Help
RSS
API
Feed
Maltego
Contact
Domain > www.bigbossaction.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-11-09
104.18.16.167
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sat, 05 Oct 2024 19:49:22 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveCache-Control: max-age3600Expires: Sat, 05 Oct 2024 20:49:22 GMTLocatio html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>cloudflare/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sat, 05 Oct 2024 19:49:22 GMTContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-alivecache-control: privatevary: Accept-Encodingx-aspnet-version: 4.0. !DOCTYPE html PUBLIC -//W3C//DTD XHTML 1.0 Transitional//EN http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd>html xmlnshttp://www.w3.org/1999/xhtml>head>link relstylesheet hrefstyles/styles.css typetext/css />title> BigBossAction.com/title>script srchttps://www.hostpph.com/js/host.js typetext/javascript>/script>script typetext/javascript>SendToHTTP();/script>script typetext/javascript languagejavascript> var redirectagent navigator.userAgent.toLowerCase(); var redirect_devices vnd.wap.xhtml+xml, sony, symbian, nokia, samsung, mobile, windows ce, epoc, opera mini, nitro, j2me, midp-, cldc-, netfront, mot, up.browser, up.link, audiovox, blackberry, ericsson, panasonic, philips, sanyo, sharp, sie-, portalmmm, blazer, avantgo, danger, palm, series60, palmsource, pocketpc, smartphone, rover, ipaq, au-mic, alcatel, ericy, vodafone, wap1, wap2, teleca, playstation, lge, lg-, iphone, android, htc, dream, webos, bolt, nintendo; for (var i in redirect_devices) { if (redirectagent.indexOf(redirect_devicesi) ! -1) { var pageURL document.location.href; var MyArray pageURL.split(.); var BaseURL ; var newURL ; // newURL newURL + /mobile/; newURL https://mysportsonline.net/login.aspx; location.replace(newURL) } } /script>/head>body>div classmain>div classtop>div classlogin>form methodpost action/dgs/ idForm1 stylemargin: 0; autocompleteOFF>input typehidden name__VIEWSTATE id__VIEWSTATE value/wEPDwUKMTY1NDU2MTA1MmRkxxy+6Q3WAv+Tmr0AfcW/mbU8bOc93CNh8qY4aVIFORo />input typehidden name__VIEWSTATEGENERATOR id__VIEWSTATEGENERATOR valueCA0B0334 />div classform>span>User Name:/span>input typetext nameAccount size26 idaccount classfield />br/>span>Password:/span>input typepassword namepassword size26 idpassword classfield />/div>div classgo_btn>input border0 nameLogin typeimage altGo srcimages/go_button.jpg />/div>/form>/div>/div>div classmain_banner>img srcimages/banner.jpg width1024
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]