Help
RSS
API
Feed
Maltego
Contact
Domain > www.xam12.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2020-04-19
23.224.106.170
(
ClassC
)
2020-04-19
23.224.106.172
(
ClassC
)
2020-04-19
23.224.106.174
(
ClassC
)
2025-04-04
148.66.9.58
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginxDate: Thu, 29 Aug 2024 17:17:22 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-aliveLocation: https://www.xam12.com/Strict-Transport-Security: html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginxDate: Thu, 29 Aug 2024 17:17:23 GMTContent-Type: text/htmlContent-Length: 1276Last-Modified: Mon, 22 Apr 2024 10:59:47 GMTConnection: keep-aliveVary: Accept-EncodingETag: 6 !doctype html>html>head> meta charsetutf-8> title>线路识别 跳转中/title> style> .container { width: 60%; margin: 10% auto 0; background-color: #f0f0f0; padding: 2% 5%; border-radius: 10px } ul { padding-left: 20px; } ul li { line-height: 2.3 } a { color: #20a53a } /style> script typetext/javascript src//cdn.bootcss.com/jquery/1.12.4/jquery.min.js>/script>script> // 假设你有一个数组 var myArraybase eGFtMjIyMi5jb20,eGFtMzMzMy5jb20,eGFtMzMzMzMuY29t,eGFtNTU1NTUuY29t,NTEzNjc4OS5jb20; var gourl;// 使用jQuery的$.each()来遍历数组$.each(myArraybase, function(index, value) { value window.atob(value); $.ajax({ url: https://+value+/ts.php, // 替换为你想检测的域名 type: GET, complete: function(xhr) { if (xhr.status 200) { window.location.href https://+value; return false; } } });});/script>/head>body> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]