Help
RSS
API
Feed
Maltego
Contact
Domain > www.husban.net
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Files that talk to www.husban.net
MD5
A/V
fbfc226a9cdb89f43f233ddafe6f6e37
[
HW32.CDB.D155
] [
Artemis!FBFC226A9CDB
] [
Backdoor.Bot
] [
W32/Behav-Heuristic-066
] [
Trojan.Win32.AntiAV.cevggx
] [
W32/Heuristic-210!Eldorado
] [
Infostealer.Gampass
] [
Trojan.PWS.Wsgame.42354
] [
Cryp_MEW-11
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.G
] [
Mal/EncPk-BA
] [
PWS:Win32/OnLineGames.LH
] [
BScope.P2P-Worm.Palevo
] [
PE:Trojan.Killav!1.649C
] [
Trojan.Win32.KillAV.aZ
]
28c435b2d74ba2023561cd40540a2fb6
[
Trojan-FDFO!28C435B2D74B
] [
OnLineGames.LVXF
] [
PCK/Safengine
] [
PE:Malware.XPACK-LNR/Heur!1.5594
] [
Trojan.Win32.Siscos
] [
W32/SfEngine.A!tr
]
DNS Resolutions
Date
IP Address
2014-02-08
98.126.96.109
(
ClassC
)
2025-01-16
198.54.116.155
(
ClassC
)
Port 80
HTTP/1.1 301 Moved Permanentlykeep-alive: timeout5, max100content-type: text/htmlcontent-length: 795date: Sat, 01 Jun 2024 16:57:23 GMTserver: LiteSpeedlocation: https://www.husban.net/x-turbo-charged !DOCTYPE html>html styleheight:100%>head>meta nameviewport contentwidthdevice-width, initial-scale1, shrink-to-fitno />title> 301 Moved Permanently/title>style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}/style>/head>body stylecolor: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;>div styleheight:auto; min-height:100%; > div styletext-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;> h1 stylemargin:0; font-size:150px; line-height:150px; font-weight:bold;>301/h1>h2 stylemargin-top:20px;font-size: 30px;>Moved Permanently/h2>p>The document has been permanently moved./p>/div>/div>/body>/html>
Port 443
HTTP/1.1 200 OKkeep-alive: timeout5, max100content-type: text/html; charsetutf-8x-frame-options: DENYvary: Cookiex-content-type-options: nosniffreferrer-policy: same-origincross-origin-opener-policy: !DOCTYPE html>html langen> head> meta charsetUTF-8 /> meta nameviewport contentwidthdevice-width, initial-scale1.0 /> title> Traffic web violation App /title> !-- load css files --> link relstylesheet href/static/css/main.css /> link hrefhttps://cdn.jsdelivr.net/npm/bootstrap@5.3.2/dist/css/bootstrap.min.css relstylesheet integritysha384-T3c6CoIi6uLrA9TneNEoa7RxnatzjcDSCmG1MXxSR1GAsXEV/Dwwykc2MPK8M2HN crossoriginanonymous /> !-- Add these lines for Select2 --> !-- Load jQuery only once --> script srchttps://cdnjs.cloudflare.com/ajax/libs/jquery/3.7.1/jquery.min.js integritysha512-v2CJ7UaYy4JwqLDIrZUI/4hqeoQieOmAZNXBeQyjo21dadnwR+8ZaIJVT8EE2iyI61OV8e6M8PP2/4hpQINQ/g crossoriginanonymous referrerpolicyno-referrer >/script> !-- Add these lines for Select2 after jQuery --> !-- Load jQuery only once --> script srchttps://cdnjs.cloudflare.com/ajax/libs/jquery/3.7.1/jquery.min.js integritysha512-v2CJ7UaYy4JwqLDIrZUI/4hqeoQieOmAZNXBeQyjo21dadnwR+8ZaIJVT8EE2iyI61OV8e6M8PP2/4hpQINQ/g crossoriginanonymous referrerpolicyno-referrer >/script> !-- Add these lines for Select2 after jQuery --> link hrefhttps://cdn.jsdelivr.net/npm/select2@4.1.0-rc.0/dist/css/select2.min.css relstylesheet /> script srchttps://cdn.jsdelivr.net/npm/select2@4.1.0-rc.0/dist/js/select2.min.js>/script> /head> body> nav classpy-2 bg-body-tertiary border-bottom> div classcontainer d-flex flex-wrap> ul classnav me-auto> li classnav-item> a href/violations classnav-link link-body-emphasis px-2 active aria-currentpage > Violations /a> /li> li classnav-item> a href# onclickshow_new_form() classnav-link link-body-emphasis px-2 > New /a> /li> /ul> ul classnav> li classnav-item> a href/ classnav-link link-body-emphasis px-2> Login /a> /li> /
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]