Help
RSS
API
Feed
Maltego
Contact
Domain > api.lust-station.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2026-02-08
34.90.45.68
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sun, 08 Feb 2026 18:50:56 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-aliveLocation: https://api.lust-station.com html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 08 Feb 2026 18:50:57 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveVary: Accept-EncodingCache-Control: no-cache, privateAccess-Control-Allow-Origin: https://hookupers.comAccess-Control-Allow-Methods: GET, POST, PUT, PATCH, DELETE, OPTIONSAccess-Control-Allow-Credentials: trueAccess-Control-Allow-Headers: Content-Type, Set-Cookie, X-Prev-Url, X-Referer, X-Csrf-Token, X-Xsrf-Token, X-Requested-WithAccess-Control-Expose-Headers: X-Total-CountAccess-Control-Max-Age: 86400Set-Cookie: hookupers_session620t2koGI6HPacVycpMDSz3t7OOrkxVockrXa2nj; expiresSun, 08 Feb 2026 19:50:57 GMT; Max-Age3600; path/; domain.hookupers.com; httponly; samesitelaxStrict-Transport-Security: max-age31536000; includeSubDomains !doctype html>html langen-US>head> title>Swagger UI: OAuth2 Redirect/title>/head>body>script> use strict; function run () { var oauth2 window.opener.swaggerUIRedirectOauth2; var sentState oauth2.state; var redirectUrl oauth2.redirectUrl; var isValid, qp, arr; if (/code|token|error/.test(window.location.hash)) { qp window.location.hash.substring(1).replace(?, &); } else { qp location.search.substring(1); } arr qp.split(&); arr.forEach(function (v,i,_arr) { _arri + v.replace(, :) + ;}); qp qp ? JSON.parse({ + arr.join() + }, function (key, value) { return key ? value : decodeURIComponent(value); } ) : {}; isValid qp.state sentState; if (( oauth2.auth.schema.get(flow) accessCode || oauth2.auth.schema.get(flow) authorizationCode || oauth2.auth.schema.get(flow) authorization_code ) && !oauth2.auth.code) { if (!isValid) { oauth2.errCb({ authId: oauth2.auth.name, source: auth, level: warning, message: Authorization may be unsafe, passed state was changed in server. The passed state wasnt returned from auth server. }); } if (qp.code) { delete oauth2.state; oauth2.auth.code qp.code; oauth2.callback({auth: oauth2.auth, redirectUrl: redirectUrl}); } else { let oauthErrorMsg; if (qp.error) { oauthErrorMsg +qp.error+: + (qp.error_description ? qp.error_description+ . : no accessCode received from the server. ) + (qp.error_uri ? More info: +qp.error_uri : ); } oauth2.errCb({ authId: oauth2.auth.name, source: auth, level: error, message: oauthErrorMsg || Authorization failed: no accessCode received from the server. }); } } else { oauth2.callback({auth: oauth2.auth, token: qp, isValid: isValid, redirectUrl: redirectUrl}); } window.close(); } if (document.readyState ! loading) { run(); } else { document.addEventListener(DOMContentLoaded, function () { run(); }); }/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]