Help
RSS
API
Feed
Maltego
Contact
Domain > anil.computer
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2023-10-27
52.2.134.244
(
ClassC
)
2025-08-01
3.33.186.135
(
ClassC
)
Port 443
HTTP/1.1 200 OKAccept-Ranges: bytesAge: 0Cache-Control: public,max-age0,must-revalidateCache-Status: Netlify Edge; fwdmissContent-Length: 7265Content-Type: text/html; charsetUTF-8Date: Sat, 19 Jul 202 !DOCTYPE html>html langen>head>meta charSetutf-8/>link relpreload asfont href/_next/static/media/2aaf0723e720e8b9-s.p.woff2 crossorigin typefont/woff2/>link relstylesheet href/_next/static/css/3c6e952bfa3c6bd2.css data-precedencenext/>link relpreload href/_next/static/chunks/webpack-931d2229a4cb9ddc.js asscript/>link relpreload href/_next/static/chunks/bce60fc1-8c4748991edb1ec4.js asscript/>link relpreload href/_next/static/chunks/698-1321e6d13d35448d.js asscript/>link relpreload href/_next/static/chunks/main-app-76c0dc6abe126aca.js asscript/>title>anil.computer/title>meta nameviewport contentwidthdevice-width, initial-scale1/>meta namenext-size-adjust/>script src/_next/static/chunks/polyfills-78c92fac7aa8fdd8.js noModule>/script>/head>body class__className_20951f>main>div classflex h-screen items-center justify-center bg-black sm:bg-white>div classflex items-center sm:rounded-full bg-black p-10 text-teal-300 sm:outline outline-8 shadow-2xl flex-col sm:flex-row flex-shrink-0>a hrefhttps://github.com/bridgpal>img src/profile.png classh-48 sm:h-32 rounded-full hover:ring-2 ring-white ease-in-out duration-200/>/a>div classsm:ml-4 text-center sm:text-left>p class text-2xl font-bold>Hi I'm Anil Bridgpal/p>p classfont-mono text-orange-200>anil.computer/p>p>/p>/div>/div>/div>/main>script src/_next/static/chunks/webpack-931d2229a4cb9ddc.js async>/script>script src/_next/static/chunks/bce60fc1-8c4748991edb1ec4.js async>/script>script src/_next/static/chunks/698-1321e6d13d35448d.js async>/script>script src/_next/static/chunks/main-app-76c0dc6abe126aca.js async>/script>script>(self.__next_fself.__next_f||).push(0)/script>script>self.__next_f.push(1,1:HL/_next/static/media/2aaf0723e720e8b9-s.p.woff2,{as:font, ype:font/woff2} 2:HL/_next/static/css/3c6e952bfa3c6bd2.css,{as:style} 0:$L3\n)/script>script>self.__next_f.push(1,4:I{id:2353,chunks:272:static/chunks/webpack-931d2229a4cb9ddc.js,253:static/chunks/bce60fc1-8c4748991edb1ec4.js,698:static/chunks/698-1321e6d13d35448d.js, ame:default,async:false} 6:I{id:7330,chunks:272
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]