Help
RSS
API
Feed
Maltego
Contact
Domain > www.artiz.ai
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-12-17
104.17.145.108
(
ClassC
)
2025-02-12
104.17.146.108
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sat, 28 Sep 2024 14:52:08 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveLocation: https://www.artiz.ai/CF-Cache-Status: DYNAMICServer: c !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body bgcolorwhite>h1>301 Moved Permanently/h1>p>The requested resource has been assigned a new permanent URI./p>hr/>Powered by Tengine/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sat, 28 Sep 2024 14:52:08 GMTContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveLast-Modified: Sat, 14 Sep 2024 07:41:24 GMTCache-Control: no-sto !DOCTYPE html>html langen>head> link relpreconnect hrefhttps://fonts.gstatic.com/ crossoriginanonymous> link relpreload asstyle onloadthis.relstylesheet hrefhttps://fonts.googleapis.com/css2?familyRoboto:wght@100;300;400;500;700;900&displayswap> link relpreload asfont typefont/eot hrefhttps:/res.artiz.ai/assets/materialdesignicons-webfont-DttUABo4.eot crossoriginanonymous> link relpreload asfont typefont/woff2 hrefhttps:/res.artiz.ai/assets/materialdesignicons-webfont-CYDMK1kx.woff2 crossoriginanonymous> link relpreload asfont typefont/woff hrefhttps:/res.artiz.ai/assets/materialdesignicons-webfont-CgCzGbLl.woff crossoriginanonymous> link relpreload asfont typefont/ttf hrefhttps:/res.artiz.ai/assets/materialdesignicons-webfont-D3kAzl71.ttf crossoriginanonymous> meta charsetUTF-8 /> link relicon hrefhttps://res.artiz.ai/favicon.ico /> meta nameviewport contentwidthdevice-width, initial-scale1.0 /> link relstylesheet href//res.artiz.ai/assets/iconfont/iconfont.css?v2> script srchttps://accounts.google.com/gsi/client async defer>/script> title>Artiz.Ai/title> script typemodule crossorigin srchttps://res.artiz.ai/assets/index-CWeMQYir.js>/script> link relstylesheet crossorigin hrefhttps://res.artiz.ai/assets/index-DQEvFl8C.css>/head>body> div idapp>/div> script> const client_id 305552488438-l364f198pr8ju2kkurkbnn9g457eauos.apps.googleusercontent.com; window.onload function () { if (!window.userStore.isLoggedIn) { window.google.accounts.id.initialize({ client_id: client_id, callback: ggauthcallback, }); window.google.accounts.id.prompt(); } } function ggauthcallback(response) { let id_token response.credential; if (!id_token) { window.showToast(window.t(lang.index.unexpected_credential), error); return; } // send to api /auth/gg fetch(/api/auth/gg, { method: POST, headers: { Content-Type: application/x-www-form-urlencoded; charsetUTF-8, }, body: new URLSearchParam
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]