Help
RSS
API
Feed
Maltego
Contact
Domain > shriramcodenamesuperstar.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-06-29
3.7.154.3
(
ClassC
)
2025-12-25
13.235.212.194
(
ClassC
)
2026-01-15
13.202.68.203
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Thu, 25 Dec 2025 05:33:59 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://shriramcodenamesuperstar.com:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Thu, 25 Dec 2025 05:34:00 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveSet-Cookie: AWSALBm+NC6ycMxbB+5qBbic72OOjBrn2pizCaIGpmsX9qIh//TwQ html langen>head> meta charsetUTF-8> meta nameviewport contentwidthdevice-width, initial-scale1.0> title>Shriram Codename Superstar | 2 & 3 BHK in Undri/title> meta namedescription contentLooking for premium homes in Pune? Check out Shriram Codename Superstar, Undri! It has spacious 2 & 3 BHK apartments with modern amenities & prime connectivity /> link relicon href./assets/images/favicon_0.ico typeimage/vnd.microsoft.icon /> !-- Preload --> link relpreload asimage href./assets/images/banner/2025/10/27/superstar-desktop-banner-updated.webp> !-- Fonts --> link relstylesheet href./assets/fonts/ivyOra/font.css> link relstylesheet href./assets/fonts/quincho/font.css> link relpreconnect hrefhttps://fonts.googleapis.com> link relpreconnect hrefhttps://fonts.gstatic.com crossorigin> link relstylesheet hrefhttps://fonts.googleapis.com/css2?familyLato:ital,wght@0,300;0,400;0,700;0,900;1,400;1,700;1,900&displayswap> link relstylesheet hrefhttps://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.4.0/css/all.min.css integritysha512-iecdLmaskl7CVkqkXNQ/ZH/XLlvWZOJyj7Yy7tcenmpD1ypASozpmT/E0iPtmFIB46ZmdtAc9eNBvH0H/ZpiBw crossoriginanonymous referrerpolicyno-referrer /> !-- Stylesheets --> link relstylesheet hrefassets/css/magnify.css /> link relstylesheet hrefassets/css/ohsnap.css /> link relstylesheet hrefassets/css/intlTelInput.css /> link relstylesheet hrefassets/css/magnific-popup.css /> link relstylesheet hrefhttps://cdnjs.cloudflare.com/ajax/libs/OwlCarousel2/2.3.4/assets/owl.carousel.min.css /> script srchttps://cdn.jsdelivr.net/npm/@tailwindcss/browser@4>/script> link relstylesheet href./assets/css/style.css> !-- Google Tag Manager --> script> (function(w, d, s, l, i) { wl wl || ; wl.push({ gtm.start: new Date().getTime(), event: gtm.js }); var f d.getElementsByTagName(s)0, j d.createElement(s), dl l ! da
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]