Help
RSS
API
Feed
Maltego
Contact
Domain > www.cleaninglab.co.kr
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-07-02
76.76.21.241
(
ClassC
)
2024-09-22
76.76.21.98
(
ClassC
)
2025-01-07
66.33.60.130
(
ClassC
)
Port 443
HTTP/1.1 200 OKAge: 0Cache-Control: private, no-cache, no-store, max-age0, must-revalidateConnection: keep-aliveContent-Length: 147140Content-Type: text/html; charsetutf-8Date: Tue, 02 Jul 2024 18:22: !DOCTYPE html>html langko>head>script>// globalThis// 18.1.1 globalThis(function() { /* polyfill.io - This code ensures that the referenced object is not an object which is not infact the global object. This is needed because the Firefox Content Script environment does some funky stuff such as creating a frozen `self` global object which is not the same `self` global object that is used in browser environments. https://developer.mozilla.org/en-US/docs/Archive/Add-ons/Add-on_SDK/Guides/Content_Scripts/self As well as the above, Firefox Content Scripts run in a secure sandbox which returns `object Opaque` when accessing globals such as Object instead of the actual global Object object. https://developer.mozilla.org/en-US/docs/Mozilla/Tech/Xray_vision#Xrays_for_JavaScript_objects */ function isNotFirefoxContentScriptEnviroment(root) { return root && root.Object Object && root; } var freeGlobalThis isNotFirefoxContentScriptEnviroment( typeof globalThis object && globalThis ); var freeWindow isNotFirefoxContentScriptEnviroment( typeof window object && window ); var freeSelf isNotFirefoxContentScriptEnviroment( typeof self object && self ); var freeGlobal isNotFirefoxContentScriptEnviroment( typeof global object && global // eslint-disable-line no-undef ); var globalThis // Modern browsers which already have globalThis but are running this polyfill anyway. freeGlobalThis || // All browsers which are running the polyfill in their main thread. freeWindow || // All browsers which are running the polyfill in a Worker environment such as Web Workers or Service Workers. freeSelf || // NodeJS freeGlobal || // Everything else so long as they are not running with a Content Security Policy which forbids using `Function`. // If you reach here and have CSP forbidding `Function`, please open an issue on https://github.com/Financial-Times/polyfill-library Function(return this)(); // Export the object try { Object.defineProperty(globalThis, globalThis, { configurable: true, enumerable: false,
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]