Help
RSS
API
Feed
Maltego
Contact
Domain > www.albertoparajo.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-09-14
82.223.115.196
(
ClassC
)
2025-01-22
82.223.76.245
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyContent-Type: text/html; charsetUTF-8Location: https://www.albertoparajo.com/Server: Microsoft-IIS/10.0X-Powered-By: ASP.NETX-Powered-By-Plesk: PleskWinX-XSS-Protection: head>title>Document Moved/title>/head>body>h1>Object Moved/h1>This document may be found a HREFhttps://www.albertoparajo.com/>here/a>/body>
Port 443
HTTP/1.1 200 OKCache-Control: privateContent-Type: text/html; charsetutf-8Server: Microsoft-IIS/10.0X-AspNet-Version: 4.0.30319X-Powered-By: ASP.NETX-Powered-By-Plesk: PleskWinX-XSS-Protection: 1; mod !DOCTYPE html>html langes>head> !-- Metas comunes --> title> Dr. Alberto Parajó - Cirujano digestivo en Ourense y Vigo/title> meta namedescription contentCirugía general y digestiva en Ourense y Vigo. Cirugía laparoscópica para tratar hemorroides, hernias inguinales... Enfermedades del aparato digestivo.> meta propertyog:url contenthttps://www.albertoparajo.com/> meta propertyog:image contenthttps://www.albertoparajo.com/images/logo-alberto-parajo-calvo.jpg>meta charsetUTF-8 />meta nameviewport contentwidthdevice-width, initial-scale1.0, maximum-scale5 />meta nameauthor contentPáxinas Galegas /> !-- Carga de favicon --> link relicon typeimage/png href/images/favicon.png sizes96x96 /> !-- Pre-conexión con servidores externos para la solicitud de múltiples recursos --> link relpreconnect hrefhttps://ajax.googleapis.com/ />link reldns-prefetch hrefhttps://ajax.googleapis.com/ />link relpreconnect hrefhttps://fonts.googleapis.com />link relpreconnect hrefhttps://fonts.gstatic.com crossorigin /> !-- Precarga de recursos CSS Comunes--> link relpreload asstyle href/css/kcut.css />link relpreload asstyle href/css/normalize.css />link relpreload asstyle href/css/main.css />link relpreload asstyle href/css/header.css />link relpreload asstyle href/css/footer.css />link relpreload asstyle href/css/modals.css />link relpreload asstyle href/css/components.css />link relpreload asstyle href/css/fontawesome.css />link relpreload asstyle hrefhttps://fonts.googleapis.com/css2?familyMulish:wght@400;700&familyPlayfair+Display:wght@400;500&displayswap /> !-- Precarga de recursos JS --> link relpreload asscript href/js/base.js />link relpreload asscript href/js/header.js />link relpreload asscript href/js/kcut.js /> !-- Recursos CSS (precargados) --> link relstylesheet href/css/kcut.css />link relstylesheet href/css/normalize.css />link relstylesheet href/css/main.css />link relstylesheet href/css/header.css />link relstylesheet href/css/modals.css />link relstyleshe
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]