Help
RSS
API
Feed
Maltego
Contact
Domain > xmatica.net
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-07
185.47.108.229
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sun, 04 Aug 2024 15:43:58 GMTServer: ApacheLocation: https://xmatica.net/Content-Length: 289Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://xmatica.net/>here/a>./p>hr>address>Apache Server at xmatica.net Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 04 Aug 2024 15:43:58 GMTServer: ApacheLast-Modified: Thu, 23 Nov 2023 09:31:59 GMTETag: bab7-60ace81f21d78Accept-Ranges: bytesContent-Length: 47799Vary: Accept-EncodingX-Powe !DOCTYPE html>html langen> head> meta charsetutf-8> meta http-equivX-UA-Compatible contentIEedge> meta nameviewport contentwidthdevice-width, initial-scale1.0> title>Xmatica Srl/title> meta namekeywords content> meta nameauthor contentMichele Bono> link relapple-touch-icon sizes180x180 hrefapple-touch-icon.png> link relicon typeimage/png sizes32x32 hreffavicon-32x32.png> link relicon typeimage/png sizes16x16 hreffavicon-16x16.png> link relmanifest hrefmanifest.json> link relmask-icon hrefsafari-pinned-tab.svg color#5bbad5> meta nametheme-color content#ffffff> !-- CSS --> link hrefcss/bootstrap.min.css relstylesheet> link hrefcss/animate.css relstylesheet> link hrefcss/superslides.css relstylesheet> link hrefcss/owl.carousel.css relstylesheet> link hrefcss/style.css relstylesheet> link hrefcss/ionicons.css relstylesheet> link relstylesheet hrefcss/socicon.css> link hrefhttps://fonts.googleapis.com/css?familyTitillium+Web:100,200,300,400,500,600 relstylesheet typetext/css> !-- HTML5 shim and Respond.js for IE8 support of HTML5 elements and media queries --> !-- WARNING: Respond.js doesnt work if you view the page via file:// --> !--if lt IE 9> script srchttps://oss.maxcdn.com/html5shiv/3.7.2/html5shiv.min.js>/script> script srchttps://oss.maxcdn.com/respond/1.4.2/respond.min.js>/script> !endif--> link relstylesheet typetext/css href//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.0.3/cookieconsent.min.css /> script srchttps://code.iconify.design/1/1.0.7/iconify.min.js>/script> script src//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.0.3/cookieconsent.min.js>/script> script> window.addEventListener(load, function(){ window.cookieconsent.initialise({ palette: { popup: { background: #e6e6e6 }, button: { background: #f1c40f } }, theme: classic,
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]