Help
RSS
API
Feed
Maltego
Contact
Domain > public.blorpazort.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-02-07
162.243.158.37
(
ClassC
)
Port 80
HTTP/1.1 200 OKDate: Mon, 03 Jun 2024 12:11:24 GMTServer: Apache/2.2.22 (Ubuntu)X-Powered-By: PHP/5.3.10-1ubuntu3.21Set-Cookie: PHPSESSIDcsftpgs7l0seltc78n7iiph4s6; path/Expires: Thu, 19 Nov 1981 08:5 html>head> title>BNVLM Test Platform/title> link hrefjqueryui/jquery-ui.css relstylesheet> LINK hrefsite.css relstylesheet typetext/css> script srcjqueryui/external/jquery/jquery.js>/script> script srcjqueryui/jquery-ui.js>/script>/head>body>div idheader_container> div idheader> BNVLM Test Platform /div>/div>!-- START CONTENT -->div idcontainer> div idcontent>div idtabs> ul> li>a href#tabs-1>Login/a>/li> li>a href#tabs-2>Redirects/a>/li> li>a href#tabs-3>Frames/a>/li> li>a href#tabs-4>SQL Injection/a>/li> li>a href#tabs-5>XSS/a>/li> li>a href#tabs-6>OS Injection/a>/li> /ul> div idtabs-1> h4>p>Member Login br />/h4> form actionmembers/login.php methodpost> table border0> tr> td>User/td> td> input typeTEXT NAMEusername value /> /td> /tr> tr> td>Password/td> td> input typepassword namepassword value /> /td> /tr> tr> td colspan2> input namesubmit typesubmit valueLogin /> input typebutton onclickjavascipt:window.location.hrefmembers/logout.php valueLogout /> /td> /tr> /table> br /> a hrefregister.php>Registration/a> br /> br /> a hrefmembers/members.php>List of members/a> /form> /div> div idtabs-2> p>Redirects: br /> li>a hrefredirects.php>Redirects Table/a>/li> /div> div idtabs-3> p>Frames: br /> li>a hrefframes/frameset.php>Frameset/a>/li> /div> div idtabs-4> p>SQL Injection: br /> li>a hrefpages/sqli_blind_form_1.php>Blind SQLI Form 1/a>/li> li>a hrefpages/sqli_blind_form_2.php>Blind SQLI Form 2/a>/li> li>a hrefpages/sqli_form_1.php>SQLI Form/a>/li> /div> div idtabs-5> p>XSS: br /> li>a hrefpages/xss_form_get.php>XSS Reflected - Get/a>/li> li>a hrefpages/xss_parsing_test.php>XSS Reflected - Get #2 - Parse test/a>/li> li>a hrefpages/xss_form_post.php>XSS Reflected - Post/a>/li> li>a hrefpages/xss_dom.php>XSS DOM/a>/li> /div> div idtabs-6> p>OS Injection: br /> li>a hrefpages/os_injection_1.php>Simple OS Injection/a>/li> li>a hrefpages/os_injection_2.php>Complex OS Injection/a>/li> /div>/div>br /
Port 443
HTTP/1.1 200 OKDate: Mon, 03 Jun 2024 12:11:25 GMTServer: Apache/2.2.22 (Ubuntu)X-Powered-By: PHP/5.3.10-1ubuntu3.21Set-Cookie: PHPSESSIDfsmh5ecb5j769ipk25e0nqkpm6; path/Expires: Thu, 19 Nov 1981 08:5 html>head> title>BNVLM Test Platform/title> link hrefjqueryui/jquery-ui.css relstylesheet> LINK hrefsite.css relstylesheet typetext/css> script srcjqueryui/external/jquery/jquery.js>/script> script srcjqueryui/jquery-ui.js>/script>/head>body>div idheader_container> div idheader> BNVLM Test Platform /div>/div>!-- START CONTENT -->div idcontainer> div idcontent>div idtabs> ul> li>a href#tabs-1>Login/a>/li> li>a href#tabs-2>Redirects/a>/li> li>a href#tabs-3>Frames/a>/li> li>a href#tabs-4>SQL Injection/a>/li> li>a href#tabs-5>XSS/a>/li> li>a href#tabs-6>OS Injection/a>/li> /ul> div idtabs-1> h4>p>Member Login br />/h4> form actionmembers/login.php methodpost> table border0> tr> td>User/td> td> input typeTEXT NAMEusername value /> /td> /tr> tr> td>Password/td> td> input typepassword namepassword value /> /td> /tr> tr> td colspan2> input namesubmit typesubmit valueLogin /> input typebutton onclickjavascipt:window.location.hrefmembers/logout.php valueLogout /> /td> /tr> /table> br /> a hrefregister.php>Registration/a> br /> br /> a hrefmembers/members.php>List of members/a> /form> /div> div idtabs-2> p>Redirects: br /> li>a hrefredirects.php>Redirects Table/a>/li> /div> div idtabs-3> p>Frames: br /> li>a hrefframes/frameset.php>Frameset/a>/li> /div> div idtabs-4> p>SQL Injection: br /> li>a hrefpages/sqli_blind_form_1.php>Blind SQLI Form 1/a>/li> li>a hrefpages/sqli_blind_form_2.php>Blind SQLI Form 2/a>/li> li>a hrefpages/sqli_form_1.php>SQLI Form/a>/li> /div> div idtabs-5> p>XSS: br /> li>a hrefpages/xss_form_get.php>XSS Reflected - Get/a>/li> li>a hrefpages/xss_parsing_test.php>XSS Reflected - Get #2 - Parse test/a>/li> li>a hrefpages/xss_form_post.php>XSS Reflected - Post/a>/li> li>a hrefpages/xss_dom.php>XSS DOM/a>/li> /div> div idtabs-6> p>OS Injection: br /> li>a hrefpages/os_injection_1.php>Simple OS Injection/a>/li> li>a hrefpages/os_injection_2.php>Complex OS Injection/a>/li> /div>/div>br /
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]