Help
RSS
API
Feed
Maltego
Contact
Domain > smp.ucpbsavings.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2022-02-24
104.18.29.234
(
ClassC
)
2024-08-22
52.220.222.172
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyLocation: https://smp.ucpbsavings.com/Content-Length: 98Content-Type: text/html head>title>Object moved permanently/title>/head>body>h1>Object Moved Permanently/h1>/body>
Port 443
HTTP/1.1 200 OKCache-Control: no-cache, no-storePragma: no-cacheContent-Type: text/html; charsetutf-8Expires: -1Server: Microsoft-IIS/10.0Set-Cookie: ASP.NET_SessionIdidyd4tzibe5uglawvknsbsai; path/; !DOCTYPE html PUBLIC -//W3C//DTD XHTML 1.0 Transitional//EN http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd>html xmlnshttp://www.w3.org/1999/xhtml>head>title> Sales Management Process/title>link relshortcut icon hrefContents/Images/smpicon.ico />link hrefContents/Styles/semantic.min.css relstylesheet typetext/css />link hrefContents/Styles/dropdown.min.css relstylesheet typetext/css />link hrefContents/Styles/icon.min.css relstylesheet typetext/css />link hrefContents/Styles/jquery-ui.min.css relstylesheet typetext/css />link hrefContents/Styles/sweetalert.css relstylesheet typetext/css /> script srcContents/Scripts/jquery-3.3.1.js typetext/javascript>/script> script srcContents/Scripts/jquery-ui.min.js typetext/javascript>/script> script srcContents/Bootstrap/js/bootstrap.min.js typetext/javascript>/script> link hrefContents/Bootstrap/css/bootstrap.min.css relstylesheet typetext/css /> script srcContents/Scripts/bootstrap.bundle.min.js typetext/javascript>/script> script srcContents/Scripts/sweetalert.min.js typetext/javascript>/script> script srcContents/Scripts/sweetalert2.all.min.js typetext/javascript>/script> script typetext/javascript> function openModal() { $(#activeSessionModal).modal(show); } function warningRedirect(linkURL, title, message) { Swal.fire({ titleText: title, text: message, type: warning, allowEscapeKey: false }).then(function () { window.location.href linkURL; }) } /script>/head>body> form methodpost action./ idForm1>input typehidden name__VIEWSTATE id__VIEWSTATE valueWVkCIAh8p4bNx+5Q1Oy1pLvN8Dah3KKC29bbpmpZzibAx1pEbi5AjBMGOtuoOXIUuprqmCEuWPbx0FV6c+lTDG7NCiFrTLleWtAQ8/3Docb+intrEWnByORQimYni92xfGO2ww />input typehidden name__VIEWSTATEGENERATOR id__VIEWSTATEGENERATOR valueC2EE9ABB /> div idactiveSessionModal classmodal fade stylez-index: 99999 !important; tabindex-1 roledialog aria-labelledbyactiveSe
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]