Help
RSS
API
Feed
Maltego
Contact
Domain > afbnjnxsit-1926820867-dgkgckakjn-t.codehs.me
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-04-16
18.160.249.75
(
ClassC
)
2025-06-15
3.165.160.75
(
ClassC
)
2025-07-16
3.175.34.38
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Sun, 15 Jun 2025 09:45:31 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://afbnjnxsit-1926820867-dgkgckakjn-t. html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveDate: Sun, 15 Jun 2025 09:45:31 GMTServer: ApacheVary: Host,Accept-EncodingContent-Security-Policy: !-- The console to the right simulates the terminal. Click Run Code to start. Complete the following commands in the following order to perform active recon. You will need to keep track of the data you collect each time on your handout. Click Run Code between each command. 1. Identify IP addresses: tracert www.codehs.com 2. Identify open ports: nmap -p a.a.a.b,c,d - Use the IP addresses from step 1 - Example command: nmap -p 1.1.1.1,2,3 3. Identify OS types: nmap -A a.a.a.b,c,d - Use the IP addresses from step 1 - Example command: nmap -p 1.1.1.1,2,3-->!DOCTYPE html>html> head> title>Command Center/title> link relstylesheet typetext/css hrefstyle.css> script typetext/javascript srcscript.js>/script> /head> body> p idcommand>/p> p iddetails1>/p> p iddetails2>/p> p iddetails3>/p> p iddetails4>/p> div idportList>/div> script> var code prompt(Karels-MacBook-Air:~ karel$: ); var ports Port 22: open, Port 80: open, Port 443: open, Port 646: open, Port 953: open, Port 8080: open; if(code nmap -p 70.70.19.5,9,15){ var command document.getElementById(command); command.innerHTML Karels-Mac-Book-Air:~ karel$: + code ; var details1 document.getElementById(details1); details1.innerHTML Starting Nmap 7.80 (https://nmap.org); var details2 document.getElementById(details2); details2.innerHTML Nmap scan report for localhost; var details3 document.getElementById(details3); details3.innerHTML Host is up; var details4 document.getElementById(details4); details4.innerHTML The 10000 ports scanned but not shown below are in state: closed; for(var i 0; i ports.l
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]