Help
RSS
API
Feed
Maltego
Contact
Domain > gamma.studio.search.a2z.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2022-01-29
65.8.228.29
(
ClassC
)
2022-01-29
65.8.228.59
(
ClassC
)
2026-01-10
3.163.24.65
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Sat, 10 Jan 2026 17:57:39 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://gamma.studio.search.a2z.com/X-Cache: Redirect from cloudfrontVia: 1.1 5b69cd230a06f482da15abd9c53bb694.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P2X-Amz-Cf-Id: Qq2XdsNr9uS-yfSf_I4jxbseIDJ_hbUOIGj6Ljf9bzY9vuXa57REIA html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 403 ForbiddenContent-Type: text/html; charsetutf-8Content-Length: 8069Connection: keep-aliveDate: Sat, 10 Jan 2026 04:15:23 GMTLast-Modified: Thu, 08 Jan 2026 09:24:25 GMTETag: 3deb52ac2be60be98582c0dec6f209cbx-amz-server-side-encryption: AES256x-amz-version-id: j8vMcZmXLI1P5CLhcIOFFlfCvFC272aAAccept-Ranges: bytesServer: AmazonS3X-Cache: Error from cloudfrontVia: 1.1 f9cbfbc3568832d017c09dbd4649932c.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P2X-Amz-Cf-Id: hfI_QWrR_vrsCnmpNYcN8kP_rF6AfC9j4puAi5Vzb5wBoO27Ls-2IgAge: 49337 !DOCTYPE html>html> head> script typetext/javascript> function getParameterByName(name, url) { if (!url) url window.location.href; name name.replace(/\\/g, \\$&); var regex new RegExp(?& + name + ((^*)|&|#|$)), results regex.exec(url); if (!results) return null; if (!results2) return ; return decodeURIComponent(results2.replace(/\+/g, )); } function getValidURL(url) { try { return new URL(url); } catch (e) { return null; } }/*! * JavaScript Cookie v2.1.4 * https://github.com/js-cookie/js-cookie * * Copyright 2006, 2015 Klaus Hartl & Fagner Brack * Released under the MIT license */;(function (factory) { var registeredInModuleLoader false; if (typeof define function && define.amd) { define(factory); registeredInModuleLoader true; } if (typeof exports object) { module.exports factory(); registeredInModuleLoader true; } if (!registeredInModuleLoader) { var OldCookies window.Cookies; var api window.Cookies factory(); api.noConflict function () { window.Cookies OldCookies; return api; }; }}(function () { function extend () { var i 0; var result {}; for (; i arguments.length; i++) { var attributes arguments i ; for (var key in attributes) { resultkey attributeskey; } } return result; } function init (converter) { function api (key, value, attributes) { var result; if (typeof document undefined) { return; } // Write if (arguments.length > 1) { attributes extend({ path: / }, api.defaults, attributes); if (typeof attributes.expires number) { var expires new Date(); expires.setMilliseconds(expires.getMilliseconds() + attributes.expires * 864e+5); attributes.expires expires; } // Were using expires because max-age is not supported by IE attributes.expires attributes.expires ? attributes.expires.toUTCString() : ; try { result JSON.stringify(value); if (/^\{\/.test(result)) { value result; } } catch (e) {} if (!converter.write) { value encodeURIComponent(String(value)) .replace(/%(23|24|26|2B|3A|3C|3E|3D|2F|3F|40|5B|5D|5E|60|7B|7D|7C)/g, decodeURIComponent); } else { value converter.write(value, key); } key encodeURIComponent(String(key)); key key.replace(/%(23|24|26|2B|5E|60|7C)/g, decodeURIComponent); key key.replace(/\(\)/g, escape); var stringifiedAttributes ; for (var attributeName in attributes) { if (!attributesattributeName) { continue; } stringifiedAttributes + ; + attributeName; if (attributesattributeName true) { continue; } stringifiedAttributes + + attributesattributeName; } return (document.cookie key + + value + stringifiedAttributes); } // Read if (!key) { result {}; } // To prevent the for loop in the first place assign an empty array // in case there are no cookies at all. Also prevents odd result when // calling get() var cookies document.cookie ? document.cookie.split(; ) : ; var rdecode /(%0-9A-Z{2})+/g; var i 0; for (; i cookies.length; i++) { var parts cookiesi.split(); var cookie parts.slice(1).join(); if (cookie.charAt(0) ) { cookie cookie.slice(1, -1); } try { var name parts0.replace(rdecode, decodeURIComponent); cookie converter.read ? converter.read(cookie, name) : converter(cookie, name) || cookie.replace(rdecode, decodeURIComponent); if (this.json) { try { cookie JSON.parse(cookie); } catch (e) {} } if (key name) { result cookie; break; } if (!key) { resultname cookie; } } catch (e) {} } return result; } api.set api; api.get function (key) { return api.call(api, key); }; api.getJSON function () { return api.apply({ json: true }, .slice.call(arguments)); }; api.defaults {}; api.remove function (key, attributes) { api(key, , extend(attributes, { expires: -1 })); }; api.withConverter init; return api; } return init(function () {});})); var policy getParameterByName(policy); var kpid getParameterByName(kpid); var exp getParameterByName(exp); var sig getParameterByName(sig); var encodedTargetUrl getParameterByName(encodedTargetUrl); var decodedTargetUrl encodedTargetUrl && decodeURIComponent(encodedTargetUrl); var validTargetURL getValidURL(decodedTargetUrl); var hash window.location.hash; if (policy && kpid && exp && sig) { var curr_origin window.location.origin; Cookies.set(CloudFront-Policy, policy, { secure: true, sameSite: None, expires: 1 }); Cookies.set(CloudFront-Key-Pair-Id, kpid, { secure: true, sameSite: None, expires: 1 }); Cookies.set(CloudFront-Expiration, exp, { secure: true, sameSite: None, expires: 1 }); Cookies.set(CloudFront-Signature, sig, { secure: true, sameSite: None, expires: 1 }); // Preserve that hash through to the original caller. if(validTargetURL && curr_origin validTargetURL.origin) { window.location.replace(decodedTargetUrl + hash); } else { window.location.replace(curr_origin + hash); } } else if (Cookies.get(CloudFront-Policy)){ //Nothing to do. } else { // Put the hash on the end of the cloudfront signer URL, not inside the encodedTargetUrl, so that it gets // preserved through the authentication process and doesnt impact midway or CFSigners url limits. var referrer window.location.href.split(#)0; var encodedUrl encodeURIComponent(referrer); window.location.replace(https://cloudfrontsigner.ninjas.security.a2z.com/sign?encodedTargetUrl + encodedUrl + hash); } /script> /head> body> p>Redirecting you for Auth/p> !-- This one should be a Bindle that doesnt exist, and triggers a 400 response from ECS. --> div styledisplay:none idbindlediv>amzn1.bindle.resource.6gmta4w237kkpzkmskoq/div> /body>/html>
Subdomains
Date
Domain
IP
blt.nlp.core.search.a2z.com
2024-09-08
18.161.6.53
beta.dev.blt.nlp.core.search.a2z.com
2025-10-30
3.169.173.9
beta.api.forth.search.a2z.com
2022-08-01
108.156.120.101
dashboard.scx-fos-baiji-prod-us-east-1-na.baiji.search.a2z.com
2024-12-27
35.168.37.130
dashboard.ast-baiji-prod-us-east-1-na-devdata.baiji.search.a2z.com
2025-06-01
52.21.104.54
dashboard.ast-baiji-dev-us-east-1-shared.baiji.search.a2z.com
2025-10-02
52.4.170.253
dashboard.scx-fos-baiji-dev-us-west-2-shared.baiji.search.a2z.com
2023-11-24
35.83.5.238
dashboard.ast-baiji-prod-us-east-1-na-prod.baiji.search.a2z.com
2024-06-09
54.162.212.130
dashboard.ast-baiji-prod-eu-west-1-eu-prod.baiji.search.a2z.com
2024-09-27
52.17.253.59
dashboard.ast-baiji-dev-us-east-1-cp.baiji.search.a2z.com
2024-06-09
52.72.20.23
wwdi2.dev-dashboard.ast-baiji-dev-us-east-1-cp.baiji.search.a2z.com
2025-10-20
44.198.47.225
dashboard.scx-fos-baiji-prod-eu-west-1-eu.baiji.search.a2z.com
2025-05-05
34.252.253.68
dashboard.scx-ptos-baiji-prod-eu-west-1-eu.baiji.search.a2z.com
2024-06-09
52.214.51.145
dashboard.search-non-asin-content-prod-eu.baiji.search.a2z.com
2025-03-05
18.203.176.74
gamma.studio.search.a2z.com
2026-01-10
3.163.24.65
beta.studio.search.a2z.com
2025-02-25
18.161.6.29
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]