Help
RSS
API
Feed
Maltego
Contact
Domain > www.hospicecalgary.ca
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2020-02-11
51.77.110.153
(
ClassC
)
2025-12-03
172.105.21.28
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sun, 26 Oct 2025 07:34:09 GMTServer: Apache/2.4.52 (Ubuntu)Location: https://www.hospicecalgary.caContent-Length: 324Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://www.hospicecalgary.ca>here/a>./p>hr>address>Apache/2.4.52 (Ubuntu) Server at www.hospicecalgary.ca Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 26 Oct 2025 07:34:09 GMTServer: Apache/2.4.52 (Ubuntu)Link: https://www.hospicecalgary.ca/wp-json/>; relhttps://api.w.org/Link: https://www.hospicecalgary.ca/wp-json/wp/v2/pa !DOCTYPE html>html langen-CA>head> meta charsetUTF-8 />meta http-equivX-UA-Compatible contentIEedge> link relpingback hrefhttps://www.hospicecalgary.ca/xmlrpc.php /> script typetext/javascript> document.documentElement.className js; /script> link relpreconnect hrefhttps://fonts.gstatic.com crossorigin />style idet-builder-googlefonts-cached-inline>/* Original: https://fonts.googleapis.com/css?familyOpen+Sans:300,regular,500,600,700,800,300italic,italic,500italic,600italic,700italic,800italic&subsetlatin,latin-ext&displayswap *//* User Agent: Mozilla/5.0 (Unknown; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) Safari/538.1 Daum/4.1 */@font-face {font-family: Open Sans;font-style: italic;font-weight: 300;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v44/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk5hkWV4exQ.ttf) format(truetype);}@font-face {font-family: Open Sans;font-style: italic;font-weight: 400;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v44/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk8ZkWV4exQ.ttf) format(truetype);}@font-face {font-family: Open Sans;font-style: italic;font-weight: 500;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v44/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0Rk_RkWV4exQ.ttf) format(truetype);}@font-face {font-family: Open Sans;font-style: italic;font-weight: 600;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v44/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0RkxhjWV4exQ.ttf) format(truetype);}@font-face {font-family: Open Sans;font-style: italic;font-weight: 700;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensans/v44/memQYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWq8tWZ0Pw86hd0RkyFjWV4exQ.ttf) format(truetype);}@font-face {font-family: Open Sans;font-style: italic;font-weight: 800;font-stretch: normal;font-display: swap;src: url(https://fonts.gstatic.com/s/opensa
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]