last data update: 2011/10/18, 04:46

Website loading time

during the test: 0.08 s

cable connection (average): 0.14 s

DSL connection (average): 0.21 s

modem (average): 3.59 s

HTTP headers

Information about DNS servers

linux520.comMX10mxdomain.qq.comIN900
linux520.comA184.82.62.49IN900
linux520.comSOAns1.myhostadmin.netdnsconct.myhostadmin.net20100111603600 300 1209600 3600 IN 500
linux520.comNSns1.myhostadmin.netIN3600
linux520.comNSns4.myhostadmin.netIN3600
linux520.comNSns5.myhostadmin.netIN3600
linux520.comNSns6.myhostadmin.netIN3600
linux520.comNSns3.myhostadmin.netIN3600
linux520.comNSns2.myhostadmin.netIN3600

Received from the first DNS server

Request to the server "linux520.com"
You used the following DNS server:
DNS Name: ns1.myhostadmin.net
DNS Server Address: 203.171.239.123#53
DNS server aliases:

HEADER opcode: REQUEST, status: NOERROR, id: 43436
flag: qr aa rd ra REQUEST: 1, ANSWER: 9, AUTHORITY: 0, ADDITIONAL: 15

REQUEST SECTION:
linux520.com. IN ANY

ANSWER SECTION:
linux520.com. 500 IN SOA ns1.myhostadmin.net. dnsconct.myhostadmin.net. 2010011160 3600 300 1209600 3600
linux520.com. 3600 IN NS ns3.myhostadmin.net.
linux520.com. 3600 IN NS ns4.myhostadmin.net.
linux520.com. 3600 IN NS ns5.myhostadmin.net.
linux520.com. 3600 IN NS ns6.myhostadmin.net.
linux520.com. 3600 IN NS ns1.myhostadmin.net.
linux520.com. 3600 IN NS ns2.myhostadmin.net.
linux520.com. 900 IN A 184.82.62.49
linux520.com. 900 IN MX 10 mxdomain.qq.com.

SECTION NOTES:
ns1.myhostadmin.net. 900 IN A 203.171.239.123
ns1.myhostadmin.net. 900 IN A 118.123.15.40
ns1.myhostadmin.net. 900 IN A 118.123.15.41
ns2.myhostadmin.net. 900 IN A 118.123.15.42
ns2.myhostadmin.net. 900 IN A 61.139.126.206
ns3.myhostadmin.net. 900 IN A 61.139.126.206
ns3.myhostadmin.net. 900 IN A 118.123.15.42
ns3.myhostadmin.net. 900 IN A 203.171.239.123
ns4.myhostadmin.net. 900 IN A 118.123.249.18
ns4.myhostadmin.net. 900 IN A 118.123.249.53
ns5.myhostadmin.net. 900 IN A 203.171.239.123
ns5.myhostadmin.net. 900 IN A 118.123.15.40
ns5.myhostadmin.net. 900 IN A 118.123.15.41
ns6.myhostadmin.net. 900 IN A 118.123.249.18
ns6.myhostadmin.net. 900 IN A 118.123.249.53

Received 482 bytes from address 203.171.239.123#53 in 302 ms

Received from the second DNS server

Request to the server "linux520.com"
You used the following DNS server:
DNS Name: ns4.myhostadmin.net
DNS Server Address: 118.123.249.53#53
DNS server aliases:

HEADER opcode: REQUEST, status: NOERROR, id: 57200
flag: qr aa rd ra REQUEST: 1, ANSWER: 9, AUTHORITY: 0, ADDITIONAL: 15

REQUEST SECTION:
linux520.com. IN ANY

ANSWER SECTION:
linux520.com. 500 IN SOA ns1.myhostadmin.net. dnsconct.myhostadmin.net. 2010011160 3600 300 1209600 3600
linux520.com. 3600 IN NS ns4.myhostadmin.net.
linux520.com. 3600 IN NS ns5.myhostadmin.net.
linux520.com. 3600 IN NS ns6.myhostadmin.net.
linux520.com. 3600 IN NS ns1.myhostadmin.net.
linux520.com. 3600 IN NS ns2.myhostadmin.net.
linux520.com. 3600 IN NS ns3.myhostadmin.net.
linux520.com. 900 IN A 184.82.62.49
linux520.com. 900 IN MX 10 mxdomain.qq.com.

SECTION NOTES:
ns1.myhostadmin.net. 900 IN A 118.123.15.41
ns1.myhostadmin.net. 900 IN A 203.171.239.123
ns1.myhostadmin.net. 900 IN A 118.123.15.40
ns2.myhostadmin.net. 900 IN A 61.139.126.206
ns2.myhostadmin.net. 900 IN A 118.123.15.42
ns3.myhostadmin.net. 900 IN A 61.139.126.206
ns3.myhostadmin.net. 900 IN A 118.123.15.42
ns3.myhostadmin.net. 900 IN A 203.171.239.123
ns4.myhostadmin.net. 900 IN A 118.123.249.53
ns4.myhostadmin.net. 900 IN A 118.123.249.18
ns5.myhostadmin.net. 900 IN A 203.171.239.123
ns5.myhostadmin.net. 900 IN A 118.123.15.40
ns5.myhostadmin.net. 900 IN A 118.123.15.41
ns6.myhostadmin.net. 900 IN A 118.123.249.53
ns6.myhostadmin.net. 900 IN A 118.123.249.18

Received 482 bytes from address 118.123.249.53#53 in 294 ms

Subdomains (the first 50)

Typos (misspells)

kinux520.com
pinux520.com
oinux520.com
lunux520.com
ljnux520.com
lknux520.com
lonux520.com
l9nux520.com
l8nux520.com
libux520.com
limux520.com
lijux520.com
lihux520.com
linyx520.com
linhx520.com
linjx520.com
linix520.com
lin8x520.com
lin7x520.com
linuz520.com
linuc520.com
linud520.com
linus520.com
linux420.com
linuxr20.com
linuxt20.com
linux620.com
linux510.com
linux5q0.com
linux5w0.com
linux530.com
linux529.com
linux52o.com
linux52p.com
linux52-.com
inux520.com
lnux520.com
liux520.com
linx520.com
linu520.com
linux20.com
linux50.com
linux52.com
ilnux520.com
lniux520.com
liunx520.com
linxu520.com
linu5x20.com
linux250.com
linux502.com
llinux520.com
liinux520.com
linnux520.com
linuux520.com
linuxx520.com
linux5520.com
linux5220.com
linux5200.com

Location

IP: 184.82.62.49

continent: NA, country: United States (USA), city: Scranton

Website value

rank in the traffic statistics:

There is not enough data to estimate website value.

Basic information

website build using CSS

code weight: 24.59 KB

text per all code ratio: 29 %

title: Linux安全网--linux攻防 linux黑客 linux渗透 web渗透 攻击数据库

description:

keywords:

encoding: gb2312

language: en

Website code analysis

one word phrases repeated minimum three times

PhraseQuantity
XSS4
入侵天涯社区现场(最新视频)3
Metasploit3
Nmap3

two word phrases repeated minimum three times

three word phrases repeated minimum three times

B tags

U tags

I tags

images

file namealternative text
pykeylogger
日本真实网站入侵得到root权限(最新视频)
Linux后门制作
入侵天涯社区现场(最新视频)
BackTrack系列视频--BackTrack的安装
漏洞挖掘分析
人工寻找开源漏洞实战
Hacking python dll注射
通过MSF利用最新IE最新溢出漏洞
Linux安全漏洞演示与解决方案
SYN attacks 攻击与部份解决方案
Crack WPA
利用CGI漏洞入侵,提权,装后门,清日志
Metasploit Framework系列视频教程:What
Exploit iepeers vul whith ettercap
hydra远程破解smb协议
Use MS11-050 & Metasploit Fuck World
Metasploit&Armitage Hacking For Linux
BACKTRACK5的安装
hping的简单使用
Crack Tomcat RSA Authorized
BT5下burp破解webshell密码
WebShell攻防站之命令执行
Linux下远程协程之Screen篇
Nmap hacker 入侵
BT4下Paros的使用,curl和nikto.pl的简单介绍
如何破解Https协议(hacking python)
fcrackzip破解zip文件密码
在本机连接使用linux虚拟机

headers

H1

H2

H3

H4

热门推荐

最近更新

原创视频排行榜

Linux安全网原创

国外视频排行榜

H5

H6

internal links

addressanchor text
Linux安全网
提交视频
设为首页
加入收藏
首页
渗透测试
安全防护
最新漏洞
编程语言
国外视频
新手入门
关于我们
论坛
pykeylogger
日本真实网站入侵得到root权限(最新视频)
Linux后门制作
入侵天涯社区现场(最新视频)
BackTrack系列视频--BackTrack的安装
漏洞挖掘分析
人工寻找开源漏洞实战
Hacking python dll注射
通过MSF利用最新IE最新溢出漏洞
Linux安全漏洞演示与解决方案
SYN attacks 攻击与部份解决方案
Crack WPA
利用CGI漏洞入侵,提权,装后门,清日志
Metasploit Framework系列视频教程:What
Exploit iepeers vul whith ettercap
hydra远程破解smb协议
hydra远程破解smb协议
hydra远程破解smb协议
Use MS11-050 & Metasploit Fuck World
Metasploit&Armitage Hacking For Linux
BACKTRACK5的安装
XSS Attack - Busting Browsers to Root!
hping的简单使用
db_autopwn using postgresql in backtrack 5
Oracle HTTP Server XSS Header Injection
fackbook sql lnjection
路由器安全(backtrack5 arm on droid incredible)
Crack Tomcat RSA Authorized
Nmap Evasion Technique(穿透防火墙)
Pizza Hut Australia - XSS Vulnerability
New York Times XSS Vulnerability
Advance Nmap With Script Engine
Sql Injection Upload Php Shell Via Mysql
如何加密PHP的后门
穿透Snort
Voip Attacks with Sipvicious
iPhone4 with metasploit
How to use Metasploit on iPhone 4 iOS 4.2.1 via SSH
入侵天涯社区现场(最新视频)
入侵天涯社区现场(最新视频)
入侵天涯社区现场(最新视频)
日本真实网站入侵得到root权限(最
BackTrack系列视频--BackTrack的
Nmap hacker 入侵
Linux后门制作
backtrack入侵实战教程
Metasploit Framework系列视频教
Metasploit实战教程
U盘入侵
漏洞挖掘分析
通过MSF利用最新IE最新溢出漏洞
如何破解Https协议(hacking pyth
BackTrack系列视频--dmitry
入侵实战之windows快捷方式漏洞
pykeylogger
BackTrack系列视频--Angry+IPSca
在本机连接使用linux虚拟机
利用CGI漏洞入侵,提权,装后门,清
人工寻找开源漏洞实战
BT5下burp破解webshell密码
使用msf 入侵winxp
更多视频
hydra远程破解smb协议
Use MS11-050 & Metasploit Fuck World
Metasploit&Armitage Hacking For Linux
BACKTRACK5的安装
hping的简单使用
Crack Tomcat RSA Authorized
BT5下burp破解webshell密码
WebShell攻防站之命令执行
Linux下远程协程之Screen篇
Nmap hacker 入侵
BT4下Paros的使用,curl和nikto.pl的简单介绍
如何破解Https协议(hacking python)
pykeylogger
fcrackzip破解zip文件密码
在本机连接使用linux虚拟机
XSS Attack - Busting Browsers to Root!
XSS Attack - Busting Browsers to Root!
linux入侵windows----Metasploit
手机安全---实时窃听
使用msf攻击android

external links

addressanchor text
安全服务
安全服务
安全服务