Help
RSS
API
Feed
Maltego
Contact
Domain > xfile.moe
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-08
185.213.174.234
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginx/1.22.1Date: Tue, 10 Dec 2024 14:21:44 GMTContent-Type: text/htmlContent-Length: 169Connection: keep-aliveLocation: https://xfile.moe/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/1.22.1/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginx/1.22.1Date: Tue, 10 Dec 2024 14:21:45 GMTContent-Type: text/htmlLast-Modified: Wed, 04 Dec 2024 09:03:42 GMTTransfer-Encoding: chunkedConnection: keep-aliveETag: W/67501ae !doctype html>html langen>meta charsetutf-8>meta nameviewport contentwidthdevice-width,initial-scale1>meta namegenerator contentXFile 1.8.9>meta namedescription contentXFile is a temporary file hosting service!>title>XFile · Temporary file hosting/title>link relpreload hrefuguu.min.css asstyle>link relpreload hrefuguu.min.js asscript>link relstylesheet hrefuguu.min.css>link relicon typeimage/png sizes32x32 href/img/favicon-32x32.png>div classgrill-wrapper idgrill>div classcontainer>div classjumbotron>h1>XFile~/h1>p classlead>Max upload size is 1024 MiB & files expire after 72 hours.form idupload-form enctypemultipart/form-data methodpost actionupload?outputhtml>button idupload-btn classbtn typebutton>Drop or paste file(s)/button>input typefile idupload-input namefiles multiple data-max-size1024MiB> input typesubmit valueSubmit>/form>ul idupload-filelist>/ul>/div>nav>ul>li>a href/ >XFile/a>li>a hrefapi.html>API/a>li>a hreffaq.html>FAQ/a>/ul>/nav>/div>/div>script async>let grills2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,randomGrillgrillsMath.floor(19*Math.random()),grillElementdocument.getElementById(grill);grillElement.style.setProperty(--avif-bg,`url(img/grills/${randomGrill}.avif)`),grillElement.style.setProperty(--png-bg,`url(img/grills/${randomGrill}.png)`)/script>script defer srcuguu.min.js>/script>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]