Help
RSS
API
Feed
Maltego
Contact
Domain > quotationtool.synapseslab.cloud
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-11-24
18.195.205.151
(
ClassC
)
2024-12-26
18.195.31.60
(
ClassC
)
2025-02-08
3.123.89.186
(
ClassC
)
2025-02-11
18.195.187.177
(
ClassC
)
2025-07-13
135.236.25.105
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Sun, 24 Nov 2024 14:44:23 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://quotationtool.synapseslab.cloud:443 html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 24 Nov 2024 14:44:24 GMTContent-Type: text/htmlContent-Length: 1782Connection: keep-aliveServer: nginx/1.25.2Last-Modified: Mon, 02 Oct 2023 15:23:41 GMTETag: 651ae07d-6f6Acc !DOCTYPE html>html>head> base href/> meta charsetUTF-8> meta contentIEEdge http-equivX-UA-Compatible> meta namedescription contentQuote BlueGPS Framework.> !-- iOS meta tags & icons --> meta nameapple-mobile-web-app-capable contentyes> meta nameapple-mobile-web-app-status-bar-style contentblack> meta nameapple-mobile-web-app-title contentquotationtool_cli> link relapple-touch-icon hreficons/bluegps.ico> link relicon typeimage/x-icon hreficons/bluegps.ico/> link relstylesheet typetext/css hrefhttps://cdn.jsdelivr.net/npm/toastify-js/src/toastify.min.css> title>Quotation Tool/title> link relmanifest hrefmanifest.json> script srcapp.js defer>/script> script> // The value below is injected by flutter build, do not touch. var serviceWorkerVersion 444873382; /script> !-- This script adds the flutter initialization JS code --> script srcflutter.js defer>/script>/head>body> !-- This script installs service_worker.js to provide PWA functionality to application. For more information, see: https://developers.google.com/web/fundamentals/primers/service-workers --> script typetext/javascript srchttps://cdn.jsdelivr.net/npm/toastify-js>/script> script> window.addEventListener(load, function (ev) { // Download main.dart.js _flutter.loader.loadEntrypoint({ serviceWorker: { serviceWorkerVersion: serviceWorkerVersion, } }).then(function (engineInitializer) { return engineInitializer.initializeEngine(); }).then(function (appRunner) { return appRunner.runApp(); }); }); /script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]