Help
RSS
API
Feed
Maltego
Contact
Domain > www.colegiofrench.com.ar
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2014-05-18
108.162.198.103
(
ClassC
)
2025-11-11
67.211.219.119
(
ClassC
)
Port 80
HTTP/1.1 200 OKetag: 43ee-5f8a4db4-6e2f00;brlast-modified: Sat, 17 Oct 2020 01:49:40 GMTcontent-type: text/htmlcontent-length: 17390accept-ranges: bytesdate: Tue, 09 Jan 2024 17:38:09 GMTserver: LiteS !DOCTYPE html PUBLIC -//W3C//DTD XHTML 1.0 Transitional//EN http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd>html xmlnshttp://www.w3.org/1999/xhtml>head>meta http-equivContent-Type contenttext/html; charsetUTF-8 />title>COLEGIO FRENCH/title>meta nameviewport contentwidthdevice-width, user-scalableno, initial-scale1.0, maximum-scale1.0, minimum-scale1.0>link hrefcss/style.css relstylesheet typetext/css />link hrefcss/contenido.css relstylesheet typetext/css />!-- MENU -->!-- link relstylesheet hrefhttp://i.icomoon.io/public/temp/7d96e2500b/UntitledProject7/style.css>-->script srchttp://code.jquery.com/jquery-latest.js>/script>script srcjs/menu.js>/script>!---->!-- SLIDER -->!-- Start WOWSlider.com HEAD section -->link relstylesheet typetext/css hrefslider-home/engine1/style.css />script typetext/javascript srcslider-home/engine1/jquery.js>/script> script srchttps://www.youtube.com/iframe_api>/script>!-- End WOWSlider.com HEAD section --> !-- FIN SLIDER -->!-- JS -->script srcjs/audio.js>/script>!-- GOOGLEFONT -->link hrefhttps://fonts.googleapis.com/css?familyLato:400,100,300,700,900 relstylesheet typetext/css>link hrefhttps://fonts.googleapis.com/css?familyRoboto:400,300,500,700,900,900italic,700italic,500italic,400italic,300italic,100italic,100 relstylesheet typetext/css>!--FIN GOOGLEFONT-->script typetext/javascript>function MM_swapImgRestore() { //v3.0 var i,x,adocument.MM_sr; for(i0;a&&ia.length&&(xai)&&x.oSrc;i++) x.srcx.oSrc;}function MM_preloadImages() { //v3.0 var ddocument; if(d.images){ if(!d.MM_p) d.MM_pnew Array(); var i,jd.MM_p.length,aMM_preloadImages.arguments; for(i0; ia.length; i++) if (ai.indexOf(#)!0){ d.MM_pjnew Image; d.MM_pj++.srcai;}}}function MM_findObj(n, d) { //v4.01 var p,i,x; if(!d) ddocument; if((pn.indexOf(?))>0&&parent.frames.length) { dparent.framesn.substring(p+1).document; nn.substring(0,p);} if(!(xdn)&&d.all) xd.alln; for (i0;!x&&id.forms.length;i++) xd.formsin; for(i0;!x&&d.layers&&id.layers.length;i++) xMM_findObj(n,d.layersi.document); if(!x && d.get
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]