Help
RSS
API
Feed
Maltego
Contact
Domain > static.lceassets.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-19
139.162.189.82
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginx/1.14.2Date: Fri, 06 Dec 2024 17:35:41 GMTContent-Type: text/htmlContent-Length: 185Connection: keep-aliveLocation: https://static.lceassets.com/ html>head>title>301 Moved Permanently/title>/head>body bgcolorwhite>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/1.14.2/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginx/1.14.2Date: Fri, 06 Dec 2024 17:35:41 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-alive !DOCTYPE html>html langen>head> style> body { padding-top: 5rem; } .container { padding-top: 0.5rem; } /style> title>Media Server Homepage/title> !-- Required meta tags always come first --> meta charsetutf-8> meta nameviewport contentwidthdevice-width, initial-scale1, shrink-to-fitno> meta http-equivx-ua-compatible contentieedge> !-- Bootstrap CSS --> link relstylesheet hrefhttps://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.5/css/bootstrap.min.css integritysha384-AysaV+vQoT3kOAXZkl02PThvDr8HYKPZhNT5h/CXfBThSRXQ6jW5DO2ekP5ViFdi crossoriginanonymous>/head>body>nav classnavbar navbar-fixed-top bg-faded> h1 classnavbar-brand mb-0>Media Server/h1> ul classnav navbar-nav> li classnav-item> a classnav-link href/>Usage/a> /li> li classnav-item> a classnav-link href/add/>Add new medias/a> /li> /ul>/nav>div classcontainer> div classcontainer> h2>Usage/h2> p>Upload new medias using a href/add/>the form/a>. or programmatically with PHP:/p> pre>$ch curl_init();curl_setopt($ch, CURLOPT_URL, http://domain.tld/add/);curl_setopt($ch, CURLOPT_POST,1);curl_setopt($ch, CURLOPT_POSTFIELDS, some_file > curl_file_create(/path/to/some/file.jpg), other_file > curl_file_create(/path/to/some/other/file.png));curl_setopt($ch, CURLOPT_RETURNTRANSFER,1);curl_setopt($ch, CURLOPT_HTTPHEADER, Accept: application/json);$json_stringcurl_exec($ch);curl_close($ch);print_r(json_decode($json_string, JSON_OBJECT_AS_ARRAY)); /pre> p>Or with Python:/p>pre>import requestswith open(/path/to/some/file.jpg, rb) as f: r requests.post(http://domain.tld/add/, files{file1:f}, headers{Accept:application/json}) print(r.text)/pre> p>Typical response data:/p> pre>Array( 0 > Array ( sha1 > c4a08279e801ca7459542da745fe4bbd067512b1 md5 > 94bb595c8b04fb3375fa264bec26ed7b size > 208378 extension > jpg mime > image/jpeg
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]