Help
RSS
API
Feed
Maltego
Contact
Domain > zombieloadattack.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2023-08-27
129.27.142.24
(
ClassC
)
2024-11-13
129.27.142.90
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sun, 27 Aug 2023 16:11:28 GMTServer: ApacheLocation: https://zombieloadattack.com/Content-Length: 237Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://zombieloadattack.com/>here/a>./p>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 27 Aug 2023 16:11:29 GMTServer: ApacheStrict-Transport-Security: max-age63072000; includeSubDomains; preloadLast-Modified: Tue, 15 Feb 2022 10:50:05 GMTETag: 4db2-5d80c4bc42b !DOCTYPE html>html langen>head>meta charsetutf-8>title>ZombieLoad Attack/title>meta nameviewport contentwidthdevice-width,initial-scale1>meta namedescription content>meta nameauthor content>meta namekeywords content>meta namedescription content>link relapple-touch-icon sizes180x180 href/public/images/apple-touch-icon.png>link relicon href/public/favicon.ico typeimage/x-icon>link relshortcut icon href/public/favicon.ico typeimage/x-icon>link relmanifest href/public/site.webmanifest>link relmask-icon href/public/images/safari-pinned-tab.svg color#5bbad5>meta namemsapplication-TileColor content#00aba9>meta nametheme-color content#ffffff>link relstylesheet typetext/css href//fonts.googleapis.com/css?familyOpen+Sans:300,400,600,700,900,bold>link relstylesheet typetext/css href//fonts.googleapis.com/css?familyPermanent+Marker>link relstylesheet typetext/css href//fonts.googleapis.com/css?familyGentium+Book+Basic>link relstylesheet hrefhttps://pro.fontawesome.com/releases/v5.8.2/css/all.css integritysha384-xVVam1KS4+Qt2OrFa+VdRUoXygyKIuNWUUUBZYv+n27STsJ7oDOHJgfF0bNKLMJF crossoriginanonymous>!--if lt IE 9> script src//oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js>/script> script src//oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js>/script> !endif-->link hrefcss/2.css relstylesheet>link hrefcss/0.css relstylesheet>link asstyle hrefcss/0.css relpreload>link asstyle hrefcss/2.css relpreload>link asscript hrefjs/main.5d6ce4aadb4211f4e665.js relpreload>link asscript hrefjs/runtime.5d6ce4aadb4211f4e665.js relpreload>link asscript hrefjs/vendor.5d6ce4aadb4211f4e665.js relpreload>/head>body>header>nav classnavbar navbar-expand-lg navbar-light bg-light fixed-top idmainNav>div classcontainer>a classnavbar-brand href#>img srcpublic/images/logo_square.svg width40 height40> span classnavbar-brand-text>ZombieLoad Attack /span>/a>button classnavbar-toggler order-0 typebutton data-togglecollapse data-target#navbarResponsive aria-controlsnavbarResponsive aria-expandedfalse aria-labelToggle navigation>i classfar fa-bar
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]