Help
RSS
API
Feed
Maltego
Contact
Domain > app.qivia.fr
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-08-18
3.162.103.27
(
ClassC
)
2025-08-18
3.162.103.81
(
ClassC
)
2025-08-18
3.162.103.85
(
ClassC
)
2026-01-20
3.169.173.112
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Tue, 20 Jan 2026 21:47:32 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://app.qivia.fr/X-Cache: Redirect from cloudfrontVia: 1.1 c5e1a6561d8dc3977e11160718fc75e8.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P4Alt-Svc: h3:443; ma86400X-Amz-Cf-Id: _MGU748_Er5biwNBo9wJ8buYaMcBtqZd_dLMedtpdnliiZXwWVYCVg html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 2228Connection: keep-aliveDate: Tue, 20 Jan 2026 21:47:34 GMTLast-Modified: Mon, 19 Jan 2026 10:43:22 GMTETag: 75a08f96a387e96c4c392d995dc704bex-amz-server-side-encryption: AES256Accept-Ranges: bytesServer: AmazonS3X-Cache: Miss from cloudfrontVia: 1.1 e765e4220a4552156eaeff06c1304e0c.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P4Alt-Svc: h3:443; ma86400X-Amz-Cf-Id: YHvF9oO-H9etZp8T2U-D2nCIk-rEP0Hi9sT_anr2wMST7cOEXzdEMQ !DOCTYPE html>html translateno> head> meta charsetUTF-8 /> link relicon typeimage/svg+xml href/qiviaLogoSquare.svg /> meta nameviewport contentwidthdevice-width, initial-scale1 /> meta nametheme-color content#000000 /> !-- Leaflet --> link relstylesheet hrefhttps://unpkg.com/leaflet@1.9.4/dist/leaflet.css /> script srchttps://unpkg.com/leaflet@1.9.4/dist/leaflet.js>/script> !-- Google Fonts --> !-- link relstylesheet hrefhttps://fonts.googleapis.com/css?familyMaSuperFont:400,500,600,700 /> --> script typetext/javascript> window.heapwindow.heap||,heap.loadfunction(e,t){window.heap.appide,window.heap.configtt||{};var rdocument.createElement(script);r.typetext/javascript,r.async!0,r.srchttps://cdn.heapanalytics.com/js/heap-+e+.js;var adocument.getElementsByTagName(script)0;a.parentNode.insertBefore(r,a);for(var nfunction(e){return function(){heap.push(e.concat(Array.prototype.slice.call(arguments,0)))}},paddEventProperties,addUserProperties,clearEventProperties,identify,resetIdentity,removeEventProperty,setEventProperties,track,unsetEventProperty,o0;op.length;o++)heappon(po)}; heap.load(2000068788); /script> meta nameviewport contentwidthdevice-width, initial-scale1.0 /> title>Qivia App/title> script typemodule crossorigin src/assets/index-BVnEEQAz.js>/script> link relstylesheet crossorigin href/assets/index-DYTAsN1N.css> /head> style> @font-face { font-family: ESRebondGrotesque; src: url(/font_es_rebond_grotesque/ttf/ESRebondGrotesque-Medium.ttf) format(truetype), url(/font_es_rebond_grotesque/ttf/ESRebondGrotesque-Regular.ttf) format(truetype), url(/font_es_rebond_grotesque/otf/ESRebondGrotesque-Medium.otf) format(opentype), url(/font_es_rebond_grotesque/otf/ESRebondGrotesque-Regular.otf) format(opentype); font-weight: 500; font-style: normal; font-display: swap; } body { font-family: ESRebondGrotesque, sans-serif; } /style> body> div idroot>/div> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]