Help
RSS
API
Feed
Maltego
Contact
Domain > videogames.email
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-11-09
138.197.146.46
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sun, 21 Jul 2024 16:22:48 GMTServer: Apache/2.4.29 (Ubuntu)Location: https://videogames.email/Content-Length: 315Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://videogames.email/>here/a>./p>hr>address>Apache/2.4.29 (Ubuntu) Server at videogames.email Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 21 Jul 2024 16:22:48 GMTServer: Apache/2.4.29 (Ubuntu)Last-Modified: Thu, 05 Jul 2018 01:16:05 GMTETag: 2e8f-570364a8fdde6Accept-Ranges: bytesContent-Length: 11919Vary: Accep !doctype html>html langen>!--The index.html page is one of the two pages which is not password protected. It is the introductory page to BOARD18 and contains a welcome message. It is used for logging in to Board18 and for registering new players. It also contains player ID and password recovery functions. Most changes made to this file should also be made to access-denied.htmlCopyright (c) 2014 Richard E. Price under the The MIT License.A copy of this license can be found in the LICENSE.text file.--> head> meta charsetutf-8 /> title>BOARD18 - Remote Play Tool For 18xx Style Games/title> link relshortcut icon hrefimages/favicon.ico > link relstylesheet hrefstyle/board18com-160521.css /> link relstylesheet hrefstyle/board18Index-170804.css /> script typetext/javascript srcscripts/jquery.js> /script> script typetext/javascript srcscripts/sha256-min.js> /script> script typetext/javascript srcscripts/board18com.js> /script> script typetext/javascript srcscripts/board18index.js> /script> script typetext/javascript > $(function() { $(.error).hide(); $(#pointer).hide(); BD18.redirectURL board18Main.php; BD18.LTPAselector null; var LTPAlocal BD18.docCookies.getItem(LTPAlocal); if(LTPAlocal ! null){ var LTPAarray LTPAlocal.split(:,2); BD18.LTPAselector LTPAarray0; var LTPAvalidator LTPAarray1; // Look up selector in database and check validator using // tokenCheck.php. If validator matches then bypass signon. var hash hex_sha256(LTPAvalidator); var dataString selector + BD18.LTPAselector + &validator + hash; $.post(php/tokenCheck.php, dataString, tokenCheckReturn); } // end remember me check var RMpersist BD18.docCookies.getItem(RMpersist); if(RMpersist ! null){ $(#rememberme).prop(checked, true); } else { $(#rememberme).prop(checked, false); } // end Persistent check $(#login).submit(functio
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]