Help
RSS
API
Feed
Maltego
Contact
Domain > admin-shiraoi-dev.u-stamp.click
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-03-20
18.64.183.51
(
ClassC
)
2026-01-05
3.163.24.75
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Mon, 05 Jan 2026 22:22:35 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://admin-shiraoi-dev.u-stamp.click/X-Cache: Redirect from cloudfrontVia: 1.1 8fa8de0101a760f7ceb25e90c3bcd252.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P2X-Amz-Cf-Id: quIzzwEB8rIz_r6V4b7cQKXa4hwtdllfJtql55L7r-_mjjKvNwlaRQ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 2625Connection: keep-aliveDate: Mon, 05 Jan 2026 22:22:36 GMTLast-Modified: Thu, 29 Jun 2023 08:25:18 GMTETag: 7b6057212fbf8b490509d9f2a7d7a032x-amz-server-side-encryption: AES256Accept-Ranges: bytesServer: AmazonS3X-Cache: Miss from cloudfrontVia: 1.1 1f941fcf288b6d0259a0f708c955afae.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P2X-Amz-Cf-Id: VvAx8rvK_rK_3KTbHhtrQSDkpFj8yxbqZdadw2rfswHJiVVgfyKfoA !DOCTYPE html>html langja> head> !-- Google Tag Manager --> script> ;(function(w, d, s, l, i) { wl wl || wl.push({ gtm.start: new Date().getTime(), event: gtm.js }) var f d.getElementsByTagName(s)0, j d.createElement(s), dl l ! dataLayer ? &l + l : j.async true j.src https://www.googletagmanager.com/gtm.js?id + i + dl f.parentNode.insertBefore(j, f) })(window, document, script, dataLayer, GTM-PWNZJL4) /script> !-- End Google Tag Manager --> meta charsetutf-8 /> meta http-equivX-UA-Compatible contentIEedge /> meta nameviewport contentwidthdevice-width,initial-scale1.0 /> meta http-equivCache-Control contentno-cache /> link relicon href/favicon.ico /> title> U-STAMP /title> link href/css/1.css?20235529171636 relprefetch>link href/css/2.css?20235529171636 relprefetch>link href/css/3.css?20235529171636 relprefetch>link href/css/4.css?20235529171636 relprefetch>link href/css/6.css?20235529171636 relprefetch>link href/css/7.css?20235529171636 relprefetch>link href/js/0.js?20235529171636 relprefetch>link href/js/1.js?20235529171636 relprefetch>link href/js/10.js?20235529171636 relprefetch>link href/js/11.js?20235529171636 relprefetch>link href/js/12.js?20235529171636 relprefetch>link href/js/13.js?20235529171636 relprefetch>link href/js/2.js?20235529171636 relprefetch>link href/js/3.js?20235529171636 relprefetch>link href/js/4.js?20235529171636 relprefetch>link href/js/5.js?20235529171636 relprefetch>link href/js/6.js?20235529171636 relprefetch>link href/js/7.js?20235529171636 relprefetch>link href/js/8.js?20235529171636 relprefetch>link href/js/9.js?20235529171636 relprefetch>link href/css/index.css?20235529171636 relpreload asstyle>link href/js/chunk-vendors.js?20235529171636 relpreload asscript>link href/js/index.js?20235529171636 relpreload asscript>link href/css/index.css?20235529171636 relstylesheet>/head> body> noscript> strong>ご利用のブラウザはJavaScriptをサポートしていません。/strong> /noscript> div idapp>/div> !-- built files will be auto injected --> script typetext/javascript src/js/chunk-vendors.js?20235529171636>/script>script typetext/javascript src/js/index.js?20235529171636>/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]