Help
RSS
API
Feed
Maltego
Contact
Domain > ulquartz.ru
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2013-05-23
195.208.1.140
(
ClassC
)
2025-04-02
195.208.1.162
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: openrestyDate: Wed, 28 Aug 2024 04:34:36 GMTContent-Type: text/html; charsetiso-8859-1Content-Length: 352Connection: keep-aliveContent-Security-Policy: upgrade-in !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://ulquartz.ru/>here/a>./p>hr>address>Apache/2.4.56 (Red Hat Enterprise Linux 8) PHP/7.0.33 mod_fcgid/2.3.9 Server at ulquartz.ru Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 OKServer: openrestyDate: Wed, 28 Aug 2024 04:34:36 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveContent-Security-Policy: upgrade-insecure-reques !doctype html>html langru>head>meta charsetutf-8>title>Главная || АО «Кварц» - Добыча и обогащение кварцевых песков/title>meta namedescription contentПрофессиональная добыча и обогащение кварцевых песков компанией АО «Кварц» в Ташлинском месторождении Сенгилеевского района Ульяновской области. />meta nameviewport contentwidthdevice-width, initial-scale1.0>link hrefcss/font-awesome.min.css relstylesheet>link hrefcss/qarz_(2).css relstylesheet>link hrefcss/index.css relstylesheet>link relshortcut icon href/images/logo4.ico typeimage/x-icon>link relstylesheet hrefmagnificpopup/magnific-popup.css>link hrefhttp://allfont.ru/allfont.css?fontsa_futuraround relstylesheet/>/head>body data-spyscroll> div idwb_Bookmark2> a idBookmark2> /a> /div> div idwb_Bookmark1> a idBookmark1> /a> /div> div idwb_Shape9> a href./page4.html targetInlineFrame2>img srcimages/img0002.png idShape9 alt>/a> /div> div classloader> div classloader_inner>/div> /div> div idwb_Bookmark5> a idBookmark5> /a> /div> div idwb_Shape10> a href./page4.html targetInlineFrame2>img srcimages/img0010.png idShape10 alt>/a> /div>!--Обратный звонок--> form accept-charsetWindows-1251 actionmail.php classmodal fade enctypemultipart/form-data idLayer12 methodpost nameLayer12 roledialog target_blank>input nameformid typehidden valuelayer12 />div classmodal-dialog>div classmodal-content>div classmodal-body>div idwb_Image2>img alt idImage2 srcimages/logo7.png />/div>hr idLine7 />div idwb_FontAwesomeIcon9>div idFontAwesomeIcon9>a href# onclick$(#Layer12).modal(hide);return false;>i classfa fa-times> /i>/a>/div>/div>input idEditbox2 nameИмя placeholderВаше имя required spellcheckfalse typetext value /> input idEditbox3 nameТелефон placeholderВаш телефон required spellcheckfalse typete
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]