Help
RSS
API
Feed
Maltego
Contact
Domain > fusion.sparktsl.net
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-07-12
18.64.247.76
(
ClassC
)
2025-11-13
3.175.34.23
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Thu, 13 Nov 2025 06:43:28 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://fusion.sparktsl.net/X-Cache: Redirect from cloudfrontVia: 1.1 8f42534fa1cba6cc97a23ecd9e54c040.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P3X-Amz-Cf-Id: H9FG_RL_TH-AaDBeuayd7r8fQmHPopwG6VC_JdKbHuOZFfcBlA37cAX-XSS-Protection: 1; modeblockX-Frame-Options: SAMEORIGINReferrer-Policy: strict-origin-when-cross-originX-Content-Type-Options: nosniffVary: Origin html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 3957Connection: keep-aliveDate: Thu, 13 Nov 2025 06:43:30 GMTLast-Modified: Fri, 07 Nov 2025 08:12:42 GMTETag: 8aac5796e7c325c6de16163084030da8x-amz-server-side-encryption: AES256Accept-Ranges: bytesServer: AmazonS3X-Cache: Miss from cloudfrontVia: 1.1 dd936a86bc7ee81fb9cfdade266a1eb0.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P3X-Amz-Cf-Id: ksAOjK9-zBZ2A5paJeS9agi9TVDLYKdJ3Z25Izgtoz8Nwb1istrsPAX-XSS-Protection: 1; modeblockX-Frame-Options: SAMEORIGINReferrer-Policy: strict-origin-when-cross-originX-Content-Type-Options: nosniffStrict-Transport-Security: max-age31536000Vary: Origin !DOCTYPE html>html langen>head> meta charsetutf-8 /> meta namerobots contentnoindex> meta nameviewport contentwidthdevice-width, initial-scale1.0, user-scalableyes /> title>SPARK® Fusion Web/title> base href/ /> link relpreload href_content/SPARK.Fusion.Web.Razor/fonts/Roboto/Roboto-Regular.ttf asfont typefont/ttf crossorigin /> link relpreload href_content/SPARK.Fusion.Web.Razor/fonts/Roboto/Roboto-Medium.ttf asfont typefont/ttf crossorigin /> link relpreload href_content/SPARK.Fusion.Web.Razor/fonts/Roboto/Roboto-Bold.ttf asfont typefont/ttf crossorigin /> link relpreload href_content/SPARK.Fusion.Web.Razor/fonts/Roboto/Roboto-Black.ttf asfont typefont/ttf crossorigin /> link relstylesheet href_content/SPARK.Fusion.Web.Razor/css/app.css /> link hrefSPARK.Fusion.Web.Client.Standalone.styles.css relstylesheet /> link relicon typeimage/png hreffavicon.ico /> script typemodule src_content/SPARK.Fusion.Web.Razor/js/libs/media-chrome/4.6.0/dist/all.js>/script>/head>body> div idapp> div classloading-progress-container p-5> img altSPARK Fusion Logo src_content/SPARK.Fusion.Web.Razor/images/spark-fusion-logo-white.png/> div classloading-progress-text fw-bold mt-4>Connecting you.../div> div classmy-auto mt-3> div classspinner-grow stylewidth: 3rem; height: 3rem; background: radial-gradient(circle, transparent 39%, #1ebcc5 71%); rolestatus> span classvisually-hidden>Connecting you.../span> /div> /div> /div> /div> div idblazor-error-ui> An unhandled error has occurred. a href classreload>Reload/a> a classdismiss>🗙/a> /div> script src_content/SPARK.Fusion.Web.Razor/js/app.js?v0.46.0>/script> script src_framework/blazor.webassembly.js autostartfalse>/script> script typemodule> import { BrotliDecode } from ./decode.min.js; Blazor.start({ loadBootResource: function (type, name, defaultUri, integrity) { if (type ! dotnetjs && location.hostname ! localhost && type ! configuration) { return (async function () { const response await fetch(defaultUri + .br, { cache: no-cache }); if (!response.ok) { throw new Error(response.statusText); } const originalResponseBuffer await response.arrayBuffer(); const originalResponseArray new Int8Array(originalResponseBuffer); const decompressedResponseArray BrotliDecode(originalResponseArray); const contentType type dotnetwasm ? application/wasm : application/octet-stream; return new Response(decompressedResponseArray, { headers: { content-type: contentType } }); })(); } } }); /script> script src_content/SPARK.Fusion.Web.Razor/js/libs/popper/2.11.8/popper.min.js>/script> script src_content/SPARK.Fusion.Web.Razor/js/libs/bootstrap/5.3.3/bootstrap.min.js>/script> script src_content/SPARK.Fusion.Web.Razor/js/libs/hls/1.5.18/hls.min.js>/script> script src_content/SPARK.Fusion.Web.Razor/js/custom/fingerprint.js>/script> script srchttps://acrobatservices.adobe.com/view-sdk/viewer.js>/script> script>window.getJsDateTime () > { const now new Date(); now.setTime( now.getTime() - new Date().getTimezoneOffset()*60*1000 ); return now; };/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]