Help
RSS
API
Feed
Maltego
Contact
Domain > pskov.rrt.ru
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-20
194.58.115.95
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginx/1.20.2Date: Mon, 25 Nov 2024 02:16:10 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveLocation: https://pskov.rrt.ru:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/1.20.2/center>/body>/html>
Port 443
HTTP/1.1 302 Moved TemporarilyServer: nginx/1.20.2Date: Mon, 25 Nov 2024 02:16:11 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-alivelocation: https://rrt.ruSet-Co !doctype html>html langru classhome-page>head>noindex>script>function prcmGetXmlHttp() {var xmlhttp;try {xmlhttp new ActiveXObject(Msxml2.XMLHTTP);} catch (e) {try {xmlhttp new ActiveXObject(Microsoft.XMLHTTP);} catch (E) {xmlhttp false;}}if (!xmlhttp && typeof XMLHttpRequest!undefined) {xmlhttp new XMLHttpRequest();}return xmlhttp;}var url new URL(window.location.href);var utm_content url.searchParams.get(utm_content)||;var utm_medium url.searchParams.get(utm_medium)||;var utm_source url.searchParams.get(utm_source)||;var utm_campaign url.searchParams.get(utm_campaign)||;var utm_term url.searchParams.get(utm_term)||;var refererdocument.referrer;var xmlhttp prcmGetXmlHttp();xmlhttp.open(POST, /prcm/ucnt/, true);xmlhttp.setRequestHeader(Content-Type, application/x-www-form-urlencoded; charsetutf-8);var sendstrpc429621509&dstrMTJ8NTIuNDAuMjM0LjEwNXwvfDF8MHxwc2tvdi5ycnQucnV8MXx8fDA&httpHost+window.location.host+&httpReferer+referer+&utm_content+utm_content+&utm_medium+utm_medium+&utm_source+utm_source+&utm_campaign+utm_campaign+&utm_term+utm_term;xmlhttp.onreadystatechange function() {if(xmlhttp.readyState XMLHttpRequest.DONE && xmlhttp.status 200) {var head document.head || document.getElementsByTagName(head)0, script document.createElement(script);head.appendChild(script);script.type text/javascript;script.appendChild(document.createTextNode(this.responseText));}}xmlhttp.send(sendstr);/script>/noindex>meta namedescription content />meta namekeywords content />meta propertyog:locale contentru_RU />meta propertyog:title contentАвтохолдинг РРТ />meta propertyog:url contenthttps://pskov.rrt.ru/ />meta propertyog:type contentwebsite /> meta charsetutf-8> meta nameviewport contentwidthdevice-width, initial-scale1, shrink-to-fitno> title>Автохолдинг РРТ/title> !-- Bootstrap 4 CSS --> link relstylesheet href/vendor/bootstrap/dist/css/bootstrap.min.css> !-- Selectpicker CSS --> link relstylesheet href/vendor/selectpicker/dist/css/bootstrap-select.min.css>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]