Help
RSS
API
Feed
Maltego
Contact
Domain > checkin.section-l.co
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-09-06
99.86.229.61
(
ClassC
)
2025-09-20
3.170.185.51
(
ClassC
)
2026-01-07
3.175.34.58
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Wed, 07 Jan 2026 22:56:15 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://checkin.section-l.co/X-Cache: Redirect from cloudfrontVia: 1.1 0f2e998c974188ba76236f3dadfba890.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P3X-Amz-Cf-Id: s-yAwcbragjua9bI3gqzeL_03y0ve34XuO7TYq6MYI22quf69bXZuQ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/html; charsetutf-8Content-Length: 2444Connection: keep-aliveDate: Wed, 07 Jan 2026 22:56:16 GMTLast-Modified: Wed, 07 Aug 2024 03:15:22 GMTETag: 834afd1dab0ab4ab0d7480e67459d5b8x-amz-server-side-encryption: AES256Cache-Control: no-cacheAccept-Ranges: bytesServer: AmazonS3X-Cache: Miss from cloudfrontVia: 1.1 6eef5cc48e8050472c6d6d9862d365dc.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P3X-Amz-Cf-Id: R6zIBqu7H3pnT-WYSmq7-RPkqD3U_LgbDB93VNfmfjYZI8ZSaGCnNg !doctype html>html lang> head> meta charsetutf-8 /> meta http-equivX-UA-Compatible contentIEedge /> meta nameviewport contentuser-scalableno,widthdevice-width,initial-scale1,maximum-scale1,viewport-fitcover /> meta nametheme-color content#f9f2ed /> title>Section L > Check-in/title> script typemodule crossorigin src/assets/index.js>/script> link relmodulepreload crossorigin href/assets/@vue.js> link relmodulepreload crossorigin href/assets/axios.js> link relmodulepreload crossorigin href/assets/vuex.js> link relmodulepreload crossorigin href/assets/@intlify.js> link relmodulepreload crossorigin href/assets/vue-i18n.js> link relmodulepreload crossorigin href/assets/vue-router.js> link relmodulepreload crossorigin href/assets/nprogress.js> link relmodulepreload crossorigin href/assets/base64-js.js> link relmodulepreload crossorigin href/assets/ieee754.js> link relmodulepreload crossorigin href/assets/buffer.js> link relmodulepreload crossorigin href/assets/lodash.js> link relmodulepreload crossorigin href/assets/@vuelidate.js> link relmodulepreload crossorigin href/assets/click-outside-vue3.js> link relmodulepreload crossorigin href/assets/@vueform.js> link relmodulepreload crossorigin href/assets/@sentry.js> link relmodulepreload crossorigin href/assets/@sentry-internal.js> link relmodulepreload crossorigin href/assets/@fortawesome.js> link relmodulepreload crossorigin href/assets/web-vitals.js> link relmodulepreload crossorigin href/assets/ua-parser-js.js> link relmodulepreload crossorigin href/assets/@grafana.js> link relstylesheet href/assets/@vueform.css> link relstylesheet href/assets/index.css> link relmanifest href/manifest.webmanifest>script idvite-plugin-pwa:register-sw src/registerSW.js>/script>/head> body styleoverflow: hidden; background-color: black> noscript> strong> Were sorry but Section L doesnt work properly without JavaScript enabled. Please enable it to continue. /strong> /noscript> div idapp classcontents>/div> !-- built files will be auto injected --> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]