Help
RSS
API
Feed
Maltego
Contact
Domain > petrosoft.pl
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Files that talk to petrosoft.pl
MD5
A/V
41530fef2d18802b83fe7d7a74dbbc3a
[
HW32.CDB.Cd5f
] [
Trojan.Bicololo.r3
] [
WS.Reputation.1
] [
Kryptik.CDQY
] [
UnclassifiedMalware
] [
BackDoor.Slym.13873
] [
Heuristic.LooksLike.Win32.Suspicious.E
] [
Backdoor:Win32/Kelihos.F
] [
W32/Trojan.TTOL-6481
] [
Trojan/Win32.Tepfer
] [
Heur.Trojan.Hlux
] [
Win32.SuspectCrc
] [
Crypt_s.GNC
] [
Trojan.Win32.Kryptik.CBCJ
]
DNS Resolutions
Date
IP Address
2024-11-09
85.128.229.75
(
ClassC
)
Port 443
HTTP/1.1 200 OKDate: Sun, 04 Aug 2024 15:22:51 GMTContent-Type: text/html; charsetUTF-8Content-Length: 266130Connection: keep-aliveCache-Control: max-age0, no-cache, must-revalidateLink: https://petro !DOCTYPE html>html langpl-PL prefixog: https://ogp.me/ns#>head> meta charsetUTF-8/>meta http-equivX-UA-Compatible contentIEedge> link relpingback hrefhttps://petrosoft.pl/xmlrpc.php/> script typetext/javascript> document.documentElement.className js; /script> link relpreconnect hrefhttps://fonts.gstatic.com crossorigin />style idet-divi-open-sans-inline-css>@font-face{font-family:Open Sans;font-style:italic;font-weight:300;font-stretch:normal;font-display:swap;src:url(https://fonts.gstatic.com/s/opensans/v40/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4exQ.ttf) format(truetype)}@font-face{font-family:Open Sans;font-style:italic;font-weight:400;font-stretch:normal;font-display:swap;src:url(https://fonts.gstatic.com/s/opensans/v40/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk8ZkWV4exQ.ttf) format(truetype)}@font-face{font-family:Open Sans;font-style:italic;font-weight:600;font-stretch:normal;font-display:swap;src:url(https://fonts.gstatic.com/s/opensans/v40/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0RkxhjWV4exQ.ttf) format(truetype)}@font-face{font-family:Open Sans;font-style:italic;font-weight:700;font-stretch:normal;font-display:swap;src:url(https://fonts.gstatic.com/s/opensans/v40/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0RkyFjWV4exQ.ttf) format(truetype)}@font-face{font-family:Open Sans;font-style:italic;font-weight:800;font-stretch:normal;font-display:swap;src:url(https://fonts.gstatic.com/s/opensans/v40/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk0ZjWV4exQ.ttf) format(truetype)}@font-face{font-family:Open Sans;font-style:normal;font-weight:300;font-stretch:normal;font-display:swap;src:url(https://fonts.gstatic.com/s/opensans/v40/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsiH0B4uaVc.ttf) format(truetype)}@font-face{font-family:Open Sans;font-style:normal;font-weight:400;font-stretch:normal;font-display:swap;src:url(https://fonts.gstatic.com/s/opensans/v40/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4uaVc.ttf) format(truetype)}@font-face{font-fa
Subdomains
Date
Domain
IP
mx1.petrosoft.pl
2014-05-31
94.40.18.7
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]