Help
RSS
API
Feed
Maltego
Contact
Domain > www.opdapasmetepec.gob.mx
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2019-02-26
65.99.225.58
(
ClassC
)
2025-02-05
69.10.51.227
(
ClassC
)
2025-04-16
104.21.10.201
(
ClassC
)
2025-05-05
172.67.190.212
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginxDate: Wed, 05 Feb 2025 20:32:46 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-aliveLocation: https://www.opdapasmetepec.gob.mx/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>nginx/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginxDate: Wed, 05 Feb 2025 20:32:46 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveVary: Accept-EncodingVary: Accept-Encoding,User-Agen !DOCTYPE html>html langes>head> meta charsetUTF-8> meta namedescription content> meta http-equivX-UA-Compatible contentIEedge> meta nameviewport contentwidthdevice-width, initial-scale1.0> meta namedescription contentSitio web de OPDAPAS (Organismo Público Descentralizado de Agua Potable, Alcantarillado y Saneamiento) de Metepec, Estado de México> meta nameauthor contentJosé Roberto Bernal Mercado> meta namekeywords contentagua potable, opdapas metepec, opdapas metepec, alcantarillado, saneamiento, servicios de agua, servicios publicos /> title>OPDAPAS del Municipio de Metepec | Inicio/title> link relicon hrefimg/core-img/favicon.ico > link relstylesheet hrefcss/bootstrap.min.css> link relstylesheet hrefcss/fontawesome.min.css> link relstylesheet hrefcss/font-awesome4.7.min.css> link relstylesheet hrefstyle.css> link relstylesheet hrefcss/responsive.css> script src//code.jquery.com/jquery-1.12.0.min.js>/script> link relstylesheet hrefcss/gob.css> !-- script> $(document).ready(function() { $(#mostrarmodal).modal(show); }); /script> --> !-- Global site tag (gtag.js) - Google Analytics --> script async srchttps://www.googletagmanager.com/gtag/js?idG-ZDF67HLG5G>/script> script> window.dataLayer window.dataLayer || ; function gtag() { dataLayer.push(arguments); } gtag(js, new Date()); gtag(config, G-ZDF67HLG5G); /script>/head>body> header classheader-area>div classsticky-wrapper > div classfamie-main-menu> div classclassy-nav-container breakpoint-off> div classcontainer> !-- Menu --> nav classclassy-navbar-nav justify-content-between idfamieNav> !-- Nav Brand --> a href../ classnav-brand-met>img srcimg/core-img/logo_ayuntamiento.png alt>/a> a href../ classnav-brand-oda>img srcimg/core-img/opdapas_logo.png alt>/a> !-- Menu --> div classclassy-menu> !-- Close Button --> !-- form classform-inline my-2 my-lg-0> img srcimg/core-img/user_blue.png alt> &nb
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]