Help
RSS
API
Feed
Maltego
Contact
Domain > userdocs.athena-graphics.be
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-12-09
54.200.9.162
(
ClassC
)
2026-01-16
3.169.173.24
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Fri, 16 Jan 2026 03:10:18 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://userdocs.athena-graphics.be/X-Cache: Redirect from cloudfrontVia: 1.1 9a4713706b0c5d2719c0ce83795d8ec2.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P4Alt-Svc: h3:443; ma86400X-Amz-Cf-Id: DVkgCpQOnoqQoZEwvyc-cl1NrfqW984I_r8xjGDxBbuHstr3jK1WXw html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 1199Connection: keep-aliveX-Amz-Cf-Pop: HIO52-P4Date: Fri, 16 Jan 2026 03:10:18 GMTX-Vpc-Node: 943cae0a-02bc-4af7-aa31-ed2d032dff80Strict-Transport-Security: max-age31536000; includeSubDomainsReferrer-Policy: no-referrerCache-Control: no-storeVia: 1.1 11017c4db22106ac70e16ce75190a430.cloudfront.net (CloudFront), 1.1 bc4e0a32a1893d7693b91555def3133e.cloudfront.net (CloudFront)Vary: Accept-EncodingX-Cache: Error from cloudfrontX-Amz-Cf-Pop: HIO52-P4Alt-Svc: h3:443; ma86400X-Amz-Cf-Id: rZAs1XC_mjZeOLCzu3GWIwzOXgGeIBcUm5FmZ27L4YnhvoD2JRxIVw !DOCTYPE html>html langen>head> meta charset\utf-8\/> title>Login/title>/head>body>div idcontent styledisplay: none>If youre not automatically redirected, please check if theres a blocked pop-up or a idlogin_link href onclickauthPopup()>click here/a>/div>script> if (location.protocol ! https:) { location.replace(https: + location.href.substring(location.protocol.length)); exit(); } if (window.location.search.indexOf(inAppHelp) > -1) { document.getElementById(content).style.display block; authPopup(); } else { window.location origin.replace(http://, https://) + /__auth/saml/startlogin?RelayState + encodeURIComponent(window.location.pathname + window.location.search + window.location.hash); } function authPopup() { window.open(origin.replace(http://, https://) + /__auth/saml/startlogin?RelayState + encodeURIComponent(window.location.pathname + window.location.search + window.location.hash), authPopup, menubarno,toolbarno,width600,height600); }/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]