RAW HTTP Header
HTTP/1.1 200 OK
Date: Thu, 08 Feb 2024 09:18:57 GMT
Server: Apache/2.4.6 (CentOS) PHP/7.4.30
X-Powered-By: PHP/7.4.30
Content-Length: 4911
Content-Type: text/html; charset=UTF-8
V is Vendetta Ransomware |
|
Website Address
|
|
Website Status
Dead-Connection-Refused
|
|
Last Alive?
2024-02-08 10:21:15
|
|
Last Checked?
2025-11-02 19:07:05
|
|
Checked since
2023-07-30 03:40:25
|
|
Require TOR?
Yes (Onion link Unknown)
|
|
Require Account?
Unknown
|
|
Require Invite?
Unknown
|
|
Body Title
Vendetta
|
|
Meta Author
|
|
Meta Description
|
|
Last-Modified
|
|
Server
Apache/2.4.6 (CentOS) PHP/7.4.30
|
|
X-Powered-By
PHP/7.4.30
|
|
X-AddBlock-Key
|
|
Content-Type
text/html; charset=UTF-8
|
|
Content-Language
|
|
Notes
This was added via the website
|
Backend "Last log" known
[webcheck worker 4] id(101) V is Vendetta: (97) ERR-String=proxy handshake error ERR-Message=Can't complete SOCKS5 connection to test.cuba4ikm4jakjgmkezytyawtdgr2xymvy6nvzgw5cglswg3si76icnqd.onion. (4)
