Help
RSS
API
Feed
Maltego
Contact
Domain > web1.qikpay.it
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-12-24
63.35.73.25
(
ClassC
)
2025-02-03
99.81.46.79
(
ClassC
)
2025-08-12
54.78.49.13
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Tue, 24 Dec 2024 07:19:04 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://web1.qikpay.it:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Tue, 24 Dec 2024 07:19:04 GMTContent-Type: text/html; charsetUTF-8Content-Length: 2997Connection: keep-aliveServer: ApacheSet-Cookie: PHPSESSIDecce50277d39560429dedb8d2b04ee9a; pa !doctype html>html langen>head>meta charsetutf-8/>link relicon hreffavicon.ico/>meta http-equivPragma contentno-cache/>meta http-equivcache-control contentno-cache, no-store, must-revalidate/>meta nameviewport contentwidthdevice-width,heightdevice-height,user-scalableno,initial-scale1,maximum-scale1/>meta nametheme-color content#fff/>meta nameapple-mobile-web-app-status-bar-style content#fff>meta namemsapplication-navbutton-color content#fff>meta namedescription contentQikPay/>link relapple-touch-icon hreflogo192.png/>link relmanifest hrefmanifest.json/>link relpreconnect hrefhttps://fonts.gstatic.com>link relstylesheet hrefhttps://fonts.googleapis.com/css2?familyRoboto:wght@300;400;500;700&displayswap>title>Pay Now/title>script>window._PREO_DATA {_CDNROOT:https://cdn.preoday.com/,_CDNHOST_IMAGE:https://preo.gumlet.io/,_SESSION:ecce50277d39560429dedb8d2b04ee9a,_SESSION_PATH:null,_GOOGLE_ANALYTICS_TRACKING_ID:G-ZD81BDKC9G,_PERMALINK:null,_SENTRY_ENVIRONMENT:prod,_SENTRY_PROJECT_KEY:https://bdc44dfbeb7a4bf89809bf144693c0e9@o124673.ingest.sentry.io/5784966,_QIKORDER_HANDHELD_URL:https://qikorder-handheld.preoday.com/,_QIKORDER_URL:https://qikorder.preoday.com/,_COMPONENTS_URL:https://ui.withqikserve.com/,_PREO_ENVIRONMENT:PROD}/script>script>(function() { // This is a hotfix to get the `orderId` and redirect to the correct route // with the hash because the redirect in the PHP side loses the hash // in safari browsers when having the nginx as a reverse proxy function getQueryParams(params, url) { var QUERY_STRING_REGEXP new RegExp(?& + params + (^*), i); var queryString QUERY_STRING_REGEXP.exec(url); return queryString ? queryString1 : null; }; function removeQueryParams(param) { if (window.URLSearchParams) { var queryParams new URLSearchParams(window.location.search); queryParams.delete(param); var newUrl window.location.pathname; if (queryParams.toString().length > 0) { newU
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]