Help
RSS
API
Feed
Maltego
Contact
Domain > acehoops.ca
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-11-19
18.64.155.127
(
ClassC
)
2025-03-27
204.246.191.44
(
ClassC
)
2025-05-06
204.246.191.46
(
ClassC
)
2026-03-06
3.169.173.120
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Thu, 27 Mar 2025 19:56:47 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://acehoops.ca/X-Cache: Redirect from html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/html; charsetutf-8Content-Length: 10919Connection: keep-aliveDate: Wed, 26 Mar 2025 16:00:23 GMTx-nextjs-cache: HITx-powered-by: Next.jsCache-Control: s-maxage3153600 !DOCTYPE html>html langen>head>meta charSetutf-8/>meta nameviewport contentwidthdevice-width, initial-scale1/>link relpreload asimage href/aceHoops.gif/>link relpreload asimage href/images/svg/right-arrow.svg/>link relpreload asimage href/images/svg/star.svg/>link relstylesheet href/_next/static/css/0337d2be2961c7c2.css data-precedencenext/>link relpreload asscript fetchPrioritylow href/_next/static/chunks/webpack-a78b4aef347e86d7.js/>script src/_next/static/chunks/fd9d1056-cff4949f0e0cb303.js async>/script>script src/_next/static/chunks/966-e2267fc4d972ff84.js async>/script>script src/_next/static/chunks/main-app-a25dbc2b254ce0d6.js async>/script>script src/_next/static/chunks/648-ce203f72757f2b6a.js async>/script>script src/_next/static/chunks/app/page-84b03fc6437271a8.js async>/script>script src/_next/static/chunks/bc9e92e6-cf4664c3e8264ca5.js async>/script>script src/_next/static/chunks/938157b5-b360d2e265ac9679.js async>/script>script src/_next/static/chunks/609-c7931071362a6c9e.js async>/script>script src/_next/static/chunks/882-fc05717c1f35091a.js async>/script>script src/_next/static/chunks/878-d68be8f938a67b47.js async>/script>script src/_next/static/chunks/644-37f8deff9869e88c.js async>/script>script src/_next/static/chunks/app/layout-a6e4b3c72261a6cb.js async>/script>link relicon href/fav.png/>link relpreconnect hrefhttps://fonts.googleapis.com/>link relpreconnect hrefhttps://fonts.gstatic.com crossorigin/>link hrefhttps://fonts.googleapis.com/css2?familyABeeZee:ital@0;1&familyInter:ital,opsz,wght@0,14..32,100..900;1,14..32,100..900&familyReddit+Sans:ital,wght@0,200..900;1,200..900&displayswap relstylesheet/>script src/_next/static/chunks/polyfills-42372ed130431b0a.js noModule>/script>/head>body classreddit bg-black text-white>div classToastify>/div>div>a href/>img altlogo loadinglazy width150 height150 decodingasync data-nimg1 classmx-auto py-5 stylecolor:transparent srcSet/_next/image?url%2Fimages%2Flogo.png&w256&q75 1x, /_next/image?url%2Fimages%2Flogo.png&w384&q75 2x src
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]