Help
RSS
API
Feed
Maltego
Contact
Domain > ieva.tech
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-07-24
52.6.141.157
(
ClassC
)
2025-11-27
54.175.24.140
(
ClassC
)
2026-03-04
32.192.62.102
(
ClassC
)
Port 80
HTTP/1.1 503 Service Temporarily UnavailableServer: awselb/2.0Date: Thu, 27 Nov 2025 11:11:58 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-alive html>head>title>503 Service Temporarily Unavailable/title>/head>body>center>h1>503 Service Temporarily Unavailable/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Thu, 27 Nov 2025 11:11:59 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveServer: nginx/1.22.1Vary: Accept-EncodingX-Powered-By: PHP/8.2.27 !DOCTYPE html>html langen> head> meta charsetutf-8> meta nameviewport contentwidthdevice-width, initial-scale1> meta propertyog:title contentInstant Facebook Posts — No Writing Needed /> meta propertyog:description contentConnect your page → Get your first AI-crafted post with image in under a minute. Free demo today. /> meta propertyog:image contenthttps://ieva-bucket.s3.us-east-1.amazonaws.com/artworks/ieva-preview-last.png /> meta propertyog:url contenthttps://demo.ieva.tech /> meta propertyog:type contentwebsite /> meta propertyfb:app_id content1055796622552313 /> title inertia>IEVA/title> !-- Fonts --> !-- Preload the font CSS to start downloading early --> link relpreload hrefhttps://fonts.bunny.net/css?familyfigtree:400,500,600&displayswap asstyle onloadthis.onloadnull;this.relstylesheet> !-- Fallback for browsers that dont support preload --> noscript>link relstylesheet hrefhttps://fonts.bunny.net/css?familyfigtree:400,500,600&displayswap>/noscript> !-- Optional: Preconnect to speed up the font file downloads --> link relpreconnect hrefhttps://fonts.bunny.net crossorigin> !-- Dark mode initial script --> script> if (localStorage.getItem(theme) dark) { document.documentElement.classList.add(dark); } /script> !-- Scripts --> script typetext/javascript>const Ziggy{url:https://ieva.tech,port:null,defaults:{},routes:{sanctum.csrf-cookie:{uri:sanctum/csrf-cookie,methods:GET,HEAD},api.login.default:{uri:api/login-default,methods:POST},prospects.register:{uri:api/prospects,methods:POST},prospects.show:{uri:api/prospects/{prospectId},methods:GET,HEAD,parameters:prospectId},prospects.update-activity:{uri:api/prospects/{prospectId}/activity,methods:PUT,parameters:prospectId},prospects.convert:{uri:api/prospects/{prospectId}/convert,methods:POST,parameters:prospectId},prospects.cleanup:{uri:api/prospects/cleanup,metho
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]