Help
RSS
API
Feed
Maltego
Contact
Domain > cgnn.ru
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2026-01-17
37.140.192.188
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginxDate: Sat, 28 Dec 2024 19:11:20 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveLocation: https://cgnn.ru:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginxDate: Sat, 28 Dec 2024 19:11:21 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveVary: Accept-EncodingX-Powered-By: PHP/5.6.36Link: h !DOCTYPE html>!--if lt IE 7 >html classie ie6 langru> !endif-->!--if IE 7 >html classie ie7 langru> !endif-->!--if IE 8 >html classie ie8 langru> !endif-->!--if (gte IE 9)|!(IE)>!-->html langru> !--!endif-->head>meta charsetUTF-8 />title>МБУ "НИЖЕГОРОДГРАЖДАНПРОЕКТ" | Ещё один сайт на WordPress/title>link relpingback hrefhttps://cgnn.ru/xmlrpc.php />link reldns-prefetch href//api-maps.yandex.ru />link reldns-prefetch href//s.w.org />link relalternate typeapplication/rss+xml titleМБУ "НИЖЕГОРОДГРАЖДАНПРОЕКТ" » Лента hrefhttps://cgnn.ru/feed/ />link relalternate typeapplication/rss+xml titleМБУ "НИЖЕГОРОДГРАЖДАНПРОЕКТ" » Лента комментариев hrefhttps://cgnn.ru/comments/feed/ /> script typetext/javascript> window._wpemojiSettings {baseUrl:https://s.w.org/images/core/emoji/13.0.0/72x72/,ext:.png,svgUrl:https://s.w.org/images/core/emoji/13.0.0/svg/,svgExt:.svg,source:{concatemoji:https://cgnn.ru/wp-includes/js/wp-emoji-release.min.js?ver5.5.14}}; !function(e,a,t){var n,r,o,ia.createElement(canvas),pi.getContext&&i.getContext(2d);function s(e,t){var aString.fromCharCode;p.clearRect(0,0,i.width,i.height),p.fillText(a.apply(this,e),0,0);ei.toDataURL();return p.clearRect(0,0,i.width,i.height),p.fillText(a.apply(this,t),0,0),ei.toDataURL()}function c(e){var ta.createElement(script);t.srce,t.defert.typetext/javascript,a.getElementsByTagName(head)0.appendChild(t)}for(oArray(flag,emoji),t.supports{everything:!0,everythingExceptFlag:!0},r0;ro.length;r++)t.supportsorfunction(e){if(!p||!p.fillText)return!1;switch(p.textBaselinetop,p.font600 32px Arial,e){caseflag:return s(127987,65039,8205,9895,65039,127987,65039,8203,9895,65039)?!1:!s(55356,56826,55356,56819,55356,56826,8203,55356,56819)&&!s(55356,57332,56128,56423,56128,56418,56128,56421,56128,56430,56128,56423,56128,56447,55356,57332,8203,56128,56423,8203,56128,56418,8203,56128,56421,8203,56128,56430,8203,56128,56423,8203
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]