Help
RSS
API
Feed
Maltego
Contact
Domain > uploads.bars-it.ru
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-25
82.142.153.130
(
ClassC
)
Port 80
HTTP/1.1 302 FoundDate: Sat, 23 Nov 2024 18:28:26 GMTServer: Apache/2.4.41 (Ubuntu)Location: https://uploads.bars-it.ru/Content-Length: 295Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>302 Found/title>/head>body>h1>Found/h1>p>The document has moved a hrefhttps://uploads.bars-it.ru/>here/a>./p>hr>address>Apache/2.4.41 (Ubuntu) Server at uploads.bars-it.ru Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sat, 23 Nov 2024 18:28:27 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Mon, 15 Sep 2014 13:50:12 GMTETag: 22d1-5031ae9e9cd00Accept-Ranges: bytesContent-Length: 8913Vary: Accept !DOCTYPE html PUBLIC -//W3C//DTD HTML 4.01//EN http://www.w3.org/TR/html4/strict.dtd>html langen xml:langen>head> meta http-equivContent-Type contenttext/html; charsetutf-8> title>Загрузка файлов/title> meta nameauthor contentHarald Kirschner, digitarald.de /> meta namecopyright contentCopyright 2009 Harald Kirschner /> !-- Framework CSS --> link relstylesheet hrefcss/screen.css typetext/css mediascreen, projection> !--if IE>link relstylesheet hrefhttps://github.com/joshuaclayton/blueprint-css/raw/master/blueprint/ie.css typetext/css mediascreen, projection>!endif-->!--if lte IE 7> script typetext/javascript srchttps://getfirebug.com/releases/lite/1.2/firebug-lite-compressed.js>/script>!endif--> script typetext/javascript srchttps://ajax.googleapis.com/ajax/libs/mootools/1.2.2/mootools.js>/script> script typetext/javascript srcsource/Swiff.Uploader.js>/script> script typetext/javascript srcsource/Fx.ProgressBar.js>/script> script typetext/javascript srcsource/Lang.js>/script> script typetext/javascript srcsource/FancyUpload2.js>/script> !-- See script.js --> script typetext/javascript> //!CDATA /** * FancyUpload Showcase * * @license MIT License * @author Harald Kirschner mail at digitarald dot de> * @copyright Authors */window.addEvent(domready, function() { // wait for the content // our uploader instance var up new FancyUpload2($(demo-status), $(demo-list), { // options object // we console.log infos, remove that in production!! verbose: true, // url is read from the form, so you just have to change one place url: $(form-demo).action, // path to the SWF file path: source/Swiff.Uploader.swf, // remove that line to select all files, or edit it, add more items typeFilter: { //Images (*.jpg, *.jpeg, *.gif, *.png): *.jpg; *.jpeg; *.gif; *.png All files (*.*): *.* }, // this is our browse button, *target* is overlayed with the Flash movie target: demo-browse, // graceful degradation, onLoad is only called if all went well with Flash onLoad: function() { $(demo-status
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]