Help
RSS
API
Feed
Maltego
Contact
Domain > we-mod-it.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Whois
Property
Value
Email
me@betzpatrick.de
NameServer
NS4.NS.AIXIT.COM
Created
2011-01-14 00:00:00
Changed
2017-01-15 00:00:00
Expires
2018-01-14 00:00:00
Registrar
PSI-USA, INC. DBA DO
DNS Resolutions
Date
IP Address
2025-01-09
82.149.239.30
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Thu, 09 Jan 2025 05:11:00 GMTServer: Apache/2.4.62 (Debian)Location: https://we-mod-it.com/Content-Length: 309Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://we-mod-it.com/>here/a>./p>hr>address>Apache/2.4.62 (Debian) Server at we-mod-it.com Port 80/address>/body>/html>
Port 443
HTTP/1.1 503 Service UnavailableDate: Thu, 09 Jan 2025 05:11:00 GMTServer: Apache/2.4.62 (Debian)Strict-Transport-Security: max-age0Connection: closeTransfer-Encoding: chunkedContent-Type: text/html; charsetUTF-8 ?xml version1.0 encodingUTF-8?> !DOCTYPE html PUBLIC -//W3C//DTD XHTML 1.1//EN http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd>html xmlnshttp://www.w3.org/1999/xhtml dirltr xml:langen>head>title>Fatal error: Invalid SQL: INSERT INTO wcf2_session (sessionID, packageID, userID, ipAddress, userAgent, lastActivityTime, requestURI, requestMethod, username) VALUES (20b444bdf299d217ac6b47235d9d9d246cb1091c, 48, 0, 52.40.234.105, , 1736399460, /index.php?pageportal, GET, )/title>style typetext/css>/*!CDATA*/.systemException { border: 1px outset lightgrey; padding: 3px; background-color: lightgrey; text-align: left; overflow: auto; font-family: Verdana, Helvetica, sans-serif; font-size: .8em;}.systemException div { border: 1px inset lightgrey; padding: 4px;}.systemException h1 { background-color: #154268; padding: 4px; color: #fff; margin: 0 0 3px 0; font-size: 1.15em;}.systemException h2 { font-size: 1.1em; margin-bottom: 0;}.systemException pre, .systemException p { margin: 0;}.systemException pre { font-size: .85em; font-family: Courier New;}/*>*//style>/head>body> div classsystemException> h1>Fatal error: Invalid SQL: INSERT INTO wcf2_session (sessionID, packageID, userID, ipAddress, userAgent, lastActivityTime, requestURI, requestMethod, username) VALUES (20b444bdf299d217ac6b47235d9d9d246cb1091c, 48, 0, 52.40.234.105, , 1736399460, /index.php?pageportal, GET, )/h1> div> p>/p> p>You get more information about the problem in our knowledge base: a hrefhttp://www.woltlab.com/help/?code1114>http://www.woltlab.com/help/?code1114/a>/p> h2>Information:/h2> p> b>error message:/b> Invalid SQL: INSERT INTO wcf2_session (sessionID, packageID, userID, ipAddress, userAgent, lastActivityTime, requestURI, requestMethod, username) VALUES (20b444bdf299d217ac6b47235d9d9d246cb1091c, 48, 0, 52.40.234.105, , 1736399460, /index.php?pageportal, GET, )br /> b>error code:/b> 1114br /> b>sql type:/b> MySQLDatabasebr />b>sql error:/b> The table wcf2_session is fullbr />b>sql error number:/b> 1114br />b>sql version:/b> br /> b>file:/b> /srv/webs/customers/wemodit/wemodit/wcf/lib/system/database/MySQLDatabase.class.php (118)br /> b>php version:/b> 5.6.40-79+0~20241121.90+debian11~1.gbpe5bffabr /> b>wcf version:/b> 1.1.10 pl 1 (Tempest)br /> b>date:/b> Thu, 09 Jan 2025 05:11:00 +0000br /> b>request:/b> /br /> b>referer:/b> br /> /p> h2>Stacktrace:/h2> pre>#0 /srv/webs/customers/wemodit/wemodit/wcf/lib/system/session/CookieSessionFactory.class.php(78): MySQLDatabase->sendQuery(INSERT INTO \twc...)#1 /srv/webs/customers/wemodit/wemodit/wcf/lib/system/session/SessionFactory.class.php(73): CookieSessionFactory->create()#2 /srv/webs/customers/wemodit/wemodit/lib/system/WBBCore.class.php(200): SessionFactory->get()#3 /srv/webs/customers/wemodit/wemodit/wcf/lib/system/WCF.class.php(98): WBBCore->initSession()#4 /srv/webs/customers/wemodit/wemodit/global.php(18): WCF->__construct()#5 /srv/webs/customers/wemodit/wemodit/index.php(7): require_once(/srv/webs/custo...)#6 {main}/pre> /div> /div>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]