Help
RSS
API
Feed
Maltego
Contact
Domain > account.afriex.co
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2020-11-19
52.21.51.142
(
ClassC
)
2020-11-19
54.160.18.204
(
ClassC
)
2021-01-19
3.209.148.13
(
ClassC
)
2021-01-19
34.206.212.97
(
ClassC
)
2024-08-01
172.67.136.79
(
ClassC
)
2025-01-15
104.21.94.131
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sun, 10 Mar 2024 20:13:35 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveLocation: https://account.afriex.co/X-Cache: Redirect from cloud html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 10 Mar 2024 20:13:35 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-alivelast-modified: Fri, 23 Feb 2024 13:06:29 GMTx-amz-server-side-encryption: AES25 !doctype html>html langen>head classis-clipped>meta namegoogle-site-verification content3Z-fGnKQ5rTYcwFezER2HcRiTC9k50PH6tjAr4sTGXM/>meta charsetutf-8>link relshortcut icon href/favicon.ico>meta nameviewport contentwidthdevice-width,initial-scale1,shrink-to-fitno>meta nametheme-color content#000000>title>Afriex | Send digital currency to Africa./title>meta http-equivContent-Type contenttext/html; charsetutf-8/>meta http-equivContent-Type contenttext/html; charsetISO-8859-1>meta namedescription contentSend money to Africa.>link relmanifest href/manifest.json>link hrefhttps://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css relstylesheet integritysha384-wvfXpqpZZVQGK6TAh5PVlGOfQNHSoD2xbE+QkPxCAFlNEevoEH3Sl0sibVcOQVnN crossoriginanonymous>link rel”shortcut icon” href”/favicon.ico”>link relpreload href/static/assets/fonts/nexa/NexaBold.woff asfont typefont/woff2 onloadthis.onloadnull,this.relstylesheet crossorigin>link relpreload href/static/assets/fonts/nexa/NexaLight.woff asfont typefont/woff2 onloadthis.onloadnull,this.relstylesheet crossorigin>link relpreload href/static/assets/css/bulma.css asstyle onloadthis.onloadnull,this.relstylesheet>noscript>link relstylesheet href./static/assets/css/bulma.css>/noscript>script srchttps://js.paystack.co/v2/paystack.js>/script>script typetext/javascript>!function(){window.__inspwindow.__insp||,__insp.push(wid,909547801);setTimeout((function(){if(void 0window.__inspld){window.__inspld1;var tdocument.createElement(script);t.typetext/javascript,t.async!0,t.idinspsync,t.src(https:document.location.protocol?https:http)+://cdn.inspectlet.com/inspectlet.js?wid909547801&r+Math.floor((new Date).getTime()/36e5);var edocument.getElementsByTagName(script)0;e.parentNode.insertBefore(t,e)}}),0)}()/script>script typetext/javascript>!function(e,t){if(!t.__SV){var n,o,awindow;try{var i,r,p,la.location,cl.hash;ifunction(e,t){return(re.match(RegExp(t+(^&*))))?r1:null},c&&i(c,state)&&(mpeditor(pJSON.parse(decodeURIComponent(i(c,state)))).action&&(a.sessionStorage.s
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]