RAW HTTP Header
HTTP/1.1 302 Found
Date: Mon, 03 Nov 2025 23:18:40 GMT
Server: Apache/2.4.52 (Ubuntu)
Set-Cookie: PHPSESSID=jcs468ko9808ri7h5k1bopf99v; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Location: /human-verify
Content-Length: 0
Content-Type: text/html; charset=UTF-8
HTTP/1.1 200 OK
Date: Mon, 03 Nov 2025 23:18:40 GMT
Server: Apache/2.4.52 (Ubuntu)
Set-Cookie: PHPSESSID=mmgcadobg2vtje8ui31g27u2i9; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 3442
Content-Type: text/html; charset=UTF-8
Medusa Ransomware |
|
Website Address
|
|
Website Status
Dead-Connection-Refused
|
|
Last Alive?
2025-11-04 00:18:40
|
|
Last Checked?
2025-11-04 00:21:01
|
|
Checked since
2024-09-27 11:02:44
|
|
Require TOR?
Yes (Onion link v3)
|
|
Require Account?
Unknown
|
|
Require Invite?
Unknown
|
|
Body Title
Human Verify
|
|
Meta Author
|
|
Meta Description
|
|
Last-Modified
|
|
Server
Apache/2.4.52 (Ubuntu)
|
|
X-Powered-By
|
|
X-AddBlock-Key
|
|
Content-Type
text/html; charset=UTF-8
|
|
Content-Language
|
|
Notes
This was added via the website by kawaiipantsu
|
Backend "Last log" known
[webcheck worker 4] id(396) Medusa: (97) ERR-String=proxy handshake error ERR-Message=Can't complete SOCKS5 connection to xfv4jzckytb4g3ckwemcny3ihv4i5p4lqzdpi624cxisu35my5fwi5qd.onion. (1)
