Help
RSS
API
Feed
Maltego
Contact
Domain > www.staging.autoproctor.co
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-12-28
44.195.64.240
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Mon, 25 Nov 2024 10:47:55 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://www.staging.autoproctor.co:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Mon, 25 Nov 2024 10:47:56 GMTContent-Type: text/html; charsetutf-8Content-Length: 118211Connection: keep-aliveServer: nginx/1.18.0 (Ubuntu)Vary: CookieSet-Cookie: sessioneyJjc3JmX !DOCTYPE html>html classscroll-smooth>head> title>AutoProctor: Automated Online Test Proctoring /title> link relicon typeimage/x-icon hrefhttps://cdn.autoproctor.co/static/img/favicon.ico /> meta charsetUTF-8> meta http-equivX-UA-Compatible contentieedge> meta nameviewport contentwidthdevice-width, initial-scale1, minimum-scale1 /> meta propertyog:image contenthttps://cdn.autoproctor.co/static/img/ap-og.png /> meta nametitle contentAutoProctor: Automated Proctoring Solutions for Online Exams> meta namedescription contentAutoProctor provides automated proctoring solutions to ensure the integrity of online exams and assessments. Learn more about our services and how they can benefit your institution.> script> let loadScriptVersionNum 1; function loadScript(scriptSrc, callback, targethead, callbackArgs{}, windowsObjectToCheckFornull) { // downloads JS from scriptSrc and inserts it into target in the DOM. then calls callback with // callbackArgs. optionally, if jsObjectToInitialize is provided, it will check if the object is // available on script load. if it isnt, it means the script failed to load properly. then, loadScript // is called again with an extra vn query parameter to force a cache refresh var script document.createElement(script); script.type text/javascript; script.src scriptSrc; script.onload function() { if (windowsObjectToCheckFor && !windowwindowsObjectToCheckFor) { if (loadScriptVersionNum 3) { loadScriptVersionNum++; // if lsvnum is already there as a query param, replace the query parameter with a new // value which is incremented by 1. else, append the query parameter lsvum1 to scriptSrc
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]