Help
RSS
API
Feed
Maltego
Contact
Domain > tkfa.me
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-27
184.168.127.188
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: nginxDate: Sun, 21 Jul 2024 16:51:41 GMTContent-Type: text/html; charsetiso-8859-1Content-Length: 224Connection: keep-aliveLocation: https://tkfa.me/ !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://tkfa.me/>here/a>./p>/body>/html>
Port 443
HTTP/1.1 200 OKServer: nginxDate: Sun, 21 Jul 2024 16:51:42 GMTContent-Type: text/htmlContent-Length: 3381Connection: keep-aliveLast-Modified: Wed, 01 May 2024 13:35:15 GMTAccept-Ranges: bytes !DOCTYPE html>html>head> !-- If you are serving your web app in a path other than the root, change the href value below to reflect the base path you are serving from. The path provided below has to start and end with a slash / in order for it to work correctly. For more details: * https://developer.mozilla.org/en-US/docs/Web/HTML/Element/base This is a placeholder for base href that will be replaced by the value of the `--base-href` argument provided to `flutter build`. --> base href/> meta charsetUTF-8> meta contentIEEdge http-equivX-UA-Compatible> meta namedescription contentTKFA> !-- iOS meta tags & icons --> meta nameapple-mobile-web-app-capable contentyes> meta nameapple-mobile-web-app-status-bar-style contentblack> meta nameapple-mobile-web-app-title contentTKFA> link relapple-touch-icon hreficons/Icon-192.png> !-- Favicon --> link relicon typeimage/png hreffavicon.png/> title>TKFA/title> link relmanifest hrefmanifest.json> script> // The value below is injected by flutter build, do not touch. const serviceWorkerVersion 3326359387; /script> !-- This script adds the flutter initialization JS code --> script srchttps://maps.googleapis.com/maps/api/js?keyAIzaSyAZ-hm-czrOMnG4FwEHfGvDtD0X4wbEBW8>/script> script srcflutter.js defer>/script>/head>body> style> body { background-color: #3C3F51; } /style> !-- Loading indicator --> div idloading> style> body { inset: 0; overflow: hidden; margin: 0; padding: 0; position: fixed; } #loading { align-items: center; display: flex; height: 100%; justify-content: center; width: 100%; } #loading img { animation: 1s ease-in-out 0s infinite alternate breathe; opacity: .66; transition: opacity .4s; } #loading.main_done img { opacity: 1; } #loading.init_done img { animation: .33s ease-in-out 0s 1 forwards zooooom; opacity: .05; } @keyframes breathe
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]