baptiste.jpg loadinglazy> img classct--hero__background bg-mobile src./i
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]