MENU
last data update: 2011/10/18, 04:46
Website loading time
during the test: 0.08 s
cable connection (average): 0.14 s
DSL connection (average): 0.21 s
modem (average): 3.59 s
HTTP headers
HTTP/1.1 200 OK
Date: Tue, 18 Oct 2011 11:46:02 GMT
Server: Apache
Last-Modified: Sun, 18 Sep 2011 03:17:47 GMT
ETag: "5b100a0-625d-abaa2cc0"
Accept-Ranges: bytes
Content-Length: 25181
Connection: close
Content-Type: text/html
Information about DNS servers
linux520.com | MX | 10 | mxdomain.qq.com | IN | 900 |
linux520.com | A | 184.82.62.49 | IN | 900 | |
linux520.com | SOA | ns1.myhostadmin.net | dnsconct.myhostadmin.net | 2010011160 | 3600 300 1209600 3600 IN 500 |
linux520.com | NS | ns1.myhostadmin.net | IN | 3600 | |
linux520.com | NS | ns4.myhostadmin.net | IN | 3600 | |
linux520.com | NS | ns5.myhostadmin.net | IN | 3600 | |
linux520.com | NS | ns6.myhostadmin.net | IN | 3600 | |
linux520.com | NS | ns3.myhostadmin.net | IN | 3600 | |
linux520.com | NS | ns2.myhostadmin.net | IN | 3600 |
Received from the first DNS server
Request to the server "linux520.com"
You used the following DNS server:
DNS Name: ns1.myhostadmin.net
DNS Server Address: 203.171.239.123#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 43436
flag: qr aa rd ra REQUEST: 1, ANSWER: 9, AUTHORITY: 0, ADDITIONAL: 15
REQUEST SECTION:
linux520.com. IN ANY
ANSWER SECTION:
linux520.com. 500 IN SOA ns1.myhostadmin.net. dnsconct.myhostadmin.net. 2010011160 3600 300 1209600 3600
linux520.com. 3600 IN NS ns3.myhostadmin.net.
linux520.com. 3600 IN NS ns4.myhostadmin.net.
linux520.com. 3600 IN NS ns5.myhostadmin.net.
linux520.com. 3600 IN NS ns6.myhostadmin.net.
linux520.com. 3600 IN NS ns1.myhostadmin.net.
linux520.com. 3600 IN NS ns2.myhostadmin.net.
linux520.com. 900 IN A 184.82.62.49
linux520.com. 900 IN MX 10 mxdomain.qq.com.
SECTION NOTES:
ns1.myhostadmin.net. 900 IN A 203.171.239.123
ns1.myhostadmin.net. 900 IN A 118.123.15.40
ns1.myhostadmin.net. 900 IN A 118.123.15.41
ns2.myhostadmin.net. 900 IN A 118.123.15.42
ns2.myhostadmin.net. 900 IN A 61.139.126.206
ns3.myhostadmin.net. 900 IN A 61.139.126.206
ns3.myhostadmin.net. 900 IN A 118.123.15.42
ns3.myhostadmin.net. 900 IN A 203.171.239.123
ns4.myhostadmin.net. 900 IN A 118.123.249.18
ns4.myhostadmin.net. 900 IN A 118.123.249.53
ns5.myhostadmin.net. 900 IN A 203.171.239.123
ns5.myhostadmin.net. 900 IN A 118.123.15.40
ns5.myhostadmin.net. 900 IN A 118.123.15.41
ns6.myhostadmin.net. 900 IN A 118.123.249.18
ns6.myhostadmin.net. 900 IN A 118.123.249.53
Received 482 bytes from address 203.171.239.123#53 in 302 ms
Received from the second DNS server
Request to the server "linux520.com"
You used the following DNS server:
DNS Name: ns4.myhostadmin.net
DNS Server Address: 118.123.249.53#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 57200
flag: qr aa rd ra REQUEST: 1, ANSWER: 9, AUTHORITY: 0, ADDITIONAL: 15
REQUEST SECTION:
linux520.com. IN ANY
ANSWER SECTION:
linux520.com. 500 IN SOA ns1.myhostadmin.net. dnsconct.myhostadmin.net. 2010011160 3600 300 1209600 3600
linux520.com. 3600 IN NS ns4.myhostadmin.net.
linux520.com. 3600 IN NS ns5.myhostadmin.net.
linux520.com. 3600 IN NS ns6.myhostadmin.net.
linux520.com. 3600 IN NS ns1.myhostadmin.net.
linux520.com. 3600 IN NS ns2.myhostadmin.net.
linux520.com. 3600 IN NS ns3.myhostadmin.net.
linux520.com. 900 IN A 184.82.62.49
linux520.com. 900 IN MX 10 mxdomain.qq.com.
SECTION NOTES:
ns1.myhostadmin.net. 900 IN A 118.123.15.41
ns1.myhostadmin.net. 900 IN A 203.171.239.123
ns1.myhostadmin.net. 900 IN A 118.123.15.40
ns2.myhostadmin.net. 900 IN A 61.139.126.206
ns2.myhostadmin.net. 900 IN A 118.123.15.42
ns3.myhostadmin.net. 900 IN A 61.139.126.206
ns3.myhostadmin.net. 900 IN A 118.123.15.42
ns3.myhostadmin.net. 900 IN A 203.171.239.123
ns4.myhostadmin.net. 900 IN A 118.123.249.53
ns4.myhostadmin.net. 900 IN A 118.123.249.18
ns5.myhostadmin.net. 900 IN A 203.171.239.123
ns5.myhostadmin.net. 900 IN A 118.123.15.40
ns5.myhostadmin.net. 900 IN A 118.123.15.41
ns6.myhostadmin.net. 900 IN A 118.123.249.53
ns6.myhostadmin.net. 900 IN A 118.123.249.18
Received 482 bytes from address 118.123.249.53#53 in 294 ms
Subdomains (the first 50)
Typos (misspells)
kinux520.com pinux520.com oinux520.com lunux520.com ljnux520.com lknux520.com lonux520.com l9nux520.com l8nux520.com libux520.com limux520.com lijux520.com lihux520.com linyx520.com linhx520.com linjx520.com linix520.com lin8x520.com lin7x520.com linuz520.com | linuc520.com linud520.com linus520.com linux420.com linuxr20.com linuxt20.com linux620.com linux510.com linux5q0.com linux5w0.com linux530.com linux529.com linux52o.com linux52p.com linux52-.com inux520.com lnux520.com liux520.com linx520.com linu520.com | linux20.com linux50.com linux52.com ilnux520.com lniux520.com liunx520.com linxu520.com linu5x20.com linux250.com linux502.com llinux520.com liinux520.com linnux520.com linuux520.com linuxx520.com linux5520.com linux5220.com linux5200.com |
Location
IP: 184.82.62.49
continent: NA, country: United States (USA), city: Scranton
Website value
rank in the traffic statistics:
There is not enough data to estimate website value.
Basic information
website build using CSS
code weight: 24.59 KB
text per all code ratio: 29 %
title: Linux安全网--linux攻防 linux黑客 linux渗透 web渗透 攻击数据库
description:
keywords:
encoding: gb2312
language: en
Website code analysis
one word phrases repeated minimum three times
Phrase | Quantity |
---|---|
XSS | 4 |
入侵天涯社区现场(最新视频) | 3 |
Metasploit | 3 |
Nmap | 3 |
two word phrases repeated minimum three times
three word phrases repeated minimum three times
B tags
U tags
I tags
images
file name | alternative text |
---|---|
ad72bd1ae65f3cf01ba3981f88a11890.jpg | pykeylogger |
dfa891557a5fdbc03acd725bee008f08.jpg | 日本真实网站入侵得到root权限(最新视频) |
0b661a870926d8663065a7fe4c0fb9be.jpg | Linux后门制作 |
296b32da54550f72535f0dfaf32e9dad.jpg | 入侵天涯社区现场(最新视频) |
small12b61a6e4e69da22d9d3872e8df2dfaa.jpg | BackTrack系列视频--BackTrack的安装 |
9ad9524fdeca8e07d46aa4a23d294e9a.jpg | 漏洞挖掘分析 |
6f46fcbe19347e59e4945798203629fd.jpg | 人工寻找开源漏洞实战 |
d21330c9ab918852f51479d3092aac1e.jpg | Hacking python dll注射 |
641b2ff4197936ce50b8f2cc001c3572.jpg | 通过MSF利用最新IE最新溢出漏洞 |
047b2db754c605fd425a5608dba4e8dd.jpg | Linux安全漏洞演示与解决方案 |
509c2ed7d4dd94ed375872afb54c6425.jpg | SYN attacks 攻击与部份解决方案 |
cf5d1ce75306e32a9754109ba45142f0.jpg | Crack WPA |
1bd12285db7b7ef95d8de3b8dab60426.jpg | 利用CGI漏洞入侵,提权,装后门,清日志 |
smallecbdd4b16d885d4a24060f047aabd23c.jpg | Metasploit Framework系列视频教程:What |
ef8f47fce7da4cadefb22f3b28dbcfd0.jpg | Exploit iepeers vul whith ettercap |
6d045a97c55ac700a56425d77dec0c7d.jpg | hydra远程破解smb协议 |
2bbc8c00a7a896afa69cffd0e397a73f.jpg | Use MS11-050 & Metasploit Fuck World |
12b61a6e4e69da22d9d3872e8df2dfaa.jpg | Metasploit&Armitage Hacking For Linux |
d011a3e12b39ae3b3106ac014c500c74.jpg | BACKTRACK5的安装 |
a4024e2abf311220c980e2580f787b3b.jpg | hping的简单使用 |
71eb78a9cb7c327ac3468548ad7b6e08.jpg | Crack Tomcat RSA Authorized |
fbc8ab3cc4038e7bcd8cc8f63bd7198b.jpg | BT5下burp破解webshell密码 |
eaea830b061524daca9dedfa42f0c5a6.jpg | WebShell攻防站之命令执行 |
ce58c7b3a6add257af0e1db7f36389e4.jpg | Linux下远程协程之Screen篇 |
4b0bc86c18a73b591b5c584e68d60fa1.jpg | Nmap hacker 入侵 |
c20279022a184325ddf613ee882d9262.jpg | BT4下Paros的使用,curl和nikto.pl的简单介绍 |
98c249257649e8ce233fa81bcdae95b6.jpg | 如何破解Https协议(hacking python) |
5e346b4d846dabb84ed8afa834d27792.jpg | fcrackzip破解zip文件密码 |
2291bfa3171a66c1f47eeaf916b33e9d.jpg | 在本机连接使用linux虚拟机 |
headers
H1
H2
H3
H4
热门推荐
最近更新
原创视频排行榜
Linux安全网原创
国外视频排行榜
H5
H6
internal links
address | anchor text |
---|---|
/ | Linux安全网 |
http://www.linux520.com/upload.html | 提交视频 |
#ecms | 设为首页 |
#ecms | 加入收藏 |
/ | 首页 |
/stcs/ | 渗透测试 |
/aqfh/ | 安全防护 |
/zxld/ | 最新漏洞 |
/bcyy/ | 编程语言 |
/gwsp/ | 国外视频 |
/xsrm/ | 新手入门 |
http://www.linux520.com/about.html | 关于我们 |
http://www.linux520.com/bbs/ | 论坛 |
/bcyy/2011-02-24/160.html | pykeylogger |
/stcs/2011-01-14/124.html | 日本真实网站入侵得到root权限(最新视频) |
/stcs/2011-01-14/122.html | Linux后门制作 |
/stcs/2011-01-13/116.html | 入侵天涯社区现场(最新视频) |
/xsrm/2011-01-13/115.html | BackTrack系列视频--BackTrack的安装 |
/bcyy/2011-01-09/83.html | 漏洞挖掘分析 |
/bcyy/2011-01-08/74.html | 人工寻找开源漏洞实战 |
/bcyy/2011-01-08/73.html | Hacking python dll注射 |
/zxld/2011-01-08/53.html | 通过MSF利用最新IE最新溢出漏洞 |
/zxld/2011-01-08/52.html | Linux安全漏洞演示与解决方案 |
/aqfh/2011-01-08/50.html | SYN attacks 攻击与部份解决方案 |
/stcs/2011-01-08/41.html | Crack WPA |
/stcs/2011-01-08/39.html | 利用CGI漏洞入侵,提权,装后门,清日志 |
/stcs/2011-01-08/37.html | Metasploit Framework系列视频教程:What |
/stcs/2011-01-08/36.html | Exploit iepeers vul whith ettercap |
/stcs/2011-09-18/213.html | hydra远程破解smb协议 |
/stcs/2011-09-18/213.html | hydra远程破解smb协议 |
/stcs/2011-09-18/213.html | hydra远程破解smb协议 |
/stcs/2011-09-18/212.html | Use MS11-050 & Metasploit Fuck World |
/stcs/2011-08-26/211.html | Metasploit&Armitage Hacking For Linux |
/xsrm/2011-08-06/210.html | BACKTRACK5的安装 |
/gwsp/2011-07-26/209.html | XSS Attack - Busting Browsers to Root! |
/stcs/2011-07-21/208.html | hping的简单使用 |
/gwsp/2011-07-15/207.html | db_autopwn using postgresql in backtrack 5 |
/gwsp/2011-07-14/206.html | Oracle HTTP Server XSS Header Injection |
/gwsp/2011-07-11/205.html | fackbook sql lnjection |
/gwsp/2011-07-11/204.html | 路由器安全(backtrack5 arm on droid incredible) |
/stcs/2011-07-09/203.html | Crack Tomcat RSA Authorized |
/gwsp/2011-07-06/202.html | Nmap Evasion Technique(穿透防火墙) |
/gwsp/2011-07-05/201.html | Pizza Hut Australia - XSS Vulnerability |
/gwsp/2011-07-05/200.html | New York Times XSS Vulnerability |
/gwsp/2011-07-04/199.html | Advance Nmap With Script Engine |
/gwsp/2011-07-02/198.html | Sql Injection Upload Php Shell Via Mysql |
/gwsp/2011-07-02/197.html | 如何加密PHP的后门 |
/gwsp/2011-07-01/196.html | 穿透Snort |
/gwsp/2011-07-01/195.html | Voip Attacks with Sipvicious |
/gwsp/2011-06-29/194.html | iPhone4 with metasploit |
/gwsp/2011-06-29/193.html | How to use Metasploit on iPhone 4 iOS 4.2.1 via SSH |
/stcs/2011-01-13/116.html | 入侵天涯社区现场(最新视频) |
/stcs/2011-01-13/116.html | 入侵天涯社区现场(最新视频) |
/stcs/2011-01-13/116.html | 入侵天涯社区现场(最新视频) |
/stcs/2011-01-14/124.html | 日本真实网站入侵得到root权限(最 |
/xsrm/2011-01-13/115.html | BackTrack系列视频--BackTrack的 |
/stcs/2011-04-13/183.html | Nmap hacker 入侵 |
/stcs/2011-01-14/122.html | Linux后门制作 |
/stcs/2011-01-08/33.html | backtrack入侵实战教程 |
/stcs/2011-01-08/37.html | Metasploit Framework系列视频教 |
/stcs/2011-01-08/34.html | Metasploit实战教程 |
/stcs/2011-01-08/29.html | U盘入侵 |
/bcyy/2011-01-09/83.html | 漏洞挖掘分析 |
/zxld/2011-01-08/53.html | 通过MSF利用最新IE最新溢出漏洞 |
/stcs/2011-03-18/174.html | 如何破解Https协议(hacking pyth |
/xsrm/2011-01-15/130.html | BackTrack系列视频--dmitry |
/stcs/2011-01-08/26.html | 入侵实战之windows快捷方式漏洞 |
/bcyy/2011-02-24/160.html | pykeylogger |
/xsrm/2011-01-15/129.html | BackTrack系列视频--Angry+IPSca |
/xsrm/2011-01-29/152.html | 在本机连接使用linux虚拟机 |
/stcs/2011-01-08/39.html | 利用CGI漏洞入侵,提权,装后门,清 |
/bcyy/2011-01-08/74.html | 人工寻找开源漏洞实战 |
/stcs/2011-06-16/191.html | BT5下burp破解webshell密码 |
/stcs/2011-01-13/117.html | 使用msf 入侵winxp |
/stcs/ | 更多视频 |
/stcs/2011-09-18/213.html | hydra远程破解smb协议 |
/stcs/2011-09-18/212.html | Use MS11-050 & Metasploit Fuck World |
/stcs/2011-08-26/211.html | Metasploit&Armitage Hacking For Linux |
/xsrm/2011-08-06/210.html | BACKTRACK5的安装 |
/stcs/2011-07-21/208.html | hping的简单使用 |
/stcs/2011-07-09/203.html | Crack Tomcat RSA Authorized |
/stcs/2011-06-16/191.html | BT5下burp破解webshell密码 |
/aqfh/2011-06-11/189.html | WebShell攻防站之命令执行 |
/xsrm/2011-05-05/187.html | Linux下远程协程之Screen篇 |
/stcs/2011-04-13/183.html | Nmap hacker 入侵 |
/stcs/2011-04-11/181.html | BT4下Paros的使用,curl和nikto.pl的简单介绍 |
/stcs/2011-03-18/174.html | 如何破解Https协议(hacking python) |
/bcyy/2011-02-24/160.html | pykeylogger |
/stcs/2011-02-20/159.html | fcrackzip破解zip文件密码 |
/xsrm/2011-01-29/152.html | 在本机连接使用linux虚拟机 |
/gwsp/2011-07-26/209.html | XSS Attack - Busting Browsers to Root! |
/gwsp/2011-07-26/209.html | XSS Attack - Busting Browsers to Root! |
/gwsp/2011-03-28/178.html | linux入侵windows----Metasploit |
/gwsp/2011-01-26/151.html | 手机安全---实时窃听 |
/gwsp/2011-01-11/107.html | 使用msf攻击android |
external links
address | anchor text |
---|---|
http://www.anti-sec.cn | 安全服务 |
http://www.anti-sec.cn | 安全服务 |
http://www.anti-sec.cn | 安全服务 |