Help
RSS
API
Feed
Maltego
Contact
Domain > visualearn-aws.jp
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-07-05
13.230.210.167
(
ClassC
)
2025-01-22
18.182.100.66
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Wed, 22 Jan 2025 04:30:52 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://visualearn-aws.jp:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 302 FoundDate: Wed, 22 Jan 2025 04:30:53 GMTContent-Type: text/html; charsetEUC-JPTransfer-Encoding: chunkedConnection: keep-aliveServer: nginx/1.20.0X-Powered-By: PHP/8.0.20Location: http://www.igakueizou.co.jp/ font color#000099>pre>ERROR: syntax error at end of inputLINE 22: where sys_key_id ^/pre>/font>font color#000099>pre>select sys.*, case when sctg_key_id is null then 0 else 1 end as original, to_char(sys_mante_str,yyyy/mm/dd) as sys_mante_str, to_char(sys_str_date, yyyy/mm/dd) as sys_str_date, to_char(sys_end_date, yyyy/mm/dd) as sys_end_date, to_char(sys_str_date2,yyyy/mm/dd) as sys_str_date2, to_char(sys_end_date2,yyyy/mm/dd) as sys_end_date2, aip_key_id, susr_key_id, susr_name, susr_code, susr_kbn, susr_disabled_flg, ugrp_name, coalesce(ugrp_key_id, -1) as susr_ugrp_id /* ¥æ¡¼¥¶¡¼¥°¥ë¡¼¥×¤òºï½ü¤µ¤ì¤¿»þ¤Î°Ù¡¢ugrp_key_id ¤ò¼èÆÀ */from core.system_mst as sys left join core.system_category_data as sctg on sys.sys_key_id sctg.sctg_sys_id and sctg.sctg_ctg_id 5 and sctg.sctg_del_flg 0 left join cloud.access_ip_mst as aip on sys.sys_key_id aip.aip_sys_id and aip.aip_del_flg 0 left join cloud.system_user_mst as susr on sys.sys_key_id susr.susr_sys_id and susr.susr_key_id -1 left join cloud.user_group_mst as ugrp on susr.susr_sys_id ugrp.ugrp_sys_id and susr.susr_ugrp_id ugrp.ugrp_key_id and ugrp.ugrp_del_flg 0where sys_key_id /pre>/font>!-- 10.10.202.72 -->!DOCTYPE html>html langja>head> meta charsetEUC-JP> meta http-equivX-UA-Compatible contentIEedge> meta nameviewport contentwidthdevice-width,initial-scale1> meta nameformat-detection contenttelephoneno> meta nameKeywords content> meta nameDescription content> meta contentnoindex namerobots> link relpreconnect hrefhttps://fonts.googleapis.com> link relpreconnect hrefhttps://fonts.gstatic.com crossorigin> link hrefhttps://fonts.googleapis.com/css2?familyNoto+Sans+JP:wght@500&displayswap relstylesheet> link relstylesheet typetext/css href./css/reseti.css charsetShift_JIS> link relstylesheet typetext/css href./css/style.css?20221209> link relstylesheet typetext/css href./css/adjust.css charsetShift_JIS> script typetext/javascript src./js/techs.js charsetShift_JIS>/script> script typetext/javascript src./js/com.js charsetShift_JIS>/script> script typetext/javascript src./js/inputcheck.js charsetShift_JIS>/script> script typetext/javascript> !-- var init {}; init.initMe function() { Me document.frmindex; }; Techs.addEvent(window, load, init.initMe); init.onKeyword function(sort) { InputCheck.NoCheck true; if(!sort) sort 1; Techs.AddParam(Me, sort, sort); Techs.AddParam(Me, txtVisKeyword, document.frmindex2.txtVisKeyword.value); Techs.AddParam(Me, txtVisKeyword2, 1); return com.MainSubmit(50, ./vis.php); }; var sur {}; sur.survey ; sur.onSurvey function(surkeyid, url, code) { if(sur.surveysurkeyid) return; sur.surveysurkeyid true; // ++ call ajax ++ var datas new Object(); datas.susr -1; datas.sys -1; datas.sur surkeyid; datas.code code; $.ajax ({ type: POST, url: ../ajax/ajax_slg.php, data: datas, dataType: json, success: sur.callback, }); // ++ show survey ++ window.open(url, _blank); }; sur.callback function(datas, dataType) { };var ind {};ind.onExecute function(){ return com.MainSubmit(2, index.php);};ind.onAdmin function(){ if(selfInputCheck) InputCheck.NoCheck true; Techs.AddParam(Me, admin, 1); return com.MainSubmit(0, index.php);};ind.onMessage function(message){ if(selfInputCheck) InputCheck.NoCheck true; Techs.AddParam(Me, message, message); return com.MainSubmit(1, index.php);};ind.onExecuteLoginLess function(){ if(selfInputCheck) InputCheck.NoCheck true; Techs.AddParam(Me, free, 1); return com.MainSubmit(2, index.php);}; --> /script> title>VŽ¥IŽ¥SŽ¥UŽ¥AŽ¥LŽ¥EŽ¥AŽ¥RŽ¥N - /title>/head>body> form idfrmindex namefrmindex methodpost> input typehidden idindex nameindex value1 /> input typehidden idfrom namefrom valueindex /> article classlogin_contents>section classlogin> h1>img srcimages/logo_visualearn_login.png altVISUALEARN>/h1> input typehidden idfirst namefirst value0 /> input typehidden idi namei value /> script typetext/javascript> !--Techs.addEvent(window, load, function(){ind.onMessage(10)}); --> /script> /section>/article> /form>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]