Help
RSS
API
Feed
Maltego
Contact
Domain > wdsoftware.de
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Whois
Property
Value
Email
zonemaster@strato.de
NameServer
shades06.rzone.de
Changed
2007-11-23 18:31:20
DNS Resolutions
Date
IP Address
2024-10-05
81.169.145.105
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sat, 13 Jan 2024 11:04:07 GMTServer: Apache/2.4.58 (Unix)Location: https://wdsoftware.de/Content-Length: 230Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://wdsoftware.de/>here/a>./p>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sat, 13 Jan 2024 11:04:08 GMTServer: Apache/2.4.58 (Unix)Upgrade: h2,h2cConnection: UpgradeLast-Modified: Tue, 09 Jan 2024 19:12:59 GMTETag: acf-60e881a49fea9Accept-Ranges: bytesC !doctype html>html langde> head> meta charsetutf-8> meta nameviewport contentwidthdevice-width, initial-scale1.0> meta namekeywords contentDIN-276,DIN276,DIN 276,Kostenplanung im Bau, HOAI, Kostengruppen, Bauprojekte, Kostenberechnung, Web-Applikation, Software, Software für DIN 276, DIN 276-2018-12, WD Software, Werner Duschl> title>WD Software GmbH/title> link relshortcut icon typeimage/x-icon hrefimg/titel.ico /> link relstylesheet mediascreen hrefwd_114.css /> !--link relstylesheet hrefhttps://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css>--> script typetext/javascript srcwd_114.js charsetUTF-8 asynch>/script> script srchttps://ajax.googleapis.com/ajax/libs/jquery/3.6.1/jquery.min.js>/script> script> $(document).ready(function(){ $(.btn1).click(function(){ $(#id_p1).fadeOut(1000, function(){ alert(fadeOut() method is finished!); }); }); $(.btn2).click(function(){ $(#id_p1).fadeIn(1000, function(){ alert(fadeIn() method is finished!); }); }); }); /script> /head> body> main > div idid_background> /div> div idid_head_site> div idid_menue> /div> /div> div idid_website_menue_popup> /div> div idid_dialog> /div> div idid01 classmodal> form classmodal-content animate > div classimgcontainer> span onclickdocument.getElementById(id01).style.displaynone classclose titleClose Modal>×/span> /div> div idid01_div classcontainer> /div> /form> /div> div idid_popup > /div> div idid_popup_select > /div> div idid_app>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]