Help
RSS
API
Feed
Maltego
Contact
Domain > szarvasimozi.hu
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2015-01-07
91.82.199.99
(
ClassC
)
2025-01-07
185.111.89.226
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Fri, 16 Aug 2024 22:08:05 GMTServer: ApacheLocation: https://szarvasimozi.hu/Content-Length: 232Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://szarvasimozi.hu/>here/a>./p>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Fri, 16 Aug 2024 22:08:06 GMTServer: ApacheUpgrade: h2,h2cConnection: keep-aliveTransfer-Encoding: chunkedContent-Type: text/html; charsetUTF-8 !DOCTYPE html>html> head> meta charsetutf-8> meta nameviewport contentwidthdevice-width, initial-scale1> meta namekeywords contentSzarvasi, 3D, Mozi, Békés megye, filmvetítés, online foglalás> meta namedescription contentSzarvasi 3D Mozi, 5540 Szarvas, Kossuth tér 3.> meta nameauthor contentDesign: MIADesign, Coding: M3zcal> title>Szarvasi Mozi/title> link relstylesheet hrefcss/style.css> link relstylesheet hrefcss/slick.css> link relstylesheet hrefcss/style_wow.css> link relstylesheet hrefcss/jquery.datepick.css> link relstylesheet hrefcss/jquery.fancybox.css> link relstylesheet hrefhttps://fonts.googleapis.com/css?familyBarlow Semi Condensed> link relstylesheet hrefhttps://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css> script srcjs/jquery-3.4.1.min.js>/script> script srcjs/jquery.datepick.js>/script> script srcjs/jquery.datepick-hu.js>/script> script srcjs/jquery.fancybox.js>/script> script srcjs/slick.js>/script> script> $(function() { $(.header).load(include/header.php); $(.poster).load(include/poster.php); $(.menu).load(include/menu.php); $(.main).load(include/start.php); $(.prop).load(include/prop.php); $(.ad).load(include/pad.php); $(.footer).load(include/footer.php); }); /script> /head> body> div classcontainer> div classheader>/div> div classposter>/div> div classmenu>/div> div classmain>/div> div classprop>/div> div classad>/div> /div> div classfooter>/div> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]