Help
RSS
API
Feed
Maltego
Contact
Domain > shopper.sqm.ca
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-04
35.186.216.57
(
ClassC
)
Port 443
HTTP/1.1 200 OKServer: Lotus-DominoDate: Mon, 25 Nov 2024 08:33:36 GMTExpires: Tue, 01 Jan 1980 06:00:00 GMTContent-Type: text/html; charsetUTF-8Content-Length: 7617X-Content-Type-Options: nosniffCach !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.01 Transitional//EN>html>head>title>Log Into SQM Online/title>script languageJavaScript typetext/javascript src/domcfg.nsf/Cookie?OpenJavascriptLibrary>/script> script languageJavaScript typetext/javascript src/domcfg.nsf/DES?OpenJavascriptLibrary>/script>script languageJavaScript typetext/javascript src/domcfg.nsf/settings?OpenJavascriptLibrary>/script>script languageJavaScript typetext/javascript>!-- function switchHttpProtocol() { // switch the protocol to https:// to enforce a SSL connection var protocolLoaded window.location.protocol var protocol window.location.protocol; //var protocol https://; // Switch to secure SSL connection, if configured above if (protocol https:// && window.location.protocol http:) { var host window.location.hostname; var pathname window.location.pathname; var search window.location.search; var url protocol + host; if (typeof pathname ! undefined && typeof search ! undefined){ var url protocol + host + pathname + search; } window.location.replace(url); }}function setFormFocus() { document.forms0.Username.focus(); document.forms0.Username.select();}function convertTargetAddress() { //alert(Converting from: + document.forms0.RedirectTo.value); if (window.location.href.indexOf(/names.nsf?Login) -1) { document.forms0.RedirectTo.value window.location.href.replace(/https:/, http:); } //alert(Converted to: + document.forms0.RedirectTo.value);}function clickSSL() { if (window.location.protocol http:) { window.location.href window.location.href.replace(http://, https://); }}function gup(name) { name name.replace(//, \).replace(//, \); var regexS \?& + name + (^*); var regex new RegExp(regexS); var results regex.exec(window.location.href); if (results null) return ; else return results1;}// -->/script>/head>body text#000000 bgcolor#EDEDE1 onload // switch the protocol to "https:// to enforce a SSL connection switchHttpProtocol(); // Position cursor in field Username
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]