Help
RSS
API
Feed
Maltego
Contact
Domain > www.wcmas.co.za
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Whois
Property
Value
Email
dnsadmin@zadna.org.za
DNS Resolutions
Date
IP Address
2019-04-17
196.38.88.169
(
ClassC
)
2025-01-26
107.180.1.19
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyContent-Type: text/html; charsetUTF-8Location: https://www.wcmas.co.za/Server: Microsoft-IIS/10.0X-Powered-By: ASP.NETX-Powered-By-Plesk: PleskWinDate: Wed, 25 Dec 2024 1 head>title>Document Moved/title>/head>body>h1>Object Moved/h1>This document may be found a HREFhttps://www.wcmas.co.za/>here/a>/body>
Port 443
HTTP/1.1 200 OKCache-Control: privateContent-Type: text/html; charsetutf-8Server: Microsoft-IIS/10.0X-AspNetMvc-Version: 5.2X-AspNet-Version: 4.0.30319X-Powered-By: ASP.NETX-Powered-By-Plesk: PleskWin !DOCTYPE html>html langen-US classno-js no-svg>head> meta charsetUTF-8> meta nameviewport contentwidthdevice-width, initial-scale1> link relprofile hrefhttps://gmpg.org/xfn/11> title>Witbank Coalfields Medical Aid Scheme/title> link reldns-prefetch hrefhttp://fonts.googleapis.com/ /> link reldns-prefetch hrefhttp://s.w.org/ /> link hrefhttps://fonts.gstatic.com/ crossorigin relpreconnect /> link relalternate typeapplication/rss+xml titleWitbank Coalfields Medical Aid Scheme hrefhttps://www.wcmas.co.za /> link relalternate typeapplication/rss+xml titleWitbank Coalfields Medical Aid Scheme hrefhttps://www.wcmas.co.za /> link relstylesheet hrefhttps://fonts.googleapis.com/css?familyFont+Name> script> window._wpemojiSettings { baseUrl: https://www.wcmas.co.za, ext: .png, svgUrl: https://www.wcmas.co.za, svgExt: .svg, source: { concatemoji: https://www.wcmas.co.za } }; !function (e, a, t) { var n, r, o, i a.createElement(canvas), p i.getContext && i.getContext(2d); function s(e, t) { var a String.fromCharCode; p.clearRect(0, 0, i.width, i.height), p.fillText(a.apply(this, e), 0, 0); e i.toDataURL(); return p.clearRect(0, 0, i.width, i.height), p.fillText(a.apply(this, t), 0, 0), e i.toDataURL() } function c(e) { var t a.createElement(script); t.src e, t.defer t.type text/javascript, a.getElementsByTagName(head)0.appendChild(t) } for (o Array(flag, emoji), t.supports { everything: !0, everythingExceptFlag: !0 }, r 0; r o.length; r++)t.supportsor function (e) { if (!p || !p.fillText) return !1; switch (p.textBaseline top, p.font 600 32px Arial, e) { case flag: return s(127987, 65039, 8205, 9895, 65039, 127987, 65039, 8203, 9895, 65039) ? !1 : !s(55356, 56826, 55356, 56819, 55356, 56826, 8203, 55356, 56819) && !s(55356, 57332, 56128, 56423, 56128, 56418, 56128, 56421, 56128, 56430, 56128, 56423, 56128, 56447, 55356, 57332, 8203, 56128, 56423, 8203, 56128, 56418, 8203, 56128, 56421, 8203, 56128, 56430, 8203, 56128, 56423, 8203, 56128, 56447); case emoji: retu
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]