Help
RSS
API
Feed
Maltego
Contact
Domain > www.cosmicspins.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-05-29
141.193.213.10
(
ClassC
)
2025-12-15
172.67.207.200
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Fri, 07 Mar 2025 14:00:10 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveLocation: https://www.cosmicspins.com/cf-cache-status: DYNAMICSe html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Fri, 07 Mar 2025 14:00:11 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveVary: Accept-EncodingVary: Accept-EncodingVary: Accept-EncodingVa !DOCTYPE html>html langen-US classno-js> head> script defer> /*! * jQuery JavaScript Library v1.7.2 * http://jquery.com/ * * Copyright 2011, John Resig * Dual licensed under the MIT or GPL Version 2 licenses. * http://jquery.org/license * * Includes Sizzle.js * http://sizzlejs.com/ * Copyright 2011, The Dojo Foundation * Released under the MIT, BSD, and GPL Licenses. * * Date: Wed Mar 21 12:46:34 2012 -0700 */(function( window, undefined ) {// Use the correct document accordingly with window argument (sandbox)var document window.document, navigator window.navigator, location window.location;var jQuery (function() {// Define a local copy of jQueryvar jQuery function( selector, context ) { // The jQuery object is actually just the init constructor enhanced return new jQuery.fn.init( selector, context, rootjQuery ); }, // Map over jQuery in case of overwrite _jQuery window.jQuery, // Map over the $ in case of overwrite _$ window.$, // A central reference to the root jQuery(document) rootjQuery, // A simple way to check for HTML strings or ID strings // Prioritize #id over tag> to avoid XSS via location.hash (#9521) quickExpr /^(?:^#*(wW+>)^>*$|#(w-*)$)/, // Check if a string has a non-whitespace character in it rnotwhite /S/, // Used for trimming whitespace trimLeft /^s+/, trimRight /s+$/, // Match a standalone tag rsingleTag /^(w+)s*/?>(?:/1>)?$/, // JSON RegExp rvalidchars /^,:{}s*$/, rvalidescape /\(?:\/bfnrt|u0-9a-fA-F{4})/g, rvalidtokens /^\ *|true|false|null|-?d+(?:.d*)?(?:eE+-?d+)?/g, rvalidbraces /(?:^|:|,)(?:s*)+/g, // Useragent RegExp rwebkit /(webkit) /(w.+)/, ropera /(opera)(?:.*version)? /(w.+)/, rmsie /(msie) (w.+)/, rmozilla /(mozilla)(?:.*? rv:(w.+))?/, // Matches dashed string for camelizing rdashAlpha /-(a-z|0-9)/ig, rmsPrefix /^-ms-/, // Used by jQuery.camelCase as callback to replace() fcamelCase function( all, letter ) { return ( letter + ).toUpperCase(); }, // Keep a UserAgent string for use with jQuery.browser userAgent navigator.userAgent, // For matching th
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]