Help
RSS
API
Feed
Maltego
Contact
Domain > mawenzi.univ-littoral.fr
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-11-13
193.49.192.3
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Fri, 16 Aug 2024 00:55:11 GMTServer: Apache/2.4.59 (Debian)Location: https://mawenzi.univ-littoral.fr/Content-Length: 331Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://mawenzi.univ-littoral.fr/>here/a>./p>hr>address>Apache/2.4.59 (Debian) Server at mawenzi.univ-littoral.fr Port 80/address>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Fri, 16 Aug 2024 00:55:11 GMTServer: Apache/2.4.59 (Debian)Last-Modified: Wed, 06 Jul 2022 14:55:05 GMTETag: 38ee-5e324278baf77Accept-Ranges: bytesContent-Length: 14574Vary: Accep !doctype html>html langen classno-js> head> meta charsetutf-8> meta nameviewport contentwidthdevice-width,initial-scale1> meta namedescription contentApplications developped in R about clustering and time data analysis> meta nameauthor contentPoisson Caillault Emilie, Hebert Pierre-Alexandre> link relcanonical hrefhttp://mawenzi.univ-littoral.fr/> link relicon hreflogo/lisic_favicon.ico> meta namegenerator contentmkdocs-1.3.0, mkdocs-material-8.3.9> title>R Apps, LISIC, ULCO - R apps, developped in em>Images and Learning/em>s team, LISIC, ULCO/title> link relstylesheet hrefassets/stylesheets/main.1d29e8d0.min.css> link relstylesheet hrefassets/stylesheets/palette.cbb835fc.min.css> meta nametheme-color content#2094f3> link relpreconnect hrefhttps://fonts.gstatic.com crossorigin> link relstylesheet hrefhttps://fonts.googleapis.com/css?familyRoboto:300,300i,400,400i,700,700i%7CRoboto+Mono:400,400i,700,700i&displayfallback> style>:root{--md-text-font:Roboto;--md-code-font:Roboto Mono}/style> link relstylesheet hrefextra.css> script>__md_scopenew URL(.,location),__md_get(e,_localStorage,t__md_scope)>JSON.parse(_.getItem(t.pathname+.+e)),__md_set(e,_,tlocalStorage,a__md_scope)>{try{t.setItem(a.pathname+.+e,JSON.stringify(_))}catch(e){}}/script> script>function gtag(){dataLayer.push(arguments)}window.dataLayerwindow.dataLayer||,gtag(js,new Date),gtag(config,G-D96HLDX06K),document.addEventListener(DOMContentLoaded,function(){document.forms.search&&document.forms.search.query.addEventListener(blur,function(){this.value&>ag(event,search,{search_term:this.value})}),undefined!typeof location$&&location$.subscribe(function(e){gtag(config,G-D96HLDX06K,{page_path:e.pathname})})})/script> script async srchttps://www.googletagmanager.
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]