Help
RSS
API
Feed
Maltego
Contact
Domain > shop.zamaschool.pk
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-08-01
3.28.79.94
(
ClassC
)
2025-01-10
3.29.70.60
(
ClassC
)
2025-01-15
3.28.209.253
(
ClassC
)
2025-01-25
3.29.14.152
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Fri, 10 Jan 2025 18:40:08 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://shop.zamaschool.pk:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Fri, 10 Jan 2025 18:40:09 GMTContent-Type: text/html; charsetUTF-8Content-Length: 5209Connection: keep-aliveServer: Apache/2.4.57 (Ubuntu)Set-Cookie: ci_sessiongp9dmdnqhm5i6j3mkca !DOCTYPE html>html langen>head> meta charsetutf-8> meta nameviewport contentwidthdevice-width, initial-scale1> title>AdminLTE 3 | Log in/title> link relstylesheet hrefhttps://fonts.googleapis.com/css?familySource+Sans+Pro:300,400,400i,700&displayfallback> link relstylesheet hrefhttps://shop.zamaschool.pk//public/admin/plugins/fontawesome-free/css/all.min.css> link relstylesheet hrefhttps://shop.zamaschool.pk//public/admin/plugins/icheck-bootstrap/icheck-bootstrap.min.css> link relstylesheet hrefhttps://shop.zamaschool.pk//public/admin/dist/css/adminlte.min.css?v3.2.0> script noncef72ea0ee-5b66-4ac5-bf35-2aeaaa4f7673> (function(w, d) { ! function(a, e, t, r) { a.zarazData a.zarazData || {}, a.zarazData.executed , a.zaraz { deferred: }, a.zaraz.q , a.zaraz._f function(e) { return function() { var t Array.prototype.slice.call(arguments); a.zaraz.q.push({ m: e, a: t }) } }; for (const e of track, set, ecommerce, debug) a.zaraze a.zaraz._f(e); a.zaraz.init () > { var t e.getElementsByTagName(r)0, z e.createElement(r), n e.getElementsByTagName(title)0; for (n && (a.zarazData.t e.getElementsByTagName(title)0.text), a.zarazData.x Math.random(), a.zarazData.w a.screen.width, a.zarazData.h a.screen.height, a.zarazData.j a.innerHeight, a.zarazData.e a.innerWidth, a.zarazData.l a.location.href, a.zarazData.r e.referrer, a.zarazData.k a.screen.colorDepth, a.zarazData.n e.characterSet, a.zarazData.o (new Date).getTimezoneOffset(), a.zarazData.q ; a.zaraz.q.length;) { const e a.zaraz.q.shift(); a.zarazData.q.push(e) } z.defer !0; for (const e of localStorage, sessionStorage) Object.keys(e || {}).filter((a > a.startsWith(_zaraz_))).forEach((t > { try { a.zarazDataz_ + t.slice(7) JSON.parse(e.getItem(t)) } catch { a.zarazDataz_ + t.sl
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]