Help
RSS
API
Feed
Maltego
Contact
Domain > wittinsure.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Whois
Property
Value
Email
DOMAINS@HOSTGATOR.COM
NameServer
NS982.HOSTGATOR.COM
Created
2011-08-12 00:00:00
Changed
2016-08-02 00:00:00
Expires
2017-08-12 00:00:00
Registrar
ENOM, INC.
DNS Resolutions
Date
IP Address
2024-11-04
192.254.189.67
(
ClassC
)
Port 80
HTTP/1.1 200 OKDate: Fri, 16 Feb 2024 16:10:56 GMTServer: ApacheUpgrade: h2,h2cConnection: UpgradeLast-Modified: Tue, 16 Sep 2008 20:47:18 GMTAccept-Ranges: bytesContent-Length: 3822Vary: Accept-Encod !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 3.2 Final//EN>html dirltr>head>style>a:link {font:8pt/11pt verdana; color:FF0000}a:visited {font:8pt/11pt verdana; color:#4e4e4e}/style>META NAMEROBOTS CONTENTNOINDEX>title>The Web site cannot be found/title>META HTTP-EQUIVContent-Type Contenttext-html; charsetWindows-1252>/head>script> function Homepage(){!--// in real bits, urls get returned to our script like this:// res://shdocvw.dll/http_404.htm#http://www.DocURL.com/bar.htm //For testing use DocURL res://shdocvw.dll/http_404.htm#https://www.microsoft.com/bar.htm DocURL document.URL; //this is where the http or https will be, as found by searching for :// but skipping the res:// protocolIndexDocURL.indexOf(://,4); //this finds the ending slash for the domain server serverIndexDocURL.indexOf(/,protocolIndex + 3); //for the href, we need a valid URL to the domain. We search for the # symbol to find the begining //of the true URL, and add 1 to skip it - this is the BeginURL value. We use serverIndex as the end marker. //urlresultDocURL.substring(protocolIndex - 4,serverIndex); BeginURLDocURL.indexOf(#,1) + 1; urlresultDocURL.substring(BeginURL,serverIndex); //for display, we need to skip after http://, and go to the next slash displayresultDocURL.substring(protocolIndex + 3 ,serverIndex); InsertElementAnchor(urlresult, displayresult);}function HtmlEncode(text){ return text.replace(/&/g, &).replace(//g, ").replace(//g, <).replace(/>/g, >);}function TagAttrib(name, value){ return +name++HtmlEncode(value)+;}function PrintTag(tagName, needCloseTag, attrib, inner){ document.write( + tagName + attrib + > + HtmlEncode(inner) ); if (needCloseTag) document.write( / + tagName +> );}function URI(href){ IEVer window.navigator.appVersion; IEVer IEVer.substr( IEVer.indexOf(MSIE) + 5, 3 ); return (IEVer.charAt(1). && IEVer > 5.5) ? encodeURI(href) : escape(href).replace(/%3A/g, :).replace(/%3B/g, ;);}function InsertElementAnchor(href, text){ PrintTag(A, true, TagAttr
Port 443
HTTP/1.1 200 OKDate: Fri, 16 Feb 2024 16:10:56 GMTServer: ApacheUpgrade: h2,h2cConnection: UpgradeLast-Modified: Tue, 16 Sep 2008 20:47:18 GMTAccept-Ranges: bytesContent-Length: 3822Vary: Accept-Encod !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 3.2 Final//EN>html dirltr>head>style>a:link {font:8pt/11pt verdana; color:FF0000}a:visited {font:8pt/11pt verdana; color:#4e4e4e}/style>META NAMEROBOTS CONTENTNOINDEX>title>The Web site cannot be found/title>META HTTP-EQUIVContent-Type Contenttext-html; charsetWindows-1252>/head>script> function Homepage(){!--// in real bits, urls get returned to our script like this:// res://shdocvw.dll/http_404.htm#http://www.DocURL.com/bar.htm //For testing use DocURL res://shdocvw.dll/http_404.htm#https://www.microsoft.com/bar.htm DocURL document.URL; //this is where the http or https will be, as found by searching for :// but skipping the res:// protocolIndexDocURL.indexOf(://,4); //this finds the ending slash for the domain server serverIndexDocURL.indexOf(/,protocolIndex + 3); //for the href, we need a valid URL to the domain. We search for the # symbol to find the begining //of the true URL, and add 1 to skip it - this is the BeginURL value. We use serverIndex as the end marker. //urlresultDocURL.substring(protocolIndex - 4,serverIndex); BeginURLDocURL.indexOf(#,1) + 1; urlresultDocURL.substring(BeginURL,serverIndex); //for display, we need to skip after http://, and go to the next slash displayresultDocURL.substring(protocolIndex + 3 ,serverIndex); InsertElementAnchor(urlresult, displayresult);}function HtmlEncode(text){ return text.replace(/&/g, &).replace(//g, ").replace(//g, <).replace(/>/g, >);}function TagAttrib(name, value){ return +name++HtmlEncode(value)+;}function PrintTag(tagName, needCloseTag, attrib, inner){ document.write( + tagName + attrib + > + HtmlEncode(inner) ); if (needCloseTag) document.write( / + tagName +> );}function URI(href){ IEVer window.navigator.appVersion; IEVer IEVer.substr( IEVer.indexOf(MSIE) + 5, 3 ); return (IEVer.charAt(1). && IEVer > 5.5) ? encodeURI(href) : escape(href).replace(/%3A/g, :).replace(/%3B/g, ;);}function InsertElementAnchor(href, text){ PrintTag(A, true, TagAttr
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]