Help
RSS
API
Feed
Maltego
Contact
Domain > ns1.intermaxgroup.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-02-03
77.93.196.115
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sun, 30 Jun 2024 22:48:59 GMTServer: ApacheLocation: https://ns1.intermaxgroup.com/Content-Length: 309Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://ns1.intermaxgroup.com/>here/a>./p>hr>address>Apache Server at ns1.intermaxgroup.com Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 30 Jun 2024 22:49:00 GMTServer: ApacheX-Powered-By: PHP/5.6.40-pl1-gentooSet-Cookie: PHPSESSID5fqhl2d3425rn4ijr5n156r3l7; path/Expires: Thu, 19 Nov 1981 08:52:00 GMTCache-Con !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.0 Transitional//EN>html> head> title>Poweradmin/title> link relstylesheet hrefstyle/example.css typetext/css> meta http-equivContent-Type contenttext/html; charsetUTF-8> /head> body> h1>Poweradmin/h1> div classcontent> h2>Log in/h2> form methodpost action/index.php> input typehidden namequery_string value> table border0> tr> td classn width100>Username:/td> td classn>input typetext classinput nameusername idusername>/td> /tr> tr> td classn>Password:/td> td classn>input typepassword classinput namepassword>/td> /tr> tr> td classn>Language:/td> td classn> select classinput nameuserlang> option valuezh_CN>Chineseoption valuecs_CZ>Czechoption valuenl_NL>Dutchoption selected valueen_EN>Englishoption valuefr_FR>Frenchoption valuede_DE>Germanoption valueja_JP>Japaneseoption valuelt_LT>Lithuanianoption valuenb_NO>Norwegian Bokmåloption valuepl_PL>Polishoption valueru_RU>Russianoption valuetr_TR>Turkish /select> /td> /tr> tr> td classn> /td> td classn> input typesubmit nameauthenticate classbutton value Go > /td> /tr> /table> /form> script typetext/javascript> !-- document.getElementById(username).focus(); //--> /script> /div> !-- /content -->div classfooter> a hrefhttp://www.poweradmin.org/>a complete(r) strong>poweradmin/strong>/a> - a hrefhttp://www.poweradmin.org/credits.html>credits/a>/div>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]