Help
RSS
API
Feed
Maltego
Contact
Domain > www.nefta.io
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-11-24
3.64.113.143
(
ClassC
)
2025-05-24
52.29.64.182
(
ClassC
)
2025-06-04
18.184.236.217
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Sun, 24 Nov 2024 14:35:55 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://www.nefta.io:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 24 Nov 2024 14:35:57 GMTContent-Type: text/html; charsetutf-8Content-Length: 121985Connection: keep-aliveX-Powered-By: ExpressETag: W/1dc81-Y/8rUqhVQvqWMkyiOcuBaUTtnr4 !DOCTYPE html>html langen>head> meta charsetutf-8> title> Nefta | AdTech solutions for revenue performance and trust /title> base href/> meta namedescription contentNefta’s disruptive ad-network and pre-mediation solutions deliver superior revenue performance while rebuilding publisher trust in adtech.> meta namekeywords contentadvertise, ltv, grow, tools, ecpms, arpdau, iap, iaa, monetise, gaming, games, marketplace, APIs, own, unity, SDK, unreal engine, gamer, AAA> meta nameviewport contentwidthdevice-width, initial-scale1> link relshortcut icon href/assets/img/fav/Icon_Transparent.png> link relicon typeimage/x-icon href/assets/img/fav/Icon_Transparent.png> !-- script srchttps://code.jquery.com/jquery-3.2.1.slim.min.js>/script>--> !-- script srchttps://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js>/script>--> link relstylesheet href/assets/css/aos.css mediaprint onloadthis.mediaall>noscript>link relstylesheet href/assets/css/aos.css>/noscript> script src/assets/js/jquery.slim.min.js>/script> script src/assets/js/bootstrap.min.js>/script> !-- Start of Async Drift Code -->!-- script>-->!-- use strict;-->!-- !function() {-->!-- var t window.driftt window.drift window.driftt || ;-->!-- if (!t.init) {-->!-- if (t.invoked) return void (window.console && console.error && console.error(Drift snippet included twice.));-->!-- t.invoked !0, t.methods identify, config, track, reset, debug, show, ping, page, hide, off, on ,-->!-- t.factory function(e) {-->!-- return function() {-->!-- var n Array.prototype.slice.call(arguments);-->!-- return n.unshift(e), t.push(n), t;-->!-- };-->!-- }, t.methods.forEach(function(e) {-->!-- te t.factory(e);-->!-- }), t.load function(t) {-->!-- var e 3e5, n Math.ceil(new Date() / e) * e, o document.createElement(script);-->!-- o.type text/javascript, o.async !0, o.crossorigi
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]