Help
RSS
API
Feed
Maltego
Contact
Domain > www.ursa.io
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2019-11-11
13.226.38.121
(
ClassC
)
2019-11-11
13.226.38.97
(
ClassC
)
2024-01-08
204.246.191.32
(
ClassC
)
2024-03-10
204.246.191.122
(
ClassC
)
2025-04-02
204.246.191.124
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Mon, 08 Jan 2024 23:41:16 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://www.ursa.io/X-Cache: Redirect from html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 2850Connection: keep-aliveDate: Mon, 08 Jan 2024 23:41:17 GMTLast-Modified: Fri, 31 Jul 2020 16:55:47 GMTx-amz-version-id: cQYJxwMciSFsQZ.GPgsLtIO !doctype html>html langen classscrollContainer>head>meta charsetutf-8/>link relshortcut icon href/favicon.ico/>meta nameviewport contentwidthdevice-width,initial-scale1/>meta nametheme-color content#000000/>meta namedescription contentWeb site created using create-react-app/>meta propertyog:title contentUrsa>meta propertyog:description contentA better way to pay for education.>meta propertyog:image contenthttps://ursa.io/static/media/metaLogo.jpg>meta propertyog:url contenthttps://ursa.io/>meta nametwitter:title contentUrsa>meta nametwitter:description content A better way to pay for education.>meta nametwitter:image contenthttps://ursa.io/static/media/metaLogo.jpg>meta nametwitter:card contentsummary_large_image>script srchttps://kit.fontawesome.com/54cc1dc10a.js crossoriginanonymous>/script>link relapple-touch-icon hreflogo192.png/>link relmanifest href/manifest.json/>title>Ursa/title>link href/static/css/main.6dfc1e3c.chunk.css relstylesheet>/head>body>noscript>You need to enable JavaScript to run this app./noscript>div idroot>/div>script>!function(a){function e(e){for(var r,t,ne0,oe1,ue2,l0,i;ln.length;l++)tnl,Object.prototype.hasOwnProperty.call(p,t)&&pt&&i.push(pt0),pt0;for(r in o)Object.prototype.hasOwnProperty.call(o,r)&&(aror);for(s&&s(e);i.length;)i.shift()();return c.push.apply(c,u||),f()}function f(){for(var e,r0;rc.length;r++){for(var tcr,n!0,o1;ot.length;o++){var uto;0!pu&&(n!1)}n&&(c.splice(r--,1),el(l.st0))}return e}var t{},p{1:0},c;function l(e){if(te)return te.exports;var rte{i:e,l:!1,exports:{}};return ae.call(r.exports,r,r.exports,l),r.l!0,r.exports}l.ma,l.ct,l.dfunction(e,r,t){l.o(e,r)||Object.defineProperty(e,r,{enumerable:!0,get:t})},l.rfunction(e){undefined!typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:Module}),Object.defineProperty(e,__esModule,{value:!0})},l.tfunction(r,e){if(1&e&&(rl(r)),8&e)return r;if(4&e&&objecttypeof r&&r&&r.__esModule)return r;var tObject.create(null);if(l.r(t),Object.defineProperty(t,default,{enumerable:!0,value:r}),2&e&&stri
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]