Help
RSS
API
Feed
Maltego
Contact
Domain > codefix.me
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2019-01-03
199.79.62.14
(
ClassC
)
2020-09-03
104.27.165.151
(
ClassC
)
2025-05-24
104.21.67.169
(
ClassC
)
2026-03-05
172.67.178.128
(
ClassC
)
Port 443
HTTP/1.1 200 OKDate: Fri, 20 Feb 2026 07:48:56 GMTContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveAccess-Control-Allow-Origin: *Cache-Control: public, max-age0, mu !DOCTYPE html>html langmillennial>head>meta charSetutf-8 data-next-head/>meta nameviewport contentwidthdevice-width data-next-head/>title data-next-head>Code Fix Me | Making Your AI Not Suck/title>meta namedescription contentMaking your AI Codez more ROFL and less FML! 😎 data-next-head/>link relicon href/favicon.ico data-next-head/>link relpreload href/_next/static/css/f66549055ae10bcd.css asstyle/>link relstylesheet href/_next/static/css/f66549055ae10bcd.css data-n-g/>noscript data-n-css>/noscript>script defer nomodule src/_next/static/chunks/polyfills-42372ed130431b0a.js>/script>script src/_next/static/chunks/webpack-8cac0b4b405cede1.js defer>/script>script src/_next/static/chunks/framework-5757d75364ce2279.js defer>/script>script src/_next/static/chunks/main-ed722161171d2d56.js defer>/script>script src/_next/static/chunks/pages/_app-eae008b077e79e23.js defer>/script>script src/_next/static/chunks/pages/index-ff2f6f490e4df2f0.js defer>/script>script src/_next/static/J4RtI170eNogiXJdlK8vD/_buildManifest.js defer>/script>script src/_next/static/J4RtI170eNogiXJdlK8vD/_ssgManifest.js defer>/script>/head>body>div id__next>div classmin-h-screen w-full font-sans bg-gradient-to-br from-#ff6b97 via-#6f00ff to-#00fff2 text-white stylemin-height:100vh;position:relative;background-attachment:fixed;background-size:cover>div classfixed top-0 right-0 z-50 m-0 p-0>div classflex flex-row items-baseline align-top>div classflex flex-row items-baseline bg-#c0c0c0 border-2 border-t-0 border-#ffffff inline-flex shadow-2px_2px_0px_#000000 p-1>div classpx-4 text-xs uppercase tracking-wide text-#000080 font-bold mb-1 font-'MS_Sans_Serif'>Website Lexicon!-- -->:/div>button classpx-4 py-2 text-sm font-"MS_Sans_Serif" bg-#c0c0c0 text-#000000 border-t-2 border-l-2 border-#ffffff border-b-2 border-r-2 border-#808080 hover:bg-#d0d0d0 active:border-t-#808080 active:border-l-#808080 active:border-b-#ffffff active:border-r-#ffffff relative mx-1 >Gen Z Mode/button>button classpx-4 py-2 text-sm font-"MS_Sans_Serif&quo
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]