Help
RSS
API
Feed
Maltego
Contact
Domain > variantseven.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-01
3.131.107.145
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginx/1.14.0 (Ubuntu)Date: Wed, 01 Nov 2023 16:18:42 GMTContent-Type: text/htmlContent-Length: 194Connection: keep-aliveLocation: https://variantseven.com/ html>head>title>301 Moved Permanently/title>/head>body bgcolorwhite>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/1.14.0 (Ubuntu)/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginx/1.14.0 (Ubuntu)Date: Wed, 01 Nov 2023 16:18:43 GMTContent-Type: text/html; charsetutf-8Content-Length: 14883Connection: keep-aliveX-Frame-Options: DENYVary: CookieX-Conten !doctype html>html>head> meta charsetUTF-8 />meta namedescription contentbase template>meta namekeywords contentvariant seven ecommerce esport>meta nameviewport contentwidthdevice-width, initial-scale1.0>meta http-equivX-UA-Compatible contentieedge />meta namedescription contentbase template>meta namekeywords contentvariant seven ecommerce esport>link relshortcut icon typeimage/jpg hrefhttps://variantseven.s3.amazonaws.com/static/images/favicon.png/> meta http-equivX-UA-Compatible contentieedge />link relshortcut icon typeimage/jpg hrefhttps://variantseven.s3.amazonaws.com/static/images/favicon.png/> link relstylesheet typetext/css hrefhttps://variantseven.s3.amazonaws.com/static/css/main.css />link relpreconnect hrefhttps://fonts.googleapis.com>link relpreconnect hrefhttps://fonts.gstatic.com crossorigin>link hrefhttps://fonts.googleapis.com/css2?familyGeorama&familyUbuntu:wght@300&displayswap relstylesheet>style> html { font-family: Georama, sans-serif; font-family: Ubuntu, sans-serif; }/style> script srchttps://ajax.googleapis.com/ajax/libs/jquery/3.5.1/jquery.min.js>/script>!--for now keep everything here until i can think of a better way to use js and keep it secure-->!-- inject the modal onto the page -->script> $(document).ready(function() { // Get the modal var modal document.getElementById(searchModal); var submitForm $(modal).find(form); submitForm.prop(disabled, true); submitForm.addClass(submit-disabled); // Get the button that opens the modal var btn document.getElementById(myBtn); // Get the span> element that closes the modal var span document.getElementsByClassName(close)0; // When the user clicks the button, open the modal btn.onclick function() { modal.style.display block; //undisable the form here but otherwise have it disabled submitForm.prop(disabled, false); submitForm.removeClass(submit-disabled); } btn.ontap function() { modal.style.display block; submitForm.prop(disabled, false); submitForm.removeClass(submit-disabled); } // When th
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]