Help
RSS
API
Feed
Maltego
Contact
Domain > adafrik.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2020-12-02
166.62.28.6
(
ClassC
)
2024-09-19
44.242.99.40
(
ClassC
)
2025-01-05
75.2.70.75
(
ClassC
)
2025-04-24
99.83.190.102
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Mon, 26 Aug 2024 21:48:28 GMTContent-Type: text/htmlContent-Length: 166Connection: keep-aliveLocation: https://adafrik.com/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>openresty/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Mon, 26 Aug 2024 21:48:29 GMTContent-Type: text/htmlContent-Length: 26796Connection: keep-alivestrict-transport-security: max-age31536000x-lambda-id: 54836b56-66b1-4d87-81f0-a89f3 !DOCTYPE html>!-- This site was created in Webflow. https://webflow.com -->!-- Last Published: Fri Aug 23 2024 14:46:32 GMT+0000 (Coordinated Universal Time) -->html data-wf-domainadafrik.com data-wf-page62d74caecddf7a99b8d0755f data-wf-site62d74cadcddf7a1a3bd0755e>head>meta charsetutf-8/>title>Adafrik/title>meta contentwidthdevice-width, initial-scale1 nameviewport/>meta contentWebflow namegenerator/>link hrefhttps://cdn.prod.website-files.com/62d74cadcddf7a1a3bd0755e/css/adafrik.webflow.d037bbf16.css relstylesheet typetext/css/>link hrefhttps://fonts.googleapis.com relpreconnect/>link hrefhttps://fonts.gstatic.com relpreconnect crossoriginanonymous/>script srchttps://ajax.googleapis.com/ajax/libs/webfont/1.6.26/webfont.js typetext/javascript>/script>script typetext/javascript>WebFont.load({ google: { families: Open Sans:300,300italic,400,400italic,600,600italic,700,700italic,800,800italic,Montserrat:100,100italic,200,200italic,300,300italic,400,400italic,500,500italic,600,600italic,700,700italic,800,800italic,900,900italic,Varela:400,PT Serif:400,400italic,700,700italic,Inter:regular,500,600,700,800 }});/script>script typetext/javascript>!function(o,c){var nc.documentElement,t w-mod-;n.className+t+js,(ontouchstartin o||o.DocumentTouch&&c instanceof DocumentTouch)&&(n.className+t+touch)}(window,document);/script>link hrefhttps://cdn.prod.website-files.com/62d74cadcddf7a1a3bd0755e/66c4fdc8461f8b84b244a328_PHOTO-2024-08-21-00-33-04.jpg relshortcut icon typeimage/x-icon/>link hrefhttps://cdn.prod.website-files.com/62d74cadcddf7a1a3bd0755e/66c4ff2063e2c4fbd338007a_PHOTO-2024-08-21-00-39-08.jpg relapple-touch-icon/>/head>body data-w-id62d74caecddf7a345fd07560 styleopacity:0 classbody>div classnavbar-logo-left>div data-animationdefault data-collapsetiny data-duration400 data-easingease data-easing2ease rolebanner classnavbar-logo-left-container shadow-three w-nav>div classcontainer-14>div classnavbar-wrapper>a href# classnavbar-brand w-nav-brand>img width210 height40 alt srchttps://cdn.prod.website-files.com/62d7
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]