Help
RSS
API
Feed
Maltego
Contact
Domain > v.zangyaow.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2022-08-09
58.221.40.215
(
ClassC
)
2025-10-12
180.163.146.115
(
ClassC
)
2026-01-06
58.218.215.72
(
ClassC
)
2026-02-25
180.163.146.43
(
ClassC
)
Port 443
HTTP/1.1 200 OKServer: TengineContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveDate: Sun, 12 Oct 2025 11:34:00 GMTUpgrade: h2Vary: Accept-EncodingVia: cache28.l2cn2 !doctype html>html>head> meta charsetUTF-8>meta http-equivX-UA-Compatible contentIEedge,chrome1>meta nameviewport contentwidthdevice-width, initial-scale1.0, minimum-scale1, maximum-scale1, user-scalableno> meta namekeywords content民药郎藏药讲堂> meta nameDescription content民药郎藏药讲堂> title>民药郎藏药讲堂/title> script src/static/js/uaredirect.js>/script>link relstylesheet typetext/css href/static/css/style.css />script typetext/javascript src/static/js/jquery.min.js>/script>link relstylesheet typetext/css href/static/jquery-ui/ui.css />script typetext/javascript src/static/jquery-ui/ui.js>/script>/head>body> div classpop-box>div classpop-val>/div>/div>header> div classtop> a href/> div classfl>img src/static/images/logo.png>/div> /a> a href/category> div classnav fl>i>img src/static/images/jz.png>/i>讲堂分类/div> /a> div classsearch fl> input typetext idsearch placeholder输入您要搜索的讲堂名称 onkeyupvalue value.replace(/(^s*)|(s*$)/g, )> i classicon pointer onclickgoSearch()>/i> /div> a hrefjavascript: headerLoginBtn();> div classuser fr> img src/static/images/user_head.png> span classlogin-user>登录/span> /div> /a> /div>/header>div classtcbj tcbj-login>/div>div classlogintc> div classlogininfo> h3>欢迎登录民药郞藏药讲堂/h3> div classusername yhm> label>用 户 名:/label> input typetext maxlength11 placeholder请输入您的手机号码 autocompleteoff classusernameipt onkeyupvalue value.replace(/(^s*)|(s*$)/g, )> div classerr-msg em1>/div> /div> div classusername yzm> label>验 证 码:/label> input typetext maxlength6 placeholder请输入短信验证码 autocompleteoff classyzmipt onkeyupvalue value.replace(/(^s*)|(s*$)/g, )> button classcodebtn onclickgetCode
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]