Help
RSS
API
Feed
Maltego
Contact
Domain > www.w2.app
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-06-28
104.22.28.157
(
ClassC
)
2024-08-10
104.22.29.157
(
ClassC
)
2024-10-04
172.67.25.105
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sun, 21 Apr 2024 11:04:59 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveCache-Control: max-age3600Expires: Sun, 21 Apr 2024 12:04:59 GMTLocatio html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>cloudflare/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 21 Apr 2024 11:05:00 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveLast-Modified: Fri, 22 Mar 2024 13:36:54 GMTAccept-Ranges: bytesCF-Cache-Status !DOCTYPE html>html langen>head>meta charSetutf-8/>meta nameviewport contentwidthdevice-width, initial-scale1/>link relstylesheet href/_next/static/css/8c174c0ba2d578df.css crossorigin data-precedencenext/>link relstylesheet href/_next/static/css/08fd1ec6114418a5.css crossorigin data-precedencenext/>link relpreload asscript fetchPrioritylow href/_next/static/chunks/webpack-f44449adbc715cfc.js crossorigin/>script src/_next/static/chunks/fd9d1056-88acd27bac859e5d.js async crossorigin>/script>script src/_next/static/chunks/938-941dd3d7d79f1a19.js async crossorigin>/script>script src/_next/static/chunks/main-app-96de1444907a3907.js async crossorigin>/script>script src/_next/static/chunks/865-4fd564ba65b0eb24.js async>/script>script src/_next/static/chunks/425-311bf0d7734a96d6.js async>/script>script src/_next/static/chunks/app/page-68b9d3cfa4d77d3a.js async>/script>script src/_next/static/chunks/app/layout-09d5985cec459ae1.js async>/script>title>Web2App/title>meta namedescription contentBeyond the apps and web pages/>meta namekeywords contentweb app/>link relicon href/favicon.ico typeimage/x-icon sizes32x32/>script src/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js crossorigin noModule>/script>/head>body class__className_e66fe9>main classfont-sans>div classbg-center h-50rem bg-url('/images/background.png') md:bg-url('/images/background_m.png') md:h-72.125rem>div classbg-#00000033 h-20 z-40 w-full md:h-7.5rem>div classh-20 container mx-auto px-8 flex items-center md:h-7.5rem>div classflex justify-between w-full>div classflex items-center gap-x-3>img loadinglazy width80 height80 decodingasync data-nimg1 classw-10 h-10 md:w-3.75rem md:h-3.75rem stylecolor:transparent src/_next/static/media/logo.21fda0f1.png/>span classtext-xl font-bold text-white md:text-1.75rem>Web2App/span>/div>div classflex items-center font-medium text-white cursor-pointer gap-x-10>header classflex gap-10 items-center py-4 px-2>div classflex gap-8 items-center text-white>div classrelative flex gap-x-2>button classhover:text-blu
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]