Help
RSS
API
Feed
Maltego
Contact
Domain > admin-stage.quickreg.me
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2022-03-02
99.84.248.53
(
ClassC
)
2022-03-02
108.156.105.181
(
ClassC
)
2022-03-02
99.84.248.125
(
ClassC
)
2025-08-06
204.246.191.127
(
ClassC
)
2026-01-16
3.163.24.107
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Wed, 06 Aug 2025 14:24:44 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://admin-stage.quickreg.me/X-Cache: Re html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 2707Connection: keep-aliveDate: Wed, 06 Aug 2025 14:24:45 GMTLast-Modified: Tue, 29 Jul 2025 05:00:20 GMTETag: 00beebef43e6495443d33838a02b354dx-a !DOCTYPE html>html>head>base href/ >title>QuickRegMe/title>meta charsetutf-8>meta namedescription contentQuickRegMe admin web app>meta nameformat-detection contenttelephoneno>meta namemsapplication-tap-highlight contentno>meta nameviewport contentuser-scalableno,initial-scale1,maximum-scale1,minimum-scale1,widthdevice-width>link relicon typeimage/png sizes128x128 hreffavicon.ico>link relicon typeimage/png sizes96x96 hreffavicon.ico>link relicon typeimage/png sizes32x32 hreffavicon.ico>link relicon typeimage/png sizes16x16 hreffavicon.ico>link relicon typeimage/ico hrefhttps://d29epz9i6fkatd.cloudfront.net/quickreg-logo/favicon.svg>link hrefhttps://fonts.googleapis.com/css2?familySource+Sans+Pro:wght@400;700;900&displayswap relstylesheet typetext/css>script defer src/js/vendor.49a677b0.js>/script>script defer src/js/app.a4b86e5d.js>/script>link href/css/vendor.3bca907e.css relstylesheet>link href/css/app.a69b42bb.css relstylesheet>/head>body>div idq-app>/div>/body>script>const urlParams new URLSearchParams(window.location.search) const token urlParams?.get(token) if (token) { const decoded (token) > { const b64DecodeUnicode (str) > { return decodeURIComponent( atob(str).replace(/(.)/g, function (m, p) { let code p.charCodeAt(0).toString(16).toUpperCase() if (code.length 2) { code 0 + code } return % + code }) ) } const base64_url_decode (str) > { let output str.replace(/-/g, /)?.replace() switch (output.length % 4) { case 0: break case 2: output + break case 3: output + break default: throw Illegal base64url string! } try { return b64DecodeUnicode(output) } catch (err) { return atob(output) } } return JSON.parse(base64_url_decode(token.split(.)1)) } const loginEmail decoded(token).email console.log(loginEmail,loginEma
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]