Help
RSS
API
Feed
Maltego
Contact
Domain > aisps.hk
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-12-09
76.223.36.129
(
ClassC
)
2025-01-08
13.248.163.39
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Sun, 27 Oct 2024 23:14:41 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://aisps.hk:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 27 Oct 2024 23:14:43 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-aliveServer: ApacheX-Powered-By: PHP/7.2.24Access-Control-Allow-Origin !doctype html>html langen>head> meta charsetutf-8> title>學校與藝團伙伴計劃/title>meta namedescription content「學校與藝團伙伴計劃」由民政事務局撥款支持推行,於2018年正式推出。計劃鼓勵學校開放校舍和設施供本地藝術團體/藝術家租用,作為創作空間、排練、舉行藝術課程及工作坊等活動之用,以應藝術界對空間及場地的需求,同時推動學校與藝團的合作,將藝術帶入校園。/> meta namekeywords contentAiS, Arts in School, Arts-in-School, Hong Kong Arts Development Council, HKADC, Art, School, 學校與藝團伙伴計劃, 香港藝術發展局, 藝術, 学校与艺团伙伴计划, 香港艺术发展局, 艺术, 学校/> meta namecopyright content© 2020 Arts-in-School Partnership Scheme/>meta propertyog:title content學校與藝團伙伴計劃/>meta propertyog:site_name content學校與藝團伙伴計劃> meta propertyog:type contentwebsite/> meta propertyog:image itempropimage contenthttps://aisps.hk/lib/uploads/16051500875faca5877284b/ais_icon.png> meta propertyog:description content「學校與藝團伙伴計劃」由民政事務局撥款支持推行,於2018年正式推出。計劃鼓勵學校開放校舍和設施供本地藝術團體/藝術家租用,作為創作空間、排練、舉行藝術課程及工作坊等活動之用,以應藝術界對空間及場地的需求,同時推動學校與藝團的合作,將藝術帶入校園。/>script>var angularRootUrl https://aisps.hk/;var angularDisableApiDebug true;var angularClientLogin false;var angularAutoTranslate true;var angularAdminMode true;/script> base href/> meta nameviewport contentwidthdevice-width, initial-scale1> link relicon typeimage/x-icon hreffavicon.ico>link relstylesheet hrefangular/styles.5e34be8bde4c992eca24.css>/head>body> app-root>/app-root> script> (function(i,s,o,g,r,a,m){iGoogleAnalyticsObjectr;irir||function(){ (ir.qir.q||).push(arguments)},ir.l1*new Date();as.createElement(o), m
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]