Help
RSS
API
Feed
Maltego
Contact
Domain > xchange.bruecknerarchitekten.net
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2022-01-10
104.26.3.240
(
ClassC
)
2024-11-25
172.67.73.73
(
ClassC
)
2025-01-15
104.26.2.240
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Thu, 21 Nov 2024 05:51:04 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveLocation: https://xchange.bruecknerarchitekten.net/CF-Cache-Stat html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/1.25.5/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Thu, 21 Nov 2024 05:51:05 GMTContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveexpires: Thu, 21 Nov 2024 05:47:05 GMTCache-Control: max-age0, no !DOCTYPE html>!-- Copyright (C) 2022 booltype GmbH -->html langde classbg-gray-100 stylefont-family: Inter, sans-serif;> head> meta charsetutf-8> title>xChange – Brückner Architekten/title> meta nameviewport contentwidthdevice-width, initial-scale1.0> meta namedescription content> meta namegenerator contentTextMate http://macromates.com/> meta nameauthor contentbooltype GmbH> style> x-cloak { display: none !important; } /style> link relshortcut icon href/static/img/favicon.ico typeimage/x-icon> link relstylesheet href/static/css/main.css typetext/css> link relstylesheet href/static/CACHE/css/output.cc0ae76c23b9.css typetext/css> script defer src/static/js/alpine.3.8.1.min.js>/script> !-- extra head content--> /head> body classflex flex-col min-h-screen container mx-auto py-8 px-4 max-w-screen-xl m-1 pt-16 bg-white border border-gray-200 rounded-xl> div classgrow> div idheader classpb-20> a href/projekte>img src/static/img/logo.jpg width430 height43 altLogo>/a> /div> noscript> div> strong>Achtung:/strong> p>JavaScript ist in Ihrem Browser deaktiviert oder wird nicht unterstützt. Bitte beachten Sie dass diese Webseite ohne JavaScript nur eingeschränkt benutzt werden kann./p> /div> /noscript> div> !-- content --> h2 classflex border-b-4 border-gray-800 mt-12 mb-8 py-2 text-base font-semibold aria-labelBreadcrumb>Anmelden/h2> div classmt-8 sm:mx-auto sm:w-full sm:max-w-md> div classbg-white py-8 px-4 shadow sm:rounded-lg sm:px-10> form classspace-y-6 action. methodPOST> input typehidden namecsrfmiddlewaretoken valueedbnbGaTkKSaZ9aPb5G1lNakt8CNsenmAic18uWvqrBKANCAmMSSJGVYTeN5HRbn> div> label foremail classblock text-sm font-medium text-gray-700> Benutzername /label> div classmt-1> input typetext nameusername autofocus autocapitalizenone autocompleteusername maxl
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]