Help
RSS
API
Feed
Maltego
Contact
Domain > apblockpage.poc.sam.securitysvcs.verizon.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-05-14
3.130.168.206
(
ClassC
)
2025-06-02
3.13.75.195
(
ClassC
)
2025-06-15
18.216.182.124
(
ClassC
)
Port 80
HTTP/1.1 200 OKDate: Wed, 14 May 2025 15:50:27 GMTContent-Type: text/htmlContent-Length: 1995Connection: keep-aliveserver: openrestylast-modified: Thu, 28 Dec 2023 16:03:36 GMTaccept-ranges: bytesset- !DOCTYPE html>html> head> link href./img/favicon.ico relshortcut icon/> title> Verizon - This site is blocked by the administrators security policy /title> meta charsetutf-8/> meta contentwidthdevice-width, initial-scale1.0, maximum-scale1.0 nameviewport/> link relstylesheet hrefhttps://maxcdn.bootstrapcdn.com/bootstrap/3.4.0/css/bootstrap.min.css> link href./css/styles.css relstylesheet typetext/css/> !-- Scripts --> script src/js/jquery.min.js>/script> !-- End of Scripts --> /head> body> div classcontainer> div classheader> div classheader-image-container> img classheader-image src./img/verizon-logo.svg altveirzon> /div> /div> div classcontent> div classmain-content> h2> img classwarning src./img/warning.svg altwarning> This site is blocked by the administrators security policy /h2> p classdescription> To access this site, the administrator will need to change the Verizon Business Internet Secure settings. /p> /div> /div> /div> script> $(document).ready(function () { var match document.cookie.split(; ).find(row > row.toString(Sam-Cookie)).split()1.split(::)0; var reportedUrl window.location.host; reportedUrl reportedUrl.replace(/^(www.)/, ); window.location.replace(https://apblockpage.poc.sam.securitysvcs.verizon.com/landing.html?domain$domain&token$token.replace($domain, reportedUrl).replace($token, match)); }) /script> /body>/html>
Port 443
HTTP/1.1 200 OKDate: Wed, 14 May 2025 15:50:27 GMTContent-Type: text/htmlContent-Length: 1995Connection: keep-aliveserver: openrestylast-modified: Thu, 28 Dec 2023 16:03:36 GMTaccept-ranges: bytesset- !DOCTYPE html>html> head> link href./img/favicon.ico relshortcut icon/> title> Verizon - This site is blocked by the administrators security policy /title> meta charsetutf-8/> meta contentwidthdevice-width, initial-scale1.0, maximum-scale1.0 nameviewport/> link relstylesheet hrefhttps://maxcdn.bootstrapcdn.com/bootstrap/3.4.0/css/bootstrap.min.css> link href./css/styles.css relstylesheet typetext/css/> !-- Scripts --> script src/js/jquery.min.js>/script> !-- End of Scripts --> /head> body> div classcontainer> div classheader> div classheader-image-container> img classheader-image src./img/verizon-logo.svg altveirzon> /div> /div> div classcontent> div classmain-content> h2> img classwarning src./img/warning.svg altwarning> This site is blocked by the administrators security policy /h2> p classdescription> To access this site, the administrator will need to change the Verizon Business Internet Secure settings. /p> /div> /div> /div> script> $(document).ready(function () { var match document.cookie.split(; ).find(row > row.toString(Sam-Cookie)).split()1.split(::)0; var reportedUrl window.location.host; reportedUrl reportedUrl.replace(/^(www.)/, ); window.location.replace(https://apblockpage.poc.sam.securitysvcs.verizon.com/landing.html?domain$domain&token$token.replace($domain, reportedUrl).replace($token, match)); }) /script> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]