Help
RSS
API
Feed
Maltego
Contact
Domain > proxy1.bf
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-10-03
104.21.29.70
(
ClassC
)
2024-10-24
172.67.148.145
(
ClassC
)
Port 80
HTTP/1.1 200 OKDate: Sun, 12 May 2024 14:53:02 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveLast-Modified: Wed, 24 Apr 2024 14:42:32 GMTVary: Accept-EncodingCF-Cache-Statu !DOCTYPE html>html>head> title>Frontend with Backend PHP/title>/head>body> h1>Frontend with Backend PHP/h1> label forhost>Host:/label> input typetext idhost>br>br> label forport>Port:/label> input typetext idport>br>br> label fortime>Time:/label> input typetext idtime>br>br> label formethod>Method:/label> input typetext idmethod>br>br> button onclicksendRequest()>Send Request/button> script> function sendRequest() { var host document.getElementById(host).value; var port document.getElementById(port).value; var time document.getElementById(time).value; var method document.getElementById(method).value; // 构建API的URL,将用户填写的参数作为查询参数 var url `https://ddos.attack.bf/cc.php?keyIruko&host${host}&port${port}&time${time}&method${method}&max1`; // 发送GET请求到后端的PHP API fetch(url) .then(response > response.json()) .then(data > { console.log(data); // 在这里处理从后端返回的数据 alert(decodeURIComponent(data.message)); // 显示后端返回的中文编码信息 }) .catch(error > { console.error(Error sending request to backend:, error); }); } /script>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 12 May 2024 14:53:02 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveLast-Modified: Wed, 24 Apr 2024 14:42:32 GMTVary: Accept-EncodingCF-Cache-Statu !DOCTYPE html>html>head> title>Frontend with Backend PHP/title>/head>body> h1>Frontend with Backend PHP/h1> label forhost>Host:/label> input typetext idhost>br>br> label forport>Port:/label> input typetext idport>br>br> label fortime>Time:/label> input typetext idtime>br>br> label formethod>Method:/label> input typetext idmethod>br>br> button onclicksendRequest()>Send Request/button> script> function sendRequest() { var host document.getElementById(host).value; var port document.getElementById(port).value; var time document.getElementById(time).value; var method document.getElementById(method).value; // 构建API的URL,将用户填写的参数作为查询参数 var url `https://ddos.attack.bf/cc.php?keyIruko&host${host}&port${port}&time${time}&method${method}&max1`; // 发送GET请求到后端的PHP API fetch(url) .then(response > response.json()) .then(data > { console.log(data); // 在这里处理从后端返回的数据 alert(decodeURIComponent(data.message)); // 显示后端返回的中文编码信息 }) .catch(error > { console.error(Error sending request to backend:, error); }); } /script>/body>/html>
Subdomains
Date
Domain
IP
cs.proxy1.bf
2024-09-02
104.21.29.70
www.proxy1.bf
2024-08-12
104.21.29.70
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]