Help
RSS
API
Feed
Maltego
Contact
Domain > www.tay-co.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-10-18
108.138.94.40
(
ClassC
)
2026-02-15
3.163.24.34
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Fri, 18 Oct 2024 16:34:39 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://www.tay-co.com/X-Cache: Redirect fr html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 2695Connection: keep-aliveLast-Modified: Sun, 15 Nov 2020 18:33:14 GMTAccept-Ranges: bytesServer: AmazonS3Date: Fri, 18 Oct 2024 16:26:44 GMTETag: !DOCTYPE html>html>head> meta charsetutf-8 /> meta nameviewport contentwidthdevice-width /> title>Taylor Collins/title> base href/ /> link hreffont-awesome/5.14.0/css/all.min.css relpreload asstyle /> link hrefcss/bootstrap/bootstrap.min.css relpreload asstyle /> link hrefcss/site.css relpreload asstyle /> link href_content/MatBlazor/dist/matBlazor.css relpreload asstyle /> link hrefjs/brotli.decode.js relpreload asscript /> link href_content/MatBlazor/dist/matBlazor.js relpreload asscript /> link hreffont-awesome/5.14.0/css/all.min.css relstylesheet /> link hrefcss/bootstrap/bootstrap.min.css relstylesheet /> link hrefcss/site.css relstylesheet /> link href_content/MatBlazor/dist/matBlazor.css relstylesheet />/head>body> app> div styleposition:absolute; top:30vh; width:100%; text-align:center> h2>i classfas fa-spin fa-spinner>/i> Loading.../h2> /div> /app> div idblazor-error-ui> An unhandled error has occurred. a href classreload>Reload/a> a classdismiss>🗙/a> /div> script srcjs/brotli.decode.js typetext/javascript defer>/script> script src_framework/blazor.webassembly.js autostartfalse>/script> script> Blazor.start({ loadBootResource: function (type, name, defaultUri, integrity) { if (type ! dotnetjs && location.hostname ! localhost) { return (async function () { const response await fetch(defaultUri + .br, { cache: no-cache }); if (!response.ok) { throw new Error(response.statusText); } const originalResponseBuffer await response.arrayBuffer(); const originalResponseArray new Int8Array(originalResponseBuffer); const decompressedResponseArray BrotliDecode(originalResponseArray); const contentType type dotnetwasm ? application/
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]