Help
RSS
API
Feed
Maltego
Contact
Domain > vk2.pw
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-12-28
51.38.231.99
(
ClassC
)
Port 80
HTTP/1.1 200 OKServer: Burp Collaborator https://burpcollaborator.net/X-Collaborator-Version: 4Content-Type: text/htmlContent-Length: 1190 !DOCTYPE html>html>head> meta charsetUTF-8>/head>body>h1>Burp Collaborator Server/h1>p>Burp Collaborator is a service that is used by a hrefhttps://portswigger.net/burp/>Burp Suite/a> when testing web applications for securityvulnerabilities. Some of Burp Suites tests may cause the application beingtested to interact with the Burp Collaborator server, to enable Burp Suiteto detect various security vulnerabilities./p>p>The Burp Collaborator server does not itself initiate any interactions withany system, and only responds to interactions that it receives from othersystems./p>p>If you are a systems administrator and you are seeing interactions with theBurp Collaborator server in your logs, then it is likely that someone istesting your web application using Burp Suite. If you are trying to identifythe person responsible for this testing, you should review your web serveror applications logs for the time at which these interactions were initiatedby your systems./p>p>For further details about Burp Collaborator, please see the a hrefhttps://portswigger.net/burp/documentation/collaborator/>full documentation/a>./p>/body>/html>
Port 443
HTTP/1.1 200 OKServer: Burp Collaborator https://burpcollaborator.net/X-Collaborator-Version: 4Content-Type: text/htmlContent-Length: 1190 !DOCTYPE html>html>head> meta charsetUTF-8>/head>body>h1>Burp Collaborator Server/h1>p>Burp Collaborator is a service that is used by a hrefhttps://portswigger.net/burp/>Burp Suite/a> when testing web applications for securityvulnerabilities. Some of Burp Suites tests may cause the application beingtested to interact with the Burp Collaborator server, to enable Burp Suiteto detect various security vulnerabilities./p>p>The Burp Collaborator server does not itself initiate any interactions withany system, and only responds to interactions that it receives from othersystems./p>p>If you are a systems administrator and you are seeing interactions with theBurp Collaborator server in your logs, then it is likely that someone istesting your web application using Burp Suite. If you are trying to identifythe person responsible for this testing, you should review your web serveror applications logs for the time at which these interactions were initiatedby your systems./p>p>For further details about Burp Collaborator, please see the a hrefhttps://portswigger.net/burp/documentation/collaborator/>full documentation/a>./p>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]