Help
RSS
API
Feed
Maltego
Contact
Domain > setistroi.ru
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-26
31.28.24.132
(
ClassC
)
Port 80
HTTP/1.1 200 OKDate: Wed, 13 Mar 2024 06:39:35 GMTServer: Apache/2.2.25 (FreeBSD)Set-Cookie: PHPSESSID399nea39rnpb13sdrsk0q1c8m3; path/Expires: Tue, 13 Jun 2023 12:31:46 GMTCache-Control: no-store, no html> head> link RELstylesheet HREF/css/main.css TYPEtext/css> meta http-equivContent-Type contenttext/html; charsetwindows-1251> script src/js/index.js typetext/javascript>/script>script typetext/javascript src/js/prototype.js>/script>script typetext/javascript src/js/scriptaculous.js?loadeffects>/script>script typetext/javascript src/js/lightbox.js>/script>script typetext/javascript src/js/swfobject.js>/script>!--script typetext/javascript src/js/flash.js>/script>-->script src/js/AC_RunActiveContent.js languagejavascript>/script>link relstylesheet href/css/lightbox.css typetext/css mediascreen /> title>Главная – Сетьстрой/title>/head>body>center>table idmain_table cellspacing0 cellpadding0 border0 height100%> tr> td idtop> div styleposition: relative; height: 100%;> div idheader> div idflashcontent1 stylewidth: 1000px; height: 435px; background: url(/img/flash.jpg) left top no-repeat;>/div>script typetext/javascript> var so new SWFObject(/img/header.swf, index, 1000, 435, 1, #ffffff); so.addVariable(flashVarText, this is passed in via FlashVars for example only); // this line is optional, but this example uses the variable and displays this text inside the flash movie so.write(flashcontent1);/script>noscript>img src/img/flash.jpg width1000 height435 border0>/noscript>!--script languagejavascript> if (AC_FL_RunContent 0) { alert(This page requires AC_RunActiveContent.js.); } else { AC_FL_RunContent( codebase, http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version9,0,0,0, width, 1000, height, 435, src, /img/header, quality, high, pluginspage, http://www.macromedia.com/go/getflashplayer, align, middle, play, true, loop, true, scale, showall, wmode, transparent, devicefont, false, id, 111, bgcolor, #ffffff, name, 111, menu, true, allowFullScreen, false, allowScriptAccess,sameDomain, movie, /img/header, salign, top ); //end AC code }/script> noscript> object classidclsid:d27cdb6e-ae6d-11cf-96b8-444553540000 codebasehttp:
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]