Help
RSS
API
Feed
Maltego
Contact
Domain > qizhishangke.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-14
39.103.132.74
(
ClassC
)
Port 80
HTTP/1.1 308 Permanent RedirectDate: Sun, 02 Jun 2024 11:58:31 GMTContent-Type: text/htmlContent-Length: 164Connection: keep-aliveLocation: https://qizhishangke.com/ html>head>title>308 Permanent Redirect/title>/head>body>center>h1>308 Permanent Redirect/h1>/center>hr>center>nginx/center>/body>/html>
Port 443
HTTP/1.1 200 Date: Sun, 02 Jun 2024 11:58:32 GMTContent-Type: text/html;charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveVary: Accept-EncodingLast-Modified: Thu, 17 Nov 2022 07:43:03 GMTETa !DOCTYPE html>head> meta http-equivContent-Type contenttext/html; charsetutf-8> script> (function(){ function getCookie(cname) { let name cname + ; let ca document.cookie.split(;); for (let i 0; i ca.length; i++) { let c cai; while (c.charAt(0) ) c c.substring(1); if (c.indexOf(name) ! -1) { return c.substring(name.length, c.length) } } return ; }; function setCookie(name, value, expireHours) { let cookieString name + + value; if (expireHours > 0) { let date new Date(); date.setTime(date.getTime() + (expireHours * 3600 * 1000)); cookieString cookieString + ; expires + date.toGMTString(); } document.cookie cookieString + ; path/; domain. + document.domain + ;; }; function getOSSURL() { return prod.startsWith(prod)?//hc-web.wdtdata.com/://static-resources-test.wdtdata.com/; } function getProdInfo() { let rawProd yingyu-front##prod##true.split(##) return { name: rawProd0, env: rawProd1, latest: rawProd2, ossUrl: getOSSURL() } }; let prodInfo getProdInfo(); let genbootPath prodInfo.ossUrl + /front/ + prodInfo.name + / + prodInfo.env + /latest/ + prodInfo.name + .js?v + Date.now(); if (getCookie(X-PROJ-NAME-TMP) ! ) { let rawProdTmp getCookie(X-PROJ-NAME-TMP).split(##); let prodInfoTmp { name: rawProdTmp0, env: rawProdTmp1, latest: rawProdTmp2, ossUrl: rawProdTmp3 }; let genbootPathTmp prodInfoTmp.ossUrl + /front/ + prodInfoTmp.name + / + prodInfoTmp.env + / + prodInfoTmp.latest + / + prodInfoTmp.name + .js?v + Date.now(); document.write(sc + ript idoot_script src + genbootPathTm
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]