Help
RSS
API
Feed
Maltego
Contact
Domain > 0x21.ghosthost.site
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-10-20
18.160.213.19
(
ClassC
)
2025-08-27
3.175.34.2
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Wed, 27 Aug 2025 08:08:23 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://0x21.ghosthost.site/X-Cache: Redirect from cloudfrontVia: 1.1 a149f4f5bbee293b9be1b5cd1f06e872.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P3Alt-Svc: h3:443; ma86400X-Amz-Cf-Id: JLLiyLBYFyc9dyW9Z5ZfCVjL_1zLxhcXtaTQxyt1irwIU6Ch9XoWDA html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 21807Connection: keep-aliveDate: Wed, 27 Aug 2025 08:08:24 GMTLast-Modified: Mon, 16 Jun 2025 12:43:42 GMTETag: 5e71f1e91ca6ac7debbcb8d16ccb75d7x-amz-server-side-encryption: AES256x-amz-version-id: 9aoyarE3lm2KIc51EJXuxWf7lBLo0p4vAccept-Ranges: bytesServer: AmazonS3X-Cache: Miss from cloudfrontVia: 1.1 dd936a86bc7ee81fb9cfdade266a1eb0.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P3Alt-Svc: h3:443; ma86400X-Amz-Cf-Id: Ju3HfJwpT86Zn_luLvK_5T5JRhPzNYAOZhDfbLhQIQ3MpwzZBpPUZw !DOCTYPE html>html langen itemscope itemtypehttps://schema.org/WebPage> head> meta charsetUTF-8> meta http-equivX-UA-Compatible contentIEedge,chrome1> meta nameviewport contentwidthdevice-width,initial-scale1> title>0x21 Consulting | Compliance, Risk Management, & Cybersecurity/title> meta nameauthor contentMicah Henning> meta namedescription contentProtect your business from malicious actors. Avoid financial loss.> link relshortcut icon hreflib/img/favicon.ico typeimage/vnd.microsoft.icon> link relstylesheet hreflib/styles.css typetext/css> meta propertyog:title contentCompliance, Risk Management, & Cybersecurity Consulting> meta propertyog:site_name content0x21 Consulting> meta propertyog:url contenthttps://0x21.consulting> meta propertyog:description contentProtect your business from malicious actors. Avoid financial loss.> meta propertyog:type contentwebsite> meta propertyog:image contenthttps://0x21.consulting/lib/img/featured_img.jpg> script typeapplication/ld+json> { @context: https://schema.org, @type: LocalBusiness, name: 0x21 Consulting, image: https://0x21.consulting/lib/img/0x21_consulting.png, @id: https://0x21.consulting, url: https://0x21.consulting, telephone: 12622754030, duns: 96-787-4970, address: { @type: PostalAddress, streetAddress: , addressLocality: Madison, addressRegion: WI, postalCode: 53704, addressCountry: US }, publicAccess: false, openingHoursSpecification: { @type: OpeningHoursSpecification, dayOfWeek: Monday, Tuesday, Wednesday, Thursday, Friday , opens: 08:00, closes: 18:00 }, sameAs: https://www.linkedin.com/company/0x21-consulting/, https://www.bbb.org/us/wi/madison/profile/information-technology-services/0x21-consulting-inc-0694-1000018581, https://github.com/0x21-consulting } /script> script defer data-domain0x21.consulting srchttps://plausible.io/js/script.js>/script> /head> body> main> section classhero idtop> img srclib/img/happy_man.jpg altSome happy employees working on computers classhero-bg> div classcontainer container-sm flex flex-ai-c> div> a href#top classbrand> img srclib/img/0x21_consulting_reverse.png alt0x21 Consulting logo> /a> menu> li>a href#compliance>Compliance/a>/li> li>a href#risk-management>Risk Management/a>/li> li>a href#cybersecurity>Cybersecurity/a>/li> li>a href#general-it>IT Services/a>/li> /menu> /div> div> h1> Protect your business br>from malicious actors. br>Avoid financial loss. /h1> p> 96% of cyber insurance claims come from small and medium sized businesses at a median cost of b>$48k/b>. /p> p classcta> strong>Reach out today to protect your business from cyber threats./strong> br>br> a hrefhttps://calendly.com/0x21 contentSchedule a Meeting classcta-btn> Schedule a Meeting /a> a hreftel:2622754030 itemproptelephone content+12622754030 classcta-btn> (262) 275‑4030 /a> /p> /div> /div> div classeffect-squares> div>/div>div>/div>div>/div>div>/div> div>/div>div>/div>div>/div>div>/div> div>/div>div>/div>div>/div>div>/div> /div> /section> div classpage-contents> section classsection section-hipaa itemscope itemtypehttps://schema.org/Service> div classcontainer container-sm flex flex-ai-c> div> img classhipaa-brand srclib/img/hipaa-compliant-badge.png altHIPAA Compliant Badge> /div> div> h2 itempropserviceType>Affordable HIPAA Compliance for Small Providers/h2> p itempropdescription> It costs far too much to comply with the HIPAA Security Rule, especially for small healthcare providers and clinics. If you are a dental, optometry, or other small provider and have found compliance prohibitively expensive, schedule a meeting today. Weve developed a process and technology product for helping small providers comply with the rule for nearly half the cost of a traditional assessment.br> a href#compliance>See more about compliance ›/a> /p> /div> /div> /section> section classsection section-overview> div classcontainer text-center> h2>Security-Forward IT Consulting/h2> /div> div classcontainer flex flex-jc-se icon-border-bound text-center> div classflex-col> i classmaterial-icons>assignment_turned_in/i> h3>Compliance/h3> p> Comply with law & regulation for nearly half the cost of a traditional assessment. /p> /div> div classflex-col> i classmaterial-icons>show_chart/i> h3>Risk Management/h3> p> Know what to protect, how much to spend, and how much to insure with quantitative risk management. /p> /div> div classflex-col> i classmaterial-icons>security/i> h3>Cybersecurity/h3> p> Protect your trade secrets, customers, and employees from malicious actors and financial loss. /p> /div> div classflex-col> i classmaterial-icons>dns/i> h3>IT Services/h3> p> Count on your IT infrastructure with enterprise-grade security and reliability. /p> /div> /div> /section> section classsection idcompliance itemscope itemtypehttps://schema.org/Service> div classcontainer> div classtext-center> h2 itempropserviceType>Compliance Consulting/h2> p itempropdescription> Implementing a cybersecurity framework in your business is one of the best ways to validate you are taking the right steps toward defending yourself from future losses. Sometimes laws, regulations, or contracts require you to comply with a particular framework. We can help you comply far more affordably than the rest of the market due to our lean organization, scalable infrastructure, and innovative engineering. /p> /div> /div> div classtabs flex container container-xsm> menu classmenu> li classactive>button typebutton>HIPAA/button>/li> li>button typebutton>HITRUST/button>/li> li>button typebutton>NIST CSF/button>/li> li>button typebutton>NIST SP 800-53/button>/li> li>button typebutton>ISO/IEC 27001:2013/button>/li> li>button typebutton>PCI DSS/button>/li> /menu> ul classcontent> li classactive> h3>HIPAA Security Rule/h3> p> If you transmit electronic PHI you are a covered entity who must comply with the Health Insurance Portability and Accountability Act, §§ 164.308, 164.310, 164.312, 164.314, and 164.316. /p> /li> li> h3>HITRUST/h3> p> The HITRUST Common Security Framework adds detailed, prescriptive controls to a modified ISO 27001 framework to provide a comprehensive and flexible approach to compliance with ISO, EU GDPR, NIST, and PCI. /p> /li> li> h3>NIST Cybersecurity Framework (NIST CSF)/h3> p> The NIST Cybersecurity Framework is a generic and vendor-neutral security management program scaffold with five high-level components: Identify, Protect, Detect, Respond, and Recover. /p> /li> li> h3>NIST SP 800-53/h3> p> NIST Special Publication 800-53 describes a Risk Management Framework for security control selection over 17 areas including access control, incident response, business continuity, and disaster recovery. /p> /li> li> h3>ISO/IEC 27001:2013/h3> p> ISO 27001 is an international standard for organizing security controls into a structured Information Security Management System (ISMS). Even small organizations may become certified in compliance with this standard, which can be used to assure customers that you take the privacy and security of their information seriously. /p> /li> li> h3>PCI DSS/h3> p> If you process credit card data, you may be contracturally required to comply with the Payment Card Industry (PCI) Data Specification Standard (DSS). The PCI DSS is a highly-specific, prescriptive standard for protecting cardholders, financial institutions, and processors. /p> /li> /ul> /div> /section> section classsection idrisk-management itemscope itemtypehttps://schema.org/Service> div classcontainer> div classflex flex-jc-c flex-d-r section-inner-container> div classflex flex-ai-c flex-jc-c> div classtext> h2 itempropserviceType>Risk Management/h2> p itempropdescription> We consult on the quantitative analysis of risk using Bayesian statistics and other actuarial methods, and creating and maintaining an effective risk management program, especially for small and medium sized businesses. /p> /div> /div> img classsection-img srclib/img/road_risk.jpg altRoad with fire implying risk with an overlay graph> /div> /div> /section> section classsection idcybersecurity itemscope itemtypehttps://schema.org/Service> div classcontainer> div classflex flex-jc-c section-inner-container> div classflex flex-ai-c flex-jc-c> div classtext> h2 itempropserviceType>Cybersecurity/h2> p itempropdescription> We consult on the discovery and identification of threats and vulnerabilities, implementation of preventative and detective controls, security engineering and operations, incident response, business continuity, and business recovery after an incident. /p> /div> /div> img classsection-img srclib/img/computer_security.jpg altLaptop partially closed with blue low lighting> /div> /div> /section> section classsection idgeneral-it> div classcontainer> div classflex flex-jc-c flex-d-r section-inner-container> div classflex flex-ai-c flex-jc-c flex-d-r> div classtext> h2>IT Services/h2> p> We implement, troubleshoot, and repair information technology infrastructure components with security as a primary focus, including desktops, servers, networking, and cloud infrastructure. /p> /div> /div> img altPeople in an office classsection-img srclib/img/people_in_office_it.jpg> /div> /div> /section> section classsection section-cta> img srclib/img/empty_office.jpg altA clean bright office space classhero-bg> div classeffect-squares> div>/div>div>/div>div>/div>div>/div> div>/div>div>/div>div>/div>div>/div> div>/div>div>/div>div>/div>div>/div> /div> div classcontainer container-sm> h2> Compliance, risk management, br>cybersecurity & general IT br>services made easy. /h2> p> 0x21 Consulting can help you save money by securing your trade secrets and assets from theft and malicious use, by complying with law, regulation, or contract before you get audited or assessed, and by engineering IT systems and processes securely by default. /p> p classcta> strong>Reach out today for a free consultation./strong> br>br> a hrefhttps://calendly.com/0x21 contentSchedule a Meeting classcta-btn> Schedule a Meeting /a> a hreftel:2622754030 itemproptelephone content+12622754030 classcta-btn> (262) 275‑4030 /a> /p> /div> /section> /div> footer> div classcontainer> div classflex flex-jc-sb> div classfooter-col-1> div classflex> div> a href#top classbrand> img srclib/img/0x21_consulting_reverse.png alt0x21 Consulting logo> /a> /div> div> menu> li>a href#compliance>Compliance/a>/li> li>a href#risk-management>Risk Management/a>/li> li>a href#cybersecurity>Cybersecurity/a>/li> li>a href#general-it>IT Services/a>/li> /menu> /div> /div> /div> div classfooter-col-2> h3>Our Mission/h3> p> Enabling small businesses like yours to reduce the risk of financial loss due to failure or compromise of information assets, to make informed IT purchasing decisions, and to comply with all relevant laws, regulations, and contractural obligations with regard to the handling and storing of sensitive data. /p> div classflex flex-ai-c> !-- a target_blank hrefhttps://www.bbb.org/us/wi/madison/profile/information-technology-services/0x21-consulting-inc-0694-1000018581> img classbbb-logo srclib/img/bbb-logo.png altBetter Business Bureau logo> /a> --> img classms-logo srclib/img/microsoft-certified-partner-logo.png altMicrosoft Partner logo titleMicrosoft Partner ID 6173371> /div> /div> div classfooter-col-3> div classflex flex-ai-fs> img classbio-img srclib/img/micah-henning.jpg altPhotograph of Micah Henning, Principal Engineer> div> h3> Micah Henning a target_blank hrefhttps://linkedin.com/in/micahhenning classsocial-icon> svg xmlnshttp://www.w3.org/2000/svg width19 height19 viewBox0 0 24 24> title>LinkedIn/title> path fill#3082af dM19 0h-14c-2.761 0-5 2.239-5 5v14c0 2.761 2.239 5 5 5h14c2.762 0 5-2.239 5-5v-14c0-2.761-2.238-5-5-5zm-11 19h-3v-11h3v11zm-1.5-12.268c-.966 0-1.75-.79-1.75-1.764s.784-1.764 1.75-1.764 1.75.79 1.75 1.764-.783 1.764-1.75 1.764zm13.5 12.268h-3v-5.604c0-3.368-4-3.113-4 0v5.604h-3v-11h3v1.765c1.396-2.586 7-2.777 7 2.476v6.759z > /svg> /a> /h3> span classtext-small>Principal Engineer/span> p> More than span classexperience>/span> years in cybersecurity & risk management with 17 active industry certifications, including CISSP. /p> br> /div> /div> div> h3>Contact Us/h3> ul> li> i classmaterial-icons>email/i> a hrefmailto:support@0x21.consulting>support@0x21.consulting/a> /li> li> i classmaterial-icons>phone/i> a hreftel:2622754030 itemproptelephone content+12622754030> (262) 275‑4030 /a> /li> /ul> /div> /div> /div> div classbottom> p classcopy> © span classyear>/span> 0x21 Consulting, Inc. All rights reserved. a hrefhttps://ghosthost.app target_blank>Hosted on Ghost Host/a>. /p> section classsocial> a target_blank hrefhttps://www.linkedin.com/company/0x21-consulting/ classsocial-icon> svg xmlnshttp://www.w3.org/2000/svg width19 height19 viewBox0 0 24 24> title>LinkedIn/title> path fill#828b94 dM19 0h-14c-2.761 0-5 2.239-5 5v14c0 2.761 2.239 5 5 5h14c2.762 0 5-2.239 5-5v-14c0-2.761-2.238-5-5-5zm-11 19h-3v-11h3v11zm-1.5-12.268c-.966 0-1.75-.79-1.75-1.764s.784-1.764 1.75-1.764 1.75.79 1.75 1.764-.783 1.764-1.75 1.764zm13.5 12.268h-3v-5.604c0-3.368-4-3.113-4 0v5.604h-3v-11h3v1.765c1.396-2.586 7-2.777 7 2.476v6.759z > /svg> /a> a target_blank hrefhttps://github.com/0x21-consulting classsocial-icon> svg xmlnshttp://www.w3.org/2000/svg width19 height19 viewBox0 0 98 96> title>0x21 Consulting/title> path fill#828b94 fill-ruleevenodd clip-ruleevenodd dM48.854 0C21.839 0 0 22 0 49.217c0 21.756 13.993 40.172 33.405 46.69 2.427.49 3.316-1.059 3.316-2.362 0-1.141-.08-5.052-.08-9.127-13.59 2.934-16.42-5.867-16.42-5.867-2.184-5.704-5.42-7.17-5.42-7.17-4.448-3.015.324-3.015.324-3.015 4.934.326 7.523 5.052 7.523 5.052 4.367 7.496 11.404 5.378 14.235 4.074.404-3.178 1.699-5.378 3.074-6.6-10.839-1.141-22.243-5.378-22.243-24.283 0-5.378 1.94-9.778 5.014-13.2-.485-1.222-2.184-6.275.486-13.038 0 0 4.125-1.304 13.426 5.052a46.97 46.97 0 0 1 12.214-1.63c4.125 0 8.33.571 12.213 1.63 9.302-6.356 13.427-5.052 13.427-5.052 2.67 6.763.97 11.816.485 13.038 3.155 3.422 5.015 7.822 5.015 13.2 0 18.905-11.404 23.06-22.324 24.283 1.78 1.548 3.316 4.481 3.316 9.126 0 6.6-.08 11.897-.08 13.526 0 1.304.89 2.853 3.316 2.364 19.412-6.52 33.405-24.935 33.405-46.691C97.707 22 75.788 0 48.854 0z > /svg> /a> /section> /div> /div> /footer> /main> script srclib/modernizr-css_custom.js>/script> script srclib/smoothscroll.js>/script> script srclib/script.js>/script> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]