Help
RSS
API
Feed
Maltego
Contact
Domain > www.quantumconta-bi.es
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2018-09-14
54.77.206.21
(
ClassC
)
2025-11-17
34.254.127.55
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Mon, 17 Nov 2025 17:00:50 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://www.quantumconta-bi.es:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 200Date: Mon, 17 Nov 2025 17:00:50 GMTContent-Type: text/html;charsetUTF-8Content-Length: 2627Connection: keep-aliveServer: ApacheX-Content-Type-Options: nosniffX-XSS-Protection: 1; modeblockX-Frame-Options: DENYCache-Control: no-cache, no-store, max-age0, must-revalidatePragma: no-cacheExpires: 0Set-Cookie: JSESSIONIDE00475A7D1C3AE314B24381F5C573D18; Path/; HttpOnlyContent-Language: es-ES !DOCTYPE html>html>head>meta charsetutf-8>meta nameviewport contentwidthdevice-width, initial-scale1.0>title>Quantum BI/title>link href/resources/vendor/css/bootstrap.min.css relstylesheet>link href/resources/vendor/font-awesome/css/font-awesome.css relstylesheet>!-- Ladda style -->link href/resources/vendor/css/plugins/ladda/ladda-themeless.min.css relstylesheet>link href/resources/vendor/css/animate.css relstylesheet>link href/resources/vendor/css/style.css relstylesheet>/head>body classgray-bg> div classmiddle-box text-center loginscreen animated fadeInDown> div> !-- div> h1 classlogo-name>MILAN/h1> /div> --> div> img classlogologin src/resources/images/logo-BI.png /> /div> p>Iniciar sesión./p> form classm-t action/login methodpost> div classform-group> input typetext nameusername classform-control placeholderUsuario required autofocus> /div> div classform-group> input typepassword namepassword classform-control placeholderContraseña required autofocus> /div> button typesubmit classladda-button btn btn-primary block full-width m-b data-stylezoom-in>Entrar/button> input typehidden name_csrf value35268665-2b83-4a91-abdf-493b404c441d /> /form> /div> /div> !-- Mainly scripts --> script src/resources/vendor/js/jquery-2.1.1.js>/script> script src/resources/vendor/js/bootstrap.min.js>/script> !-- Ladda --> script src/resources/vendor/js/plugins/ladda/spin.min.js>/script> script src/resources/vendor/js/plugins/ladda/ladda.min.js>/script> script src/resources/vendor/js/plugins/ladda/ladda.jquery.min.js>/script> script> $(document).ready(function() { // Bind normal buttons $(.ladda-button).ladda(bind, { timeout: 20000 }); // Bind progress buttons and simulate loading progress Ladda.bind(.progress-demo .ladda-button, { callback: function(instance) { var progress 0; var interval setInterval(function() { progress Math.min(progress + Math.random() * 0.1, 1); instance.setProgress(progress); if (progress 1) { instance.stop(); clearInterval(interval); } }, 20000); } }); }); function loadSpinner() { $(.loader).show(); } /script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]