Help
RSS
API
Feed
Maltego
Contact
Domain > odeme.dumansoft.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-03-30
217.18.85.52
(
ClassC
)
2026-02-06
213.238.191.148
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyConnection: Keep-AliveKeep-Alive: timeout5, max100Content-Type: text/htmlContent-Length: 795Date: Fri, 06 Feb 2026 11:12:22 GMTLocation: https://odeme.dumansoft.com/X-XSS-Protection: 1; modeblockX-Frame-Options: SAMEORIGINX-Content-Type-Options: nosniffReferrer-Policy: same-origin !DOCTYPE html>html styleheight:100%>head>meta nameviewport contentwidthdevice-width, initial-scale1, shrink-to-fitno />title> 301 Moved Permanently/title>style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}/style>/head>body stylecolor: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;>div styleheight:auto; min-height:100%; > div styletext-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;> h1 stylemargin:0; font-size:150px; line-height:150px; font-weight:bold;>301/h1>h2 stylemargin-top:20px;font-size: 30px;>Moved Permanently/h2>p>The document has been permanently moved./p>/div>/div>/body>/html>
Port 443
HTTP/1.1 200 OKConnection: Keep-AliveKeep-Alive: timeout5, max100set-cookie: PHPSESSID76f65cdbf7a0272c273ab6b1b1452984; path/; HttpOnly; secureExpires: Thu, 19 Nov 1981 08:52:00 GMTCache-Control: no-store, no-cache, must-revalidatePragma: no-cacheContent-Type: text/html; charsetUTF-8Content-Length: 4445Date: Fri, 06 Feb 2026 11:12:22 GMTX-XSS-Protection: 1; modeblockX-Frame-Options: SAMEORIGINX-Content-Type-Options: nosniffReferrer-Policy: same-origin !DOCTYPE html>html langtr>head> meta charsetUTF-8> meta nameviewport contentwidthdevice-width, initial-scale1.0, maximum-scale1.0, user-scalableno> title>DumanSoft Serbest Ödeme/title> link relstylesheet hrefhttps://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.5.1/css/all.min.css> link hrefhttps://fonts.googleapis.com/css2?familyInter:wght@400;500;600&displayswap relstylesheet> link relstylesheet hrefassets/css/style.css>/head>body> header classheader> div classlogo-area> img srclogo.png altLogo> /div> /header> div classmain-container> div classpayment-steps> div classstep active> div classstep-icon> i classfas fa-user>/i> /div> div classstep-text>Bilgi Girişi/div> /div> div classstep> div classstep-icon> i classfas fa-credit-card>/i> /div> div classstep-text>Ödeme/div> /div> div classstep> div classstep-icon> i classfas fa-check>/i> /div> div classstep-text>Onay/div> /div> /div> div classform-container> h2 classform-title>DumanSoft Serbest Ödeme/h2> div classform-description>Ödeme yapabilmek için, lütfen bilgilerinizi eksiksiz giriniz./div> div classamount-info> font colorblack>Minimum ödeme tutarı: 1.00 TL/font> /div> form methodpost action idpaymentForm> div classform-group> label forname>Ad Soyad/label> i classfas fa-user>/i> input typetext idname namename required placeholderAdınız Soyadınız autocompletename> /div> div classform-group> label foremail>E-posta Adresi/label> i classfas fa-envelope>/i> input typeemail idemail nameemail required placeholderornek@email.com autocompleteemail> /div> div classform-group> label forphone>Telefon Numarası/label> i classfas fa-phone>/i> input typetel idphone namephone required placeholder5XX XXX XX XX autocompletetel pattern0-9{10,11}> /div> div classform-group> label foramount>Ödeme Tutarı/label> i classfa-solid fa-turkish-lira-sign>/i> input typenumber idamount nameamount step0.01 min1.00 required placeholder0.00> /div> div classpayment-methods> label classpayment-method> input typeradio namepayment_method valuecard required> i classfas fa-credit-card>/i> div classpayment-method-title>Kredi Kartı Kartı ile Ödeme (seçiniz)/div> /label> /div> button typesubmit classsubmit-btn> i classfas fa-lock>/i> Güvenli Ödeme Yap /button> div classpayment-info> i classfas fa-shield-alt>/i> 256-bit SSL ile güvenli ödeme /div> /form> /div> /div> script> document.querySelectorAll(.payment-method).forEach(method > { method.addEventListener(click, function() { document.querySelectorAll(.payment-method).forEach(m > m.classList.remove(selected)); this.classList.add(selected); }); }); /script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]