Help
RSS
API
Feed
Maltego
Contact
Domain > swimminglytesting.ninja
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-09-21
164.90.134.72
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sat, 26 Aug 2023 22:01:07 GMTServer: Apache/2.4.18 (Ubuntu)Location: https://swimminglytesting.ninja/Content-Length: 329Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://swimminglytesting.ninja/>here/a>./p>hr>address>Apache/2.4.18 (Ubuntu) Server at swimminglytesting.ninja Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sat, 26 Aug 2023 22:01:08 GMTServer: Apache/2.4.18 (Ubuntu)X-Powered-By: ExpressVary: Origin,Accept-EncodingAccept-Ranges: bytesCache-Control: public, max-age0Last-Modified: Mon, !doctype html>html langen>head>meta charsetutf-8/>link relshortcut icon href/favicon.ico/>meta nameviewport contentwidthdevice-width,initial-scale1,maximum-scale1,user-scalableno/>meta nametheme-color content#000000/>link relmanifest href/manifest.json/>title>Swimmingly ™/title>link relstylesheet hrefhttps://maxcdn.bootstrapcdn.com/bootstrap/3.3.6/css/bootstrap.min.css integritysha384-1q8mTJOASx8j1Au+a5WDVnPi2lkFfwwEAa8hDDdjZlpLegxhjVME1fgjWPGmkzs7 crossorigin/>link relstylesheet href//fast.appcues.com/widget.css/>link href/static/css/2.9e868e6e.chunk.css relstylesheet>link href/static/css/main.1e48eb6e.chunk.css relstylesheet>/head>body>noscript>You need to enable JavaScript to run this app./noscript>div idroot>/div>script srchttps://fast.wistia.com/assets/external/E-v1.js async>/script>script src//fast.appcues.com/widget-bundle.js typetext/javascript>/script>script src//fast.appcues.com/31191.js>/script>script typetext/javascript idhs-script-loader async deferdefer src//js.hs-scripts.com/20655551.js>/script>script>!function(e){function r(r){for(var n,l,ar0,fr1,ir2,p0,s;pa.length;p++)lap,Object.prototype.hasOwnProperty.call(o,l)&&ol&&s.push(ol0),ol0;for(n in f)Object.prototype.hasOwnProperty.call(f,n)&&(enfn);for(c&&c(r);s.length;)s.shift()();return u.push.apply(u,i||),t()}function t(){for(var e,r0;ru.length;r++){for(var tur,n!0,a1;at.length;a++){var fta;0!of&&(n!1)}n&&(u.splice(r--,1),el(l.st0))}return e}var n{},o{1:0},u;function l(r){if(nr)return nr.exports;var tnr{i:r,l:!1,exports:{}};return er.call(t.exports,t,t.exports,l),t.l!0,t.exports}l.me,l.cn,l.dfunction(e,r,t){l.o(e,r)||Object.defineProperty(e,r,{enumerable:!0,get:t})},l.rfunction(e){undefined!typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:Module}),Object.defineProperty(e,__esModule,{value:!0})},l.tfunction(e,r){if(1&r&&(el(e)),8&r)return e;if(4&r&&objecttypeof e&&e&&e.__esModule)return e;var tObject.create(null);if(l.r(t),Object.defineProperty(t,default,{enumerable:!0,value:e}),2&r&&string!typeof e)for(var
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]