Help
RSS
API
Feed
Maltego
Contact
Domain > suckerfreegames.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-14
5.78.113.0
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sun, 02 Jun 2024 15:26:21 GMTServer: ApacheLocation: https://suckerfreegames.com/Content-Length: 305Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://suckerfreegames.com/>here/a>./p>hr>address>Apache Server at suckerfreegames.com Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 02 Jun 2024 15:26:21 GMTServer: ApacheLast-Modified: Wed, 29 May 2024 08:07:11 GMTETag: 6869-619933cceb49cAccept-Ranges: bytesContent-Length: 26729Vary: Accept-EncodingConten !DOCTYPE html>html langen> head> meta charsetutf-8> meta http-equivX-UA-Compatible contentIEedge> meta nameviewport contentwidthdevice-width, initial-scale1> !-- The above 3 meta tags *must* come first in the head; any other head content must come *after* these tags --> meta http-equivX-UA-Compatible contentIEedge> title>SuckerFree Games/title> script typetext/javascript> /*********************************************** * Dynamic Ajax Content- � Dynamic Drive DHTML code library (www.dynamicdrive.com) * This notice MUST stay intact for legal use * Visit Dynamic Drive at http://www.dynamicdrive.com/ for full source code ***********************************************/ var loadedobjects var rootdomainhttp://+window.location.hostname function ajaxpage(url, containerid){ var page_request false if (window.XMLHttpRequest) // if Mozilla, Safari etc page_request new XMLHttpRequest() else if (window.ActiveXObject){ // if IE try { page_request new ActiveXObject(Msxml2.XMLHTTP) } catch (e){ try{ page_request new ActiveXObject(Microsoft.XMLHTTP) } catch (e){} } } else return false page_request.onreadystatechangefunction(){ loadpage(page_request, containerid) } page_request.open(GET, url, true) page_request.send(null) } function loadpage(page_request, containerid){ if (page_request.readyState 4 && (page_request.status200 || window.location.href.indexOf(http)-1)) document.getElementById(containerid).innerHTMLpage_request.responseText } function loadobjs(){ if (!document.getElementById) return for (i0; iarguments.length; i++){ var fileargumentsi var fileref if (loadedobjects.indexOf(file)-1){ //Check to see if this object has not already been added to page before proceeding if (file.indexOf(.js)!-1){ //If object is a js file filerefdocument.createElement(script) fileref.setAttribute(type,text/javascript); fileref.setAttribute(src, file); } else if (file.indexOf(
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]