Help
RSS
API
Feed
Maltego
Contact
Domain > forms.wilford.ai
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-12-10
52.51.107.35
(
ClassC
)
2025-12-26
54.194.249.207
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Fri, 26 Dec 2025 05:21:56 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://forms.wilford.ai:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Fri, 26 Dec 2025 05:21:56 GMTContent-Type: text/html; charsetutf-8Content-Length: 1991Connection: keep-aliveServer: nginxLast-Modified: Thu, 13 Feb 2025 18:03:09 GMTETag: 67ae33dd-7c7Cache-Control: no-store, no-cache, must-revalidate, proxy-revalidate, max-age0Accept-Ranges: bytes !DOCTYPE html>html langen classforms-app>head>meta charsetutf-8>meta nameviewport contentwidthdevice-width,initial-scale1>meta http-equivX-UA-Compatible contentIEedge>link relicon href/favicon.ico>title>Forms/title>link relstylesheet hrefhttps://fonts.googleapis.com/css?familyRoboto:100,300,400,500,700,900>link relstylesheet hrefhttps://fonts.googleapis.com/css?familyMaterial+Icons|Material+Icons+Outlined|Material+Icons+Two+Tone|Material+Icons+Round|Material+Icons+Sharp>link href/css/app.5db0d82d.css relpreload asstyle>link href/css/chunk-vendors.02721826.css relpreload asstyle>link href/js/app.1e73bb85.js relpreload asscript>link href/js/chunk-vendors.d8e820ea.js relpreload asscript>link href/css/chunk-vendors.02721826.css relstylesheet>link href/css/app.5db0d82d.css relstylesheet>/head>body>noscript>strong>Were sorry but our console doesnt work properly without JavaScript enabled. Please enable it to continue./strong>/noscript>div idroot>/div>script>/*! A fix for the iOS orientationchange zoom bug. Script by @scottjehl, rebound by @wilto.MIT / GPLv2 License.*/(function(a){function m(){d.setAttribute(content,g),h!0}function n(){d.setAttribute(content,f),h!1}function o(b){lb.accelerationIncludingGravity,iMath.abs(l.x),jMath.abs(l.y),kMath.abs(l.z),(!a.orientation||a.orientation180)&&(i>7||(k>6&&j8||k8&&j>6)&&i>5)?h&&n():h||m()}var bnavigator.userAgent;if(!(/iPhone|iPad|iPod/.test(navigator.platform)&&/OS 1-5_0-9_* like Mac OS X/i.test(b)&&b.indexOf(AppleWebKit)>-1))return;var ca.document;if(!c.querySelector)return;var dc.querySelector(metanameviewport),ed&&d.getAttribute(content),fe+,maximum-scale1,ge+,maximum-scale10,h!0,i,j,k,l;if(!d)return;a.addEventListener(orientationchange,m,!1),a.addEventListener(devicemotion,o,!1)})(this);/script>script src/js/chunk-vendors.d8e820ea.js>/script>script src/js/app.1e73bb85.js>/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]