Sunucu yanıtını kontrol edin

Sunucu yanıtı
NS kayıtları
Whois alanı
Yanıt başlıkları
İstek başlıkları
Ham HTML kodu
301 Moved Permanently - f2pi.com
HTTP Status: 301
User-Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected])
Date: Mon, 26 May 2025 04:01:05 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Cache-Control: max-age=3600
Expires: Mon, 26 May 2025 05:01:05 GMT
Location: https://f2pi.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Nz%2BWyV8KCqHPXi%2FWiA6d5JhoLeQmJjDjtjXR2guSteCRHTMaYLNdOGaL%2FLs6kVuAdU5FHif9xrdYKx%2FeqyXaHCBAwLjuDjfVf89ZPVMNXSYFiazH137T80YI3HskkO8H%2B8A4TQTydA%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Vary: Accept-Encoding
cf-cache-status: DYNAMIC
Server: cloudflare
CF-RAY: 945a5e883e892d9e-ARN
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=7582&min_rtt=7582&rtt_var=3791&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=164&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
date: Mon, 26 May 2025 04:01:05 GMT
location: https://www.f2pi.com/
report-to: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=g7BHf3sK3o60rXiFhTWm55G2HTAn%2F9I5hcm%2FiS7Lxlj3j%2BF%2FAois9Zpi9XvFyYyayb67NJNXT12nscB%2BczZTgn%2BOJ4aHmojQAaw78tNL9Ojdpg%3D%3D"}]}
nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
server: cloudflare
cf-ray: 945a5e88cf840a40-ARN
date: Mon, 26 May 2025 04:01:05 GMT
content-type: text/html; charset=utf-8
cf-cache-status: DYNAMIC
server: cloudflare
vary: Accept-Encoding
access-control-allow-origin: *
cache-control: public, max-age=0, must-revalidate
referrer-policy: strict-origin-when-cross-origin
x-content-type-options: nosniff
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ip5gYEu%2BjwkBTbBWdr2RA1hhcEFoNz4m77KZURu34wdJ7YYZQ2Cxhe%2FNnS6JyhFpcKvB%2Favn3mpC34OD70S4fMaq0g7GlFvSetLOLcIDq5sbk5V3i3G8LWobiWqrl97Lqo7XLK79BWAbDao%3D"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray: 945a5e8969992d86-ARN

HTTP Kodu 301 Kalıcı Olarak Taşındı

301 Moved Permanently, istenen kaynağın kalıcı olarak yeni bir URL'ye taşındığı anlamına gelir. Gelecekteki tüm istekler yeni adresi kullanmalıdır.

Kod 301 ne zaman kullanılır?

  • Bir web sitesi alan adını değiştirirken
  • URL yapılarını değiştirirken
  • SEO için yönlendirmeleri ayarlarken

Kod 301 kullanıcı için ne anlama geliyor?

Tarayıcı kullanıcıyı otomatik olarak yeni adrese yönlendirecek ve arama motorları dizinlerini güncelleyecektir.

GET / HTTP/1.1
Host: f2pi.com
Accept: */*
User-Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected])
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" href="/_next/static/media/0cf0e55cc0ef3777-s.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="preload" href="/_next/static/media/87efa1b92b3900d1-s.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="preload" as="image" href="logo.png"/><link rel="preload" as="image" href="/logo.png"/><link rel="preload" as="image" href="/plana.jpeg"/><link rel="preload" as="image" href="/code_review.webp"/><link rel="preload" as="image" href="/penetration_testing.jpeg"/><link rel="preload" as="image" href="/network_pentest.jpeg"/><link rel="stylesheet" href="/_next/static/css/57fe86bb1c7b7dfd.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/48cc6e06ca69c7ba.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-bde7d5f88f4596e1.js"/><script src="/_next/static/chunks/fd9d1056-62aaf4b921c84028.js" async=""></script><script src="/_next/static/chunks/23-054eeb4e5db9983e.js" async=""></script><script src="/_next/static/chunks/main-app-ae8c2dce16937f61.js" async=""></script><script src="/_next/static/chunks/app/page-31911fabc7bfe29d.js" async=""></script><link rel="apple-touch-icon" sizes="180x180" href="/apple-touch-icon.png"/><link rel="icon" type="image/png" sizes="32x32" href="/favicon-32x32.png"/><link rel="icon" type="image/png" sizes="16x16" href="/favicon-16x16.png"/><link rel="manifest" href="/site.webmanifest"/><link rel="mask-icon" href="/safari-pinned-tab.svg" color="#5bbad5"/><meta name="msapplication-TileColor" content="#da532c"/><meta name="theme-color" content="#ffffff"/><link rel="icon" href="/favicon.ico" type="image/x-icon" sizes="16x16"/><meta name="next-size-adjust"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="__className_12ac45 Layout_container___pJn0"><main class="page_main__GlU4n"><header class="undefined Header_container__L4JQR"><div class="Header_left__MKmhq"><span>F2PI</span><img class="Header_image__CGrsR" src="logo.png"/></div><div class="Header_center__GPZJ_"><a class="Header_item__v_KlF" href="#home">Home</a><a class="Header_item__v_KlF" href="#services">Services</a><a class="Header_item__v_KlF" href="#research">Research</a><a class="Header_item__v_KlF" href="#about">About</a></div><a class="Header_item__v_KlF Header_highlighted__E7YXG" href="#contact">Contact</a></header><div class="page_content__kDoxQ"><section id="home" class="page_sectionHome__3UXpm"><img class="page_logo__7fc9l" src="/logo.png"/><h2 class="page_title__3jonF">Protect your business</h2><p class="page_description__86bsR">f2pi is a consultancy providing a wide range of information security professional services including penetration testing and security assessments, focused on research and innovation. We have over 15 years of experience working with well known international companies and governments</p><div class="ImageWithText_imageContainer__0wnjI"><img src="/plana.jpeg" alt="Security Researcher" class="ImageWithText_backgroundImage__s5izq"/><div class="ImageWithText_overlayText__3Phza ImageWithText_fadeIn__P_iZQ">Secure Your Future</div></div></section><section id="services" class="page_sectionServices__7NEPb"><img class="page_logo__7fc9l" src="/logo.png"/><h2 class="page_title__3jonF">Services</h2><div><div class="page_service__B7BiF"><div><h3 class="page_serviceTitle__O1IUx">Source Code Review</h3><p class="page_serviceDescription__VYzYW">Our code review service identifies vulnerabilities and insecure coding practices in your software. We analyze your source code to detect security flaws, such as injection risks, buffer overflows, and improper access control.<br/><br/>With expert insights and adherence to the latest security standards, we ensure your software is secure, resilient, and compliant. Get detailed reports and actionable recommendations to strengthen your code and reduce exposure to threats.</p></div><img src="/code_review.webp" class="page_serviceRight__7d2yB"/></div><div class="page_service__B7BiF page_serviceInverted__hFJ9T"><div><h3 class="page_serviceTitle__O1IUx">Web Application Penetration Testing</h3><p class="page_serviceDescription__VYzYW">Our web application penetration testing service simulates real-world attacks to uncover security vulnerabilities in your web apps. We assess potential weaknesses in your application’s design and implementation.<br/><br/>With a focus on safeguarding your data and ensuring compliance, our expert team helps ensure your applications remain secure, reliable, and resistant to potential cyber threats.</p></div><img src="/penetration_testing.jpeg" class="page_serviceRight__7d2yB"/></div><div class="page_service__B7BiF"><div><h3 class="page_serviceTitle__O1IUx">Network Penetration Testing</h3><p class="page_serviceDescription__VYzYW">Our network penetration testing service simulates real-world attacks on your network infrastructure to identify vulnerabilities and security gaps. We assess the resilience of your network by testing firewalls, routers, and other critical components to uncover weaknesses that could be exploited by attackers.<br/><br/>With a focus on ensuring network security and data protection, we provide a detailed report of our findings, along with actionable recommendations to help strengthen your defenses against unauthorized access, breaches, and other threats.</p></div><img src="/network_pentest.jpeg" class="page_serviceRight__7d2yB"/></div></div></section><section id="research" class="page_sectionResearch__jCAfj"><img class="page_logo__7fc9l" src="/logo.png"/><h2 class="page_title__3jonF">Research</h2><p class="page_description__86bsR">f In our Lab, we focus on the most challenging research, from browsers to operating systems. We are willing to undertake every challenge.<br/><br/>We are always open to hiring security researchers from all over the globe, Seniors and Juniors, we believe in building together a passionate team that works together in a flexible environment. If you feel that you are for it then contact us now!</p></section><section id="about" class="page_sectionAbout__faO_o"><img class="page_logo__7fc9l" src="/logo.png"/><h2 class="page_title__3jonF">About</h2><p class="page_description__86bsR">At F2PI, we are dedicated to securing the digital landscape by offering comprehensive cybersecurity solutions tailored to your business needs. With expertise in areas such as network and web application penetration testing, code review, and vulnerability assessments, we help safeguard your systems from potential threats and unauthorized access.<br/><br/>Our team of seasoned security professionals leverages cutting-edge technology and industry best practices to identify, assess, and mitigate risks. Whether you&#x27;re a small business or a large enterprise, our goal is to ensure your data and infrastructure remain protected in an ever-evolving cyber threat environment.<br/><br/>We believe in providing personalized service, actionable insights, and proactive measures that strengthen your security posture. Partner with us to enhance your defenses and secure your organization’s future.<br/><br/>Connect with us on <a class="page_link__36MaQ" target="_blank" href="https://www.linkedin.com/in/andres-lopez-luksenberg-9b48419/?originalSubdomain=ar" rel="nofollow">LinkedIn</a> to learn more about how we can secure your business.</p></section><section id="contact" class="Form_sectionContact__Z3iYS"><img class="Form_logo__yUCs_" src="/logo.png" alt="Logo"/><h3 class="Form_title__ZmK5w">Contact</h3><p class="Form_description__PI3sl">Get in touch with us to learn how we can enhance your cybersecurity strategy. Whether you have questions about our services or need a personalized consultation, we&#x27;re here to help protect your business from potential threats.</p><form><label for="name">Name:</label><br/><input type="text" id="name" required="" name="name" value=""/><br/><br/><label for="email">Email:</label><br/><input type="email" id="email" required="" name="email" value=""/><br/><br/><label for="message">Message:</label><br/><textarea id="message" name="message" required=""></textarea><br/><br/><input class="Form_button__eGWs3" type="submit" value="Send"/></form></section></div><div class="Footer_content__Fi1S7"><footer class=" Footer_container__Z8cUU"><div class="Footer_left___URpC"><span>F2PI</span><img class="Footer_image__s5k3j" src="logo.png"/></div><div class="Footer_center__SEQfr"><a class="Footer_item__XWvRu" href="#home">Home</a><a class="Footer_item__XWvRu" href="#services">Services</a><a class="Footer_item__XWvRu" href="#research">Research</a><a class="Footer_item__XWvRu" href="#about">About</a></div></footer><address class="Footer_address__Ndpfs">Address: Delawere, United States</address><address class="Footer_address__Ndpfs">Email: <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="3950575f56795f0b4950175a5654">[email&#160;protected]</a></address><br/><br/><address class="Footer_copy__IbaoR">2023 F2PI. All rights reserved.</address></div></main><script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="/_next/static/chunks/webpack-bde7d5f88f4596e1.js" async=""></script><script>(self.__next_f=self.__next_f||[]).push([0]);self.__next_f.push([2,null])</script><script>self.__next_f.push([1,"1:HL[\"/_next/static/media/0cf0e55cc0ef3777-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n2:HL[\"/_next/static/media/87efa1b92b3900d1-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n3:HL[\"/_next/static/css/57fe86bb1c7b7dfd.css\",\"style\"]\n4:HL[\"/_next/static/css/48cc6e06ca69c7ba.css\",\"style\"]\n"])</script><script>self.__next_f.push([1,"5:I[5751,[],\"\"]\n7:I[218,[\"931\",\"static/chunks/app/page-31911fabc7bfe29d.js\"],\"default\"]\n8:I[2511,[\"931\",\"static/chunks/app/page-31911fabc7bfe29d.js\"],\"default\"]\n9:I[9275,[],\"\"]\na:I[1343,[],\"\"]\nc:I[6130,[],\"\"]\nd:[]\n"])</script><script>self.__next_f.push([1,"0:[\"$\",\"$L5\",null,{\"buildId\":\"JmB5uGr3eOOj7ckQ2_w0J\",\"assetPrefix\":\"\",\"urlParts\":[\"\",\"\"],\"initialTree\":[\"\",{\"children\":[\"__PAGE__\",{}]},\"$undefined\",\"$undefined\",true],\"initialSeedData\":[\"\",{\"children\":[\"__PAGE__\",{},[[\"$L6\",[\"$\",\"main\",null,{\"className\":\"page_main__GlU4n\",\"children\":[[\"$\",\"header\",null,{\"className\":\"undefined Header_container__L4JQR\",\"children\":[[\"$\",\"div\",null,{\"className\":\"Header_left__MKmhq\",\"children\":[[\"$\",\"span\",null,{\"className\":\"$undefined\",\"children\":\"F2PI\"}],[\"$\",\"img\",null,{\"className\":\"Header_image__CGrsR\",\"src\":\"logo.png\"}]]}],[\"$\",\"div\",null,{\"className\":\"Header_center__GPZJ_\",\"children\":[[\"$\",\"a\",null,{\"className\":\"Header_item__v_KlF\",\"href\":\"#home\",\"children\":\"Home\"}],[\"$\",\"a\",null,{\"className\":\"Header_item__v_KlF\",\"href\":\"#services\",\"children\":\"Services\"}],[\"$\",\"a\",null,{\"className\":\"Header_item__v_KlF\",\"href\":\"#research\",\"children\":\"Research\"}],[\"$\",\"a\",null,{\"className\":\"Header_item__v_KlF\",\"href\":\"#about\",\"children\":\"About\"}]]}],[\"$\",\"a\",null,{\"className\":\"Header_item__v_KlF Header_highlighted__E7YXG\",\"href\":\"#contact\",\"children\":\"Contact\"}]]}],[\"$\",\"div\",null,{\"className\":\"page_content__kDoxQ\",\"children\":[[\"$\",\"section\",null,{\"id\":\"home\",\"className\":\"page_sectionHome__3UXpm\",\"children\":[[\"$\",\"img\",null,{\"className\":\"page_logo__7fc9l\",\"src\":\"/logo.png\"}],[\"$\",\"h2\",null,{\"className\":\"page_title__3jonF\",\"children\":\"Protect your business\"}],[\"$\",\"p\",null,{\"className\":\"page_description__86bsR\",\"children\":\"f2pi is a consultancy providing a wide range of information security professional services including penetration testing and security assessments, focused on research and innovation. We have over 15 years of experience working with well known international companies and governments\"}],[\"$\",\"$L7\",null,{}]]}],[\"$\",\"section\",null,{\"id\":\"services\",\"className\":\"page_sectionServices__7NEPb\",\"children\":[[\"$\",\"img\",null,{\"className\":\"page_logo__7fc9l\",\"src\":\"/logo.png\"}],[\"$\",\"h2\",null,{\"className\":\"page_title__3jonF\",\"children\":\"Services\"}],[\"$\",\"div\",null,{\"className\":\"$undefined\",\"children\":[[\"$\",\"div\",null,{\"className\":\"page_service__B7BiF\",\"children\":[[\"$\",\"div\",null,{\"className\":\"$undefined\",\"children\":[[\"$\",\"h3\",null,{\"className\":\"page_serviceTitle__O1IUx\",\"children\":\"Source Code Review\"}],[\"$\",\"p\",null,{\"className\":\"page_serviceDescription__VYzYW\",\"children\":[\"Our code review service identifies vulnerabilities and insecure coding practices in your software. We analyze your source code to detect security flaws, such as injection risks, buffer overflows, and improper access control.\",[\"$\",\"br\",null,{}],[\"$\",\"br\",null,{}],\"With expert insights and adherence to the latest security standards, we ensure your software is secure, resilient, and compliant. Get detailed reports and actionable recommendations to strengthen your code and reduce exposure to threats.\"]}]]}],[\"$\",\"img\",null,{\"src\":\"/code_review.webp\",\"className\":\"page_serviceRight__7d2yB\"}]]}],[\"$\",\"div\",null,{\"className\":\"page_service__B7BiF page_serviceInverted__hFJ9T\",\"children\":[[\"$\",\"div\",null,{\"className\":\"$undefined\",\"children\":[[\"$\",\"h3\",null,{\"className\":\"page_serviceTitle__O1IUx\",\"children\":\"Web Application Penetration Testing\"}],[\"$\",\"p\",null,{\"className\":\"page_serviceDescription__VYzYW\",\"children\":[\"Our web application penetration testing service simulates real-world attacks to uncover security vulnerabilities in your web apps. We assess potential weaknesses in your application’s design and implementation.\",[\"$\",\"br\",null,{}],[\"$\",\"br\",null,{}],\"With a focus on safeguarding your data and ensuring compliance, our expert team helps ensure your applications remain secure, reliable, and resistant to potential cyber threats.\"]}]]}],[\"$\",\"img\",null,{\"src\":\"/penetration_testing.jpeg\",\"className\":\"page_serviceRight__7d2yB\"}]]}],[\"$\",\"div\",null,{\"className\":\"page_service__B7BiF\",\"children\":[[\"$\",\"div\",null,{\"className\":\"$undefined\",\"children\":[[\"$\",\"h3\",null,{\"className\":\"page_serviceTitle__O1IUx\",\"children\":\"Network Penetration Testing\"}],[\"$\",\"p\",null,{\"className\":\"page_serviceDescription__VYzYW\",\"children\":[\"Our network penetration testing service simulates real-world attacks on your network infrastructure to identify vulnerabilities and security gaps. We assess the resilience of your network by testing firewalls, routers, and other critical components to uncover weaknesses that could be exploited by attackers.\",[\"$\",\"br\",null,{}],[\"$\",\"br\",null,{}],\"With a focus on ensuring network security and data protection, we provide a detailed report of our findings, along with actionable recommendations to help strengthen your defenses against unauthorized access, breaches, and other threats.\"]}]]}],[\"$\",\"img\",null,{\"src\":\"/network_pentest.jpeg\",\"className\":\"page_serviceRight__7d2yB\"}]]}]]}]]}],[\"$\",\"section\",null,{\"id\":\"research\",\"className\":\"page_sectionResearch__jCAfj\",\"children\":[[\"$\",\"img\",null,{\"className\":\"page_logo__7fc9l\",\"src\":\"/logo.png\"}],[\"$\",\"h2\",null,{\"className\":\"page_title__3jonF\",\"children\":\"Research\"}],[\"$\",\"p\",null,{\"className\":\"page_description__86bsR\",\"children\":[\"f In our Lab, we focus on the most challenging research, from browsers to operating systems. We are willing to undertake every challenge.\",[\"$\",\"br\",null,{}],[\"$\",\"br\",null,{}],\"We are always open to hiring security researchers from all over the globe, Seniors and Juniors, we believe in building together a passionate team that works together in a flexible environment. If you feel that you are for it then contact us now!\"]}]]}],[\"$\",\"section\",null,{\"id\":\"about\",\"className\":\"page_sectionAbout__faO_o\",\"children\":[[\"$\",\"img\",null,{\"className\":\"page_logo__7fc9l\",\"src\":\"/logo.png\"}],[\"$\",\"h2\",null,{\"className\":\"page_title__3jonF\",\"children\":\"About\"}],[\"$\",\"p\",null,{\"className\":\"page_description__86bsR\",\"children\":[\"At F2PI, we are dedicated to securing the digital landscape by offering comprehensive cybersecurity solutions tailored to your business needs. With expertise in areas such as network and web application penetration testing, code review, and vulnerability assessments, we help safeguard your systems from potential threats and unauthorized access.\",[\"$\",\"br\",null,{}],[\"$\",\"br\",null,{}],\"Our team of seasoned security professionals leverages cutting-edge technology and industry best practices to identify, assess, and mitigate risks. Whether you're a small business or a large enterprise, our goal is to ensure your data and infrastructure remain protected in an ever-evolving cyber threat environment.\",[\"$\",\"br\",null,{}],[\"$\",\"br\",null,{}],\"We believe in providing personalized service, actionable insights, and proactive measures that strengthen your security posture. Partner with us to enhance your defenses and secure your organization’s future.\",[\"$\",\"br\",null,{}],[\"$\",\"br\",null,{}],\"Connect with us on \",[\"$\",\"a\",null,{\"className\":\"page_link__36MaQ\",\"target\":\"_blank\",\"href\":\"https://www.linkedin.com/in/andres-lopez-luksenberg-9b48419/?originalSubdomain=ar\",\"rel\":\"nofollow\",\"children\":\"LinkedIn\"}],\" to learn more about how we can secure your business.\"]}]]}],[\"$\",\"$L8\",null,{}]]}],[\"$\",\"div\",null,{\"className\":\"Footer_content__Fi1S7\",\"children\":[[\"$\",\"footer\",null,{\"className\":\" Footer_container__Z8cUU\",\"children\":[[\"$\",\"div\",null,{\"className\":\"Footer_left___URpC\",\"children\":[[\"$\",\"span\",null,{\"className\":\"$undefined\",\"children\":\"F2PI\"}],[\"$\",\"img\",null,{\"className\":\"Footer_image__s5k3j\",\"src\":\"logo.png\"}]]}],[\"$\",\"div\",null,{\"className\":\"Footer_center__SEQfr\",\"children\":[[\"$\",\"a\",null,{\"className\":\"Footer_item__XWvRu\",\"href\":\"#home\",\"children\":\"Home\"}],[\"$\",\"a\",null,{\"className\":\"Footer_item__XWvRu\",\"href\":\"#services\",\"children\":\"Services\"}],[\"$\",\"a\",null,{\"className\":\"Footer_item__XWvRu\",\"href\":\"#research\",\"children\":\"Research\"}],[\"$\",\"a\",null,{\"className\":\"Footer_item__XWvRu\",\"href\":\"#about\",\"children\":\"About\"}]]}]]}],[\"$\",\"address\",null,{\"className\":\"Footer_address__Ndpfs\",\"children\":\"Address: Delawere, United States\"}],[\"$\",\"address\",null,{\"className\":\"Footer_address__Ndpfs\",\"children\":\"Email: [email protected]\"}],[\"$\",\"br\",null,{}],[\"$\",\"br\",null,{}],[\"$\",\"address\",null,{\"className\":\"Footer_copy__IbaoR\",\"children\":\"2023 F2PI. All rights reserved.\"}]]}]]}],[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/48cc6e06ca69c7ba.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}]]],null],null]},[[[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/57fe86bb1c7b7dfd.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}]],[\"$\",\"html\",null,{\"lang\":\"en\",\"children\":[[\"$\",\"head\",null,{\"children\":[[\"$\",\"link\",null,{\"rel\":\"apple-touch-icon\",\"sizes\":\"180x180\",\"href\":\"/apple-touch-icon.png\"}],[\"$\",\"link\",null,{\"rel\":\"icon\",\"type\":\"image/png\",\"sizes\":\"32x32\",\"href\":\"/favicon-32x32.png\"}],[\"$\",\"link\",null,{\"rel\":\"icon\",\"type\":\"image/png\",\"sizes\":\"16x16\",\"href\":\"/favicon-16x16.png\"}],[\"$\",\"link\",null,{\"rel\":\"manifest\",\"href\":\"/site.webmanifest\"}],[\"$\",\"link\",null,{\"rel\":\"mask-icon\",\"href\":\"/safari-pinned-tab.svg\",\"color\":\"#5bbad5\"}],[\"$\",\"meta\",null,{\"name\":\"msapplication-TileColor\",\"content\":\"#da532c\"}],[\"$\",\"meta\",null,{\"name\":\"theme-color\",\"content\":\"#ffffff\"}]]}],[\"$\",\"body\",null,{\"className\":\"__className_12ac45 Layout_container___pJn0\",\"children\":[\"$\",\"$L9\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$La\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":[[\"$\",\"title\",null,{\"children\":\"404: This page could not be found.\"}],[\"$\",\"div\",null,{\"style\":{\"fontFamily\":\"system-ui,\\\"Segoe UI\\\",Roboto,Helvetica,Arial,sans-serif,\\\"Apple Color Emoji\\\",\\\"Segoe UI Emoji\\\"\",\"height\":\"100vh\",\"textAlign\":\"center\",\"display\":\"flex\",\"flexDirection\":\"column\",\"alignItems\":\"center\",\"justifyContent\":\"center\"},\"children\":[\"$\",\"div\",null,{\"children\":[[\"$\",\"style\",null,{\"dangerouslySetInnerHTML\":{\"__html\":\"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}\"}}],[\"$\",\"h1\",null,{\"className\":\"next-error-h1\",\"style\":{\"display\":\"inline-block\",\"margin\":\"0 20px 0 0\",\"padding\":\"0 23px 0 0\",\"fontSize\":24,\"fontWeight\":500,\"verticalAlign\":\"top\",\"lineHeight\":\"49px\"},\"children\":\"404\"}],[\"$\",\"div\",null,{\"style\":{\"display\":\"inline-block\"},\"children\":[\"$\",\"h2\",null,{\"style\":{\"fontSize\":14,\"fontWeight\":400,\"lineHeight\":\"49px\",\"margin\":0},\"children\":\"This page could not be found.\"}]}]]}]}]],\"notFoundStyles\":[]}]}]]}]],null],null],\"couldBeIntercepted\":false,\"initialHead\":[null,\"$Lb\"],\"globalErrorComponent\":\"$c\",\"missingSlots\":\"$Wd\"}]\n"])</script><script>self.__next_f.push([1,"b:[[\"$\",\"meta\",\"0\",{\"name\":\"viewport\",\"content\":\"width=device-width, initial-scale=1\"}],[\"$\",\"meta\",\"1\",{\"charSet\":\"utf-8\"}],[\"$\",\"link\",\"2\",{\"rel\":\"icon\",\"href\":\"/favicon.ico\",\"type\":\"image/x-icon\",\"sizes\":\"16x16\"}],[\"$\",\"meta\",\"3\",{\"name\":\"next-size-adjust\"}]]\n6:null\n"])</script></body></html>                               

Alan adının whois bilgisi

Domain Name: F2PI.COM
Registry Domain ID: 2919300378_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.hostinger.com
Registrar URL: http://www.hostinger.com
Updated Date: 2025-04-03T21:45:16Z
Creation Date: 2024-09-23T17:10:21Z
Registry Expiry Date: 2026-09-23T17:10:21Z
Registrar: HOSTINGER operations, UAB
Registrar IANA ID: 1636
Registrar Abuse Contact Email: [email protected]
Registrar Abuse Contact Phone: +37064503378
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: ADELAIDE.NS.CLOUDFLARE.COM
Name Server: NEIL.NS.CLOUDFLARE.COM
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of whois database: 2025-05-26T04:00:50Z <<<
For more information on Whois status codes, please visit https://icann.org/epp
NOTICE: The expiration date displayed in this record is the date the
TERMS OF USE: You are not authorized to access or query our Whois
by the following terms of use: You agree that you may use this Data only
to: (1) allow, enable, or otherwise support the transmission of mass