Help
RSS
API
Feed
Maltego
Contact
Domain > rf-cheats.ru
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Files that talk to rf-cheats.ru
MD5
A/V
fdab00a580e8106389c90588d8c4fc09
[
HW32.TsCabk.amwg
] [
Artemis!FDAB00A580E8
] [
Trojan.Downloader.Small-2252
] [
BDS/IRCBot.J.59
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.K
] [
VCS/Instruction.PEEPOCheck
] [
Win32/CryptExe
] [
Win32/Trojan.fe4
]
9e2fb5440a371b921550b0aa758f4c9c
[
SPR/Injector.tgds
]
14239d6b199fa7885bbce1bfe9595d48
41d8aa900fb9decee71a87e39d1a6caa
DNS Resolutions
Date
IP Address
2012-09-26
62.109.20.212
(
ClassC
)
2013-12-02
186.2.166.29
(
ClassC
)
2013-12-13
186.2.166.19
(
ClassC
)
2024-07-18
62.173.140.120
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginx/1.4.6 (Ubuntu)Date: Sun, 27 Aug 2023 09:49:03 GMTContent-Type: text/htmlContent-Length: 193Connection: keep-aliveLocation: https://www.rf-cheats.ru/ html>head>title>301 Moved Permanently/title>/head>body bgcolorwhite>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/1.4.6 (Ubuntu)/center>/body>/html>
Port 443
HTTP/1.1 301 Moved PermanentlyServer: nginx/1.4.6 (Ubuntu)Date: Sun, 27 Aug 2023 09:49:03 GMTContent-Type: text/html; charsetiso-8859-1Content-Length: 295Connection: keep-aliveLocation: https://www.rf !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://www.rf-cheats.ru/>here/a>./p>hr>address>Apache Server at rf-cheats.ru Port 80/address>/body>/html>
Subdomains
Date
Domain
IP
auth.rf-cheats.ru
2013-07-04
62.109.20.212
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]