Help
RSS
API
Feed
Maltego
Contact
Domain > zgmtjy.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2015-12-15
121.9.221.77
(
ClassC
)
2025-04-25
47.76.94.12
(
ClassC
)
2025-08-10
38.11.32.141
(
ClassC
)
2026-01-20
172.67.191.70
(
ClassC
)
Port 80
HTTP/1.1 200 OKServer: nginxDate: Sat, 25 Jan 2025 18:21:36 GMTContent-Type: text/html;charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveVary: Accept-Encoding !DOCTYPE html PUBLIC -//W3C//DTD XHTML 1.0 Transitional//EN http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd>html xmlnshttp://www.w3.org/1999/xhtml>head>meta http-equivContent-Type contenttext/html; charsetutf-8 />title>正芯微电子有限公司_火烈乡正芯微电子有限公司_正芯微电子有限公司官网(zgmtjy.com)/title>meta nameKeywords content招商策略:2021年A股整体闪现前高后低的场 />meta nameDescription content日本神秘汉子斥地可主动去码AI,震动业界长山头. />script languagejavascript>!--if (screen.width 1024 ){document.write(link relstylesheet typetext/css hrefhttp://zgmtjy.com/skin/moban32/css/1024_768.css?3588667152>)}else {document.write(link relstylesheet typetext/css hrefhttp://zgmtjy.com/skin/moban32/css/style.css?3588667152>)}//-->/script>link typetext/css hrefhttp://zgmtjy.com/skin/moban32/css/nav.css?3588667152 relstylesheet />script languagejavascript srchttp://zgmtjy.com/skin/moban32/js/jquery-1.7.2.min.js?3588667152>/script>script languagejavascript srchttp://zgmtjy.com/skin/moban32/js/nav.js?3588667152>/script>script languagejavascript srchttp://zgmtjy.com/skin/moban32/js/jquery.pack.js?3588667152>/script>script languagejavascript srchttp://zgmtjy.com/skin/moban32/js/slide.js?3588667152>/script>script languagejavascript srchttp://zgmtjy.com/skin/moban32/js/png.js?3588667152>/script>script typetext/javascript src/jwplayer.js?3588667152 >/script>script typetext/javascript src/jwplayer.html5.js?3588667152 >/script>/head>body>div classhead> div classtop> div classline_01> p classlogo>a href/ribenshenmihanzi/ classindex>img srchttp://zgmtjy.com/skin/moban32/images/logo.png?901826356 width162 height56 />/a>/p> form action/xizangjunqumoulv/ methodpost namesearchform idsearchform> p classsearch> input typetext value namekeyboard idkeyboard classs_text/> input typesubmit value搜索 classs_btn/> /p> /form> /div> div classheader_all> div classnav idnav> p classn_left_bg>a hrefindex.html c
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]