Help
RSS
API
Feed
Maltego
Contact
Domain > shottr.cc
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2021-08-02
165.22.182.32
(
ClassC
)
2023-04-05
104.21.51.31
(
ClassC
)
2023-04-13
172.64.80.1
(
ClassC
)
2023-08-27
172.67.220.8
(
ClassC
)
2024-09-07
104.26.6.58
(
ClassC
)
2024-10-31
172.67.69.91
(
ClassC
)
2024-12-30
104.26.7.58
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Tue, 15 Aug 2023 18:27:46 GMTContent-Type: text/html; charsetiso-8859-1Transfer-Encoding: chunkedConnection: keep-aliveLocation: https://shottr.cc/CF-Cache-Status: !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://shottr.cc/>here/a>./p>hr>address>Apache/2.4.41 (Ubuntu) Server at shottr.cc Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Tue, 15 Aug 2023 18:27:47 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveLast-Modified: Fri, 28 Jul 2023 05:20:19 GMTVary: Accept-EncodingCF-Cache-Statu !DOCTYPE html>html langen>head> meta charsetutf-8> script> let pageUTM let pageMS 0 let pageReturning localStorage.getItem(firstVisit) ? true : false let pageNamedTimezone Intl.DateTimeFormat().resolvedOptions().timeZone let pageLang navigator.language let userAgent window.navigator.userAgent, platform window.navigator.platform, macosPlatforms Macintosh, MacIntel, MacPPC, Mac68K, windowsPlatforms Win32, Win64, Windows, WinCE, iosPlatforms iPhone, iPad, iPod, pageOS if (macosPlatforms.includes(platform)) pageOS Mac else if (iosPlatforms.includes(platform)) pageOS iOS else if (windowsPlatforms.includes(platform)) pageOS Windows else if (/Googlebot/.test(userAgent)) pageOS bot else if (userAgent.includes(yandex) && userAgent.includes(bot)) pageOS bot else if (/Android/.test(userAgent)) pageOS Android else if (/Linux/.test(platform)) pageOS Linux let firstVisit localStorage.getItem(firstVisit) ?? (new Date()).toISOString() localStorage.setItem(firstVisit, firstVisit); function checkin_tb(type, data {}) { console.log(checkin_tb(), type, data) if (type load && window.location.href.includes(#)) { return; } if (pageOS bot) return; let path window.location.pathname if (path.endsWith(/)) path path.slice(0, -1) let payload { type: type, ms: pageMS, utm: pageUTM, referrer: document.referrer, ts: (new Date())*1, returning: pageReturning, os: pageOS, tz: (new Date()).getTimezoneOffset(), timestamp: (new Date()).toISOString(), ntz: pageNamedTimezone, lang: pageLang, url: window.location.href, path: path, firstVisit: firstVisit, ...data } fetch(https://silent-fire.blimps.workers.dev, { method: POST, mode: no-cors, cache: no-cache, headers: {Content-Type: application/json}, redirect: follow, body: JSON.stringify(payload) }) } let gauid localStorage.getItem(ga-uid) ?? Date.now()*1000 + Math.round(1+Math.random()*998); gauid gauid*1 localStorage.setItem(ga-uid, gauid); if (window.location.href.includes(?)) { let params (new URL(docum
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]