Help
RSS
API
Feed
Maltego
Contact
Domain > www.fedbkltd.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-23
51.77.75.23
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sat, 20 Jul 2024 12:00:22 GMTServer: ApacheLocation: https://www.fedbkltd.com/Content-Length: 233Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://www.fedbkltd.com/>here/a>./p>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sat, 20 Jul 2024 12:00:23 GMTServer: ApacheUpgrade: h2,h2cConnection: UpgradeLast-Modified: Thu, 09 May 2024 04:57:56 GMTAccept-Ranges: bytesContent-Length: 4887Content-Type: text !DOCTYPE html PUBLIC -//W3C//DTD XHTML 1.0 Transitional//EN http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd>html xmlnshttp://www.w3.org/1999/xhtml>head>meta http-equivContent-Type contenttext/html; charsetiso-8859-1 />style>a:link {font:8pt/11pt verdana; color:FF0000}a:visited {font:8pt/11pt verdana; color:#4e4e4e}/style>META NAMEROBOTS CONTENTNOINDEX>title>The page cannot be found/title>META HTTP-EQUIVContent-Type Contenttext-html; charsetWindows-1252>script typetext/javascript>//!CDATA/* ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^Disable context menu on images by GreenLava (BloggerSentral.com)Version 1.0You are free to copy and share this code but please do not remove this credit notice.^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ */ function nocontext(e) { var clickedTag (enull) ? event.srcElement.tagName : e.target.tagName; if (clickedTag IMG) { alert(alertMsg); return false; } } var alertMsg Image context menu is disabled; document.oncontextmenu nocontext;//>/script>/head>script> function Homepage(){!--// in real bits, urls get returned to our script like this:// res://shdocvw.dll/http_404.htm#http://www.DocURL.com/bar.htm //For testing use DocURL res://shdocvw.dll/http_404.htm#https://www.microsoft.com/bar.htm DocURL document.URL; //this is where the http or https will be, as found by searching for :// but skipping the res:// protocolIndexDocURL.indexOf(://,4); //this finds the ending slash for the domain server serverIndexDocURL.indexOf(/,protocolIndex + 3); //for the href, we need a valid URL to the domain. We search for the # symbol to find the begining //of the true URL, and add 1 to skip it - this is the BeginURL value. We use serverIndex as the end marker. //urlresultDocURL.substring(protocolIndex - 4,serverIndex); BeginURLDocURL.indexOf(#,1) + 1; urlresultDocURL.substring(BeginURL,serverIndex); //for display, we need to skip after http://, and go to the next slash displayresultDocU
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]