Help
RSS
API
Feed
Maltego
Contact
Domain > www.muucastreaming.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2021-08-29
13.225.206.123
(
ClassC
)
2021-08-29
13.225.206.75
(
ClassC
)
2026-02-26
18.161.6.74
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Thu, 26 Feb 2026 15:14:55 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://www.muucastreaming.com/X-Cache: Redirect from cloudfrontVia: 1.1 626ad4a6bf529166d2aad94a2957694c.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P1X-Amz-Cf-Id: CEINgvl3z0MsQmxQJfe1HBnOTTIcExX_ua_2U3khAyb8vPKTyKIxUA html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 4560Connection: keep-aliveDate: Thu, 26 Feb 2026 15:14:56 GMTX-Powered-By: ASP.NETLast-Modified: Sun, 27 Sep 2020 08:06:54 GMTAccept-Ranges: bytesETag: 94a58929a594d61:0Server: Microsoft-IIS/10.0X-Cache: Miss from cloudfrontVia: 1.1 773bf3616e85ce2b187fa78710a6beb2.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO52-P1X-Amz-Cf-Id: 9fLccdgtanxPHwuK5r3EfUNZd5lCVLO8mF9s924kewgzbG6GfwstPw !DOCTYPE html>html>head> meta http-equivContent-Type contenttext/html; charsetUTF-8 /> meta nameformat-detection contenttelephoneno /> meta namemsapplication-tap-highlight contentno /> meta nameviewport contentuser-scalableno, initial-scale1, maximum-scale1, minimum-scale1, widthdevice-width /> !-- This is a wide open CSP declaration. To lock this down for production, see below. --> meta http-equivContent-Security-Policy contentdefault-src * unsafe-inline; style-src self unsafe-inline; media-src * /> !-- Good default declaration: * gap: is required only on iOS (when using UIWebView) and is needed for JS->native communication * https://ssl.gstatic.com is required only on Android and is needed for TalkBack to function properly * Disables use of eval() and inline scripts in order to mitigate risk of XSS vulnerabilities. To change this: * Enable inline JS: add unsafe-inline to default-src * Enable eval(): add unsafe-eval to default-src * Create your own at http://cspisawesome.com --> !-- meta http-equivContent-Security-Policy contentdefault-src self data: gap: unsafe-inline https://ssl.gstatic.com; style-src self unsafe-inline; media-src * /> --> !--link relstylesheet typetext/css hrefcss/reset.css />--> link relstylesheet typetext/css hrefcss/jquery-theme-default.css /> link relstylesheet typetext/css hrefcss/jquery.mobile-1.3.2.css /> link relstylesheet typetext/css hrefcss/index1.css /> link relstylesheet typetext/css hrefcss/Media_IOS.css /> link relstylesheet typetext/css hreffont-awesome-4.5.0/css/font-awesome.min.css /> script typetext/javascript srcjs/jquery-1.8.3.min.js>/script> script typetext/javascript srcjs/jquery.mobile-1.3.2.min.js>/script> script typetext/javascript srcjs/index.js>/script> script typetext/javascript srcjs/iscroll.js>/script> script typetext/javascript srcjs/jquery.mobile-events.js>/script> script typetext/javascript srcjs/base64.js>/script> script typetext/javascript srccordova.js>/script> title>Muuca/title> script typetext/javascript> app.initialize(); /script>/head>body> !-- Start of Login page --> div idloginPage data-rolepage data-titleMuuca Login> !-- div classclearfix Status idStatusBar>/div> --> header classclearfix data-roleheader> h1> a hrefindex.html> img srcimg/muuca48.png classheaderlogo altmuuca /> /a> /h1> aside> ul> li> !--div classprofile welcome-login>b>/b>Welcome to Muuca. Please Login/div>--> div classprofile welcome-login> i classfa fa-wifi online>/i> /div> /li> /ul> /aside> /header> div classloginContainer> div idloginerrtxt> /div> ul> li> input typetext idusrname placeholderBENUTZER data-inlinetrue autocompleteoff /> /li> li> input typepassword idusrpwd placeholderPASSWORT data-inlinetrue /> /li> li> a href# idloginbtn data-rolebutton data-inlinetrue data-transitionflip> !--b>/b>--> i classfa fa-music fa-lg>/i> /a> /li> /ul> /div> footer classclearfix data-rolefooter> div classlogin-controls> !-- ul> li classmedicon> a hrefhostsetup.html data-reldialog data-transitionslideup> i classfa fa-cog>/i> /a> /li> /ul> --> /div> /footer> /div> div idoverlay>/div>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]