Http 3
Below is a recent sample of public scans on ScanMalware.com where Http 3 was detected as part of the site's technology stack. Use this as a jumping-off point for investigating how Http 3 is deployed across the web — including on potentially malicious or compromised hosts.
Recent scans where Http 3 was detected
How ScanMalware detects Http 3
Each public scan on ScanMalware.com is analysed for the technologies that make up the site's stack — web servers, frameworks, CDNs, analytics, and security middleware. When Http 3 is observed (via response headers, fingerprintable URLs, JavaScript globals, or known asset patterns), the scan is tagged accordingly. This page lists scans where Http 3 was identified as part of the underlying stack.
Want to dig deeper? You can pivot from any scan into related signals — JARM TLS fingerprints, ASN ownership, BGP routing, or co-resident technologies — to map how Http 3 is being used across the public web.