Help
RSS
API
Feed
Maltego
Contact
Domain > aff.bigtaka.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2026-03-07
104.18.26.34
(
ClassC
)
Port 443
HTTP/1.1 200 OKDate: Sat, 07 Mar 2026 16:00:38 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveServer: cloudflareNel: {report_to:cf-nel,success_fraction:0.0,max_age:604800}Last-Modified: Thu, 11 Dec 2025 02:52:04 GMTset-cookie: __cf_bmgEnBipjHOjL2fKKLnaCashmuTGII.VH8Io1mOtGtRPg-1772899237.961691-1.0.1.1-i517IvI5y2NqjtwPgzAL6Rsfd80cXI68QP5v.XKdGcOHjHnDXt_6ZxhTrkC0QQUrKUF6Iuq3WkOUph9PZIKVbZqzESqJ_ESZMmq8_.sUj5mBjtHckwFzOXUGW345eSYO; HttpOnly; Secure; Path/; Domainbigtaka.com; ExpiresSat, 07 Mar 2026 16:30:38 GMTX-Frame-Options: SAMEORIGINReport-To: {group:cf-nel,max_age:604800,endpoints:{url:https://a.nel.cloudflare.com/report/v4?s7QjmkY69jo1Fl8w0HNwzy9yE%2FYeGgKxIZi9T8jfqoBpwcmr1eYTcucuE40GVwW%2BB0Oz4grI%2F9T%2F0tWZIHbF3jPiatkGQLpDIFQjWmN08Mg%3D%3D}}cf-cache-status: DYNAMICvary: accept-encodingCF-RAY: 9d8ad06d4dfb8864-PDXalt-svc: h3:443; ma86400 !DOCTYPE html>html langen>head> meta charsetutf-8/> meta http-equivX-UA-Compatible contentIEedge/> meta nameviewport contentwidthdevice-width,initial-scale1.0/> meta namerobots contentnoindex, nofollow> meta namegooglebot contentnoindex,nofollow> link relicon href/favicon.ico/> title>BACKOFFICE PORTAL/title> script srchttps://v3-group-bucket.s3-ap-southeast-1.amazonaws.com/js/pace.min.js typeapplication/javascript>/script> link relstylesheet hrefhttps://v3-group-bucket.s3-ap-southeast-1.amazonaws.com/css/flash.css/> link relstylesheet hrefhttps://fonts.googleapis.com/css?familyMaterial+Icons/>link href/0.js relprefetch>link href/1.js relprefetch>link href/10.js relprefetch>link href/11.js relprefetch>link href/12.js relprefetch>link href/13.js relprefetch>link href/14.js relprefetch>link href/15.js relprefetch>link href/16.js relprefetch>link href/17.js relprefetch>link href/18.js relprefetch>link href/19.js relprefetch>link href/2.js relprefetch>link href/20.js relprefetch>link href/21.js relprefetch>link href/22.js relprefetch>link href/23.js relprefetch>link href/24.js relprefetch>link href/25.js relprefetch>link href/26.js relprefetch>link href/27.js relprefetch>link href/28.js relprefetch>link href/29.js relprefetch>link href/3.js relprefetch>link href/30.js relprefetch>link href/31.js relprefetch>link href/32.js relprefetch>link href/33.js relprefetch>link href/34.js relprefetch>link href/35.js relprefetch>link href/36.js relprefetch>link href/37.js relprefetch>link href/38.js relprefetch>link href/39.js relprefetch>link href/4.js relprefetch>link href/40.js relprefetch>link href/41.js relprefetch>link href/42.js relprefetch>link href/43.js relprefetch>link href/44.js relprefetch>link href/45.js relprefetch>link href/46.js relprefetch>link href/47.js relprefetch>link href/48.js relprefetch>link href/49.js relprefetch>link href/5.js relprefetch>link href/50.js relprefetch>link href/51.js relprefetch>link href/52.js relprefetch>link href/53.js relprefetch>link href/54.js relprefetch>link href/55.js relprefetch>link href/56.js relprefetch>link href/57.js relprefetch>link href/58.js relprefetch>link href/59.js relprefetch>link href/6.js relprefetch>link href/60.js relprefetch>link href/61.js relprefetch>link href/62.js relprefetch>link href/63.js relprefetch>link href/64.js relprefetch>link href/65.js relprefetch>link href/66.js relprefetch>link href/67.js relprefetch>link href/68.js relprefetch>link href/69.js relprefetch>link href/7.js relprefetch>link href/8.js relprefetch>link href/9.js relprefetch>link href/app.js relpreload asscript>/head>body>noscript> strong>Were sorry but unified-backoffice doesnt work properly without JavaScript enabled. Please enable it to continue./strong>/noscript>div idapp>/div>!-- built files will be auto injected -->script typetext/javascript src/app.js>/script>/body>style> @font-face { font-family: koho; src: url(/font/KoHo-Regular.ttf) format(truetype); /* Safari, Android, iOS */ } @font-face { font-family: koho bold; src: url(/font/KoHo-SemiBold.ttf) format(truetype); /* Safari, Android, iOS */ } .v-application { font-family: koho, Microsoft YaHei, Helvetica Neue, Helvetica, Arial, sans-serif !important; } .v-application .display-4, .v-application .display-3, .v-application .display-2, .v-application .display-1, .v-application .headline, .v-application .title, .v-application .subtitle-1, .v-application .subtitle-2, .v-application .body-1, .v-application .body-2, .v-application .caption, .v-application .overline { font-family: shippori, Microsoft YaHei, Helvetica Neue, Helvetica, Arial, sans-serif !important; letter-spacing: 0px !important } .v-application .font-weight-bold { font-family: koho bold, Microsoft YaHei, Helvetica Neue, Helvetica, Arial, sans-serif !important; letter-spacing: 0px !important }/style>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]