Help
RSS
API
Feed
Maltego
Contact
Domain > xss.cx
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2014-01-13
198.71.143.44
(
ClassC
)
2025-08-09
50.63.8.35
(
ClassC
)
Port 80
HTTP/1.1 200 OKContent-Type: text/htmlLast-Modified: Fri, 02 Dec 2022 14:10:14 GMTAccept-Ranges: bytesETag: a34728cc576d91:0Server: Microsoft-IIS/10.0X-Powered-By: ASP.NETX-Powered-By-Plesk: PleskWinD !DOCTYPE html>html> head> meta namedescription contentInternational in scope and free for public use, XSS.Cx is a database and publisher of SCAP metrics.> meta namekeywords contentXSS, XXE, SQLi, HTTPi, LFI, RFI, Parser Testing, Security Research Device Metrics, 4G + %g, xss.cx> meta charsetUTF-8> meta nameviewport contentwidthdevice-width, initial-scale1> meta propertytwitter:account_id content222115810 /> title>Exploit Search, Reverse Engineering Data/title>script> (function(i,s,o,g,r,a,m){iGoogleAnalyticsObjectr;irir||function(){ (ir.qir.q||).push(arguments)},ir.l1*new Date();as.createElement(o), ms.getElementsByTagName(o)0;a.async1;a.srcg;m.parentNode.insertBefore(a,m) })(window,document,script,https://www.google-analytics.com/analytics.js,ga); ga(create, UA-11310364-18, auto); ga(send, pageview);/script>script>var trackOutboundLink function(url) { ga(send, event, indextositemap, click, url, { transport: beacon, hitCallback: function(){document.location url;} });}/script> /head> body> h1>Exploit Search, Reverse Engineering Data/h1> h2>International in scope and free for public use/h2> h5>XSS.Cx is a Crawler and Injection Reporting Tool/h5> script> (function() { var cx 008801388445696029762:5wl5jq9fxnc; var gcse document.createElement(script); gcse.type text/javascript; gcse.async true; gcse.src https://cse.google.com/cse.js?cx + cx; var s document.getElementsByTagName(script)0; s.parentNode.insertBefore(gcse, s); })(); /script>gcse:search>/gcse:search> a href//xss.cx/sitemap.html onclicktrackOutboundLink(//xss.cx/sitemap.html); return false;>SiteMap/a> /body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlLast-Modified: Fri, 02 Dec 2022 14:10:14 GMTAccept-Ranges: bytesETag: a34728cc576d91:0Server: Microsoft-IIS/10.0X-Powered-By: ASP.NETX-Powered-By-Plesk: PleskWinD !DOCTYPE html>html> head> meta namedescription contentInternational in scope and free for public use, XSS.Cx is a database and publisher of SCAP metrics.> meta namekeywords contentXSS, XXE, SQLi, HTTPi, LFI, RFI, Parser Testing, Security Research Device Metrics, 4G + %g, xss.cx> meta charsetUTF-8> meta nameviewport contentwidthdevice-width, initial-scale1> meta propertytwitter:account_id content222115810 /> title>Exploit Search, Reverse Engineering Data/title>script> (function(i,s,o,g,r,a,m){iGoogleAnalyticsObjectr;irir||function(){ (ir.qir.q||).push(arguments)},ir.l1*new Date();as.createElement(o), ms.getElementsByTagName(o)0;a.async1;a.srcg;m.parentNode.insertBefore(a,m) })(window,document,script,https://www.google-analytics.com/analytics.js,ga); ga(create, UA-11310364-18, auto); ga(send, pageview);/script>script>var trackOutboundLink function(url) { ga(send, event, indextositemap, click, url, { transport: beacon, hitCallback: function(){document.location url;} });}/script> /head> body> h1>Exploit Search, Reverse Engineering Data/h1> h2>International in scope and free for public use/h2> h5>XSS.Cx is a Crawler and Injection Reporting Tool/h5> script> (function() { var cx 008801388445696029762:5wl5jq9fxnc; var gcse document.createElement(script); gcse.type text/javascript; gcse.async true; gcse.src https://cse.google.com/cse.js?cx + cx; var s document.getElementsByTagName(script)0; s.parentNode.insertBefore(gcse, s); })(); /script>gcse:search>/gcse:search> a href//xss.cx/sitemap.html onclicktrackOutboundLink(//xss.cx/sitemap.html); return false;>SiteMap/a> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]