Help
RSS
API
Feed
Maltego
Contact
Domain > algeriajug.org
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2016-01-31
160.16.216.94
(
ClassC
)
2019-09-26
23.94.69.34
(
ClassC
)
2026-01-06
104.21.71.65
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sun, 24 Nov 2024 11:40:32 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveCache-Control: max-age3600Expires: Sun, 24 Nov 2024 12:40:32 GMTLocatio html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>cloudflare/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 24 Nov 2024 11:40:32 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveLast-Modified: Thu, 15 Feb 2024 20:14:54 GMTcf-cache-status: DYNAMICvary: accep !doctype html>html langen classno-js> head>meta charsetutf-8>meta nameviewport contentwidthdevice-width,initial-scale1>meta namedescription contentThe Algeria Java User Group (JUG) is a volunteer organization dedicated to disseminating Java-related knowledge globally. Serving as a central hub for Java enthusiasts in Algeria, it offers a platform for users to exchange information, share resources and solutions, enhance networking opportunities, and deepen their expertise in Java technology. The group prioritizes building an inclusive community where diverse members collaborate, connect, and communicate to foster a vibrant Java community. In essence, the Algeria JUG acts as the meeting point for Java users to connect, communicate, and collaborate with their fellow developers.>meta nameauthor contentalgeriajug>link hrefhttp://localhost:8080/community/ relcanonical>link hrefsuggestions/ relnext>link relicon hrefassets/images/algeriajug.png>meta namegenerator contentmkdocs-1.5.3, mkdocs-material-9.4.7>title>Algeria JUG - Algeria Java User Group/title>link relstylesheet hrefassets/stylesheets/main.4b4a2bd9.min.css>link relstylesheet hrefassets/stylesheets/palette.356b1318.min.css>link relpreconnect hrefhttps://fonts.gstatic.com crossorigin>link relstylesheet hrefhttps://fonts.googleapis.com/css?familyRoboto:300,300i,400,400i,700,700i%7CRoboto+Mono:400,400i,700,700i&displayfallback>style>:root{--md-text-font:Roboto;--md-code-font:Roboto Mono}/style>script>__md_scopenew URL(.,location),__md_hashe>...e.reduce((e,_)>(e5)-e+_.charCodeAt(0),0),__md_get(e,_localStorage,t__md_scope)>JSON.parse(_.getItem(t.pathname+.+e)),__md_set(e,_,tlocalStorage,a__md_scope)>{try{t.setItem(a.pathname+.+e,JSON.stringify(_))}catch(e){}}/script>script id__analytics>function __md_analytics(){function n(){dataLayer.push(arguments)}window.dataLayerwindow.dataLayer||,n(js,new Date),n(config,),document.addEventListener(DOMContentLoaded,function(){document.forms.search&&document.forms.search.query.addEventListener(blur,function(){this.value&&n(event,s
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]