MENU
last data update: 2011/10/20, 22:40
Website loading time
during the test: 1.08 s
cable connection (average): 1.14 s
DSL connection (average): 1.19 s
modem (average): 4.21 s
HTTP headers
HTTP/1.1 301 Moved Permanently
Date: Fri, 21 Oct 2011 05:40:34 GMT
Server: Apache/2.2.16 (Debian)
Location: http://www.tigersecurity.it
Vary: Accept-Encoding
Content-Length: 317
Connection: close
Content-Type: text/html; charset=iso-8859-1
HTTP/1.1 200 OK
Date: Fri, 21 Oct 2011 05:40:34 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Pingback: http://www.tigersecurity.it/xmlrpc.php
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Set-Cookie: PHPSESSID=a7b8a3bf1d7a6a776d05687a92f523fc; path=/
Connection: close
Information about DNS servers
tigersecurity.it | TXT | google-site-verification=ZYrA8A9lqgvqA7ifoT21YFm4OOc2Z6wmGn3nL_CLnG0 | Array | IN | 43200 |
tigersecurity.it | A | 94.23.68.252 | IN | 43200 | |
tigersecurity.it | MX | 50 | alt1.aspmx.l.google.com | IN | 43200 |
tigersecurity.it | MX | 50 | alt2.aspmx.l.google.com | IN | 43200 |
tigersecurity.it | MX | 100 | aspmx2.googlemail.com | IN | 43200 |
tigersecurity.it | MX | 100 | aspmx3.googlemail.com | IN | 43200 |
tigersecurity.it | MX | 100 | aspmx4.googlemail.com | IN | 43200 |
tigersecurity.it | MX | 100 | aspmx5.googlemail.com | IN | 43200 |
tigersecurity.it | MX | 10 | aspmx.l.google.com | IN | 43200 |
tigersecurity.it | SOA | dns16.ovh.net | tech.ovh.net | 2011100800 | 86400 3600 3600000 86400 IN 43200 |
tigersecurity.it | NS | dns16.ovh.net | IN | 43200 | |
tigersecurity.it | NS | ns16.ovh.net | IN | 43200 |
Received from the first DNS server
Request to the server "tigersecurity.it"
You used the following DNS server:
DNS Name: dns16.ovh.net
DNS Server Address: 213.251.188.135#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 8868
flag: qr aa rd REQUEST: 1, ANSWER: 12, AUTHORITY: 0, ADDITIONAL: 4
REQUEST SECTION:
tigersecurity.it. IN ANY
ANSWER SECTION:
tigersecurity.it. 86400 IN SOA dns16.ovh.net. tech.ovh.net. 2011100800 86400 3600 3600000 86400
tigersecurity.it. 86400 IN NS ns16.ovh.net.
tigersecurity.it. 86400 IN NS dns16.ovh.net.
tigersecurity.it. 86400 IN MX 100 aspmx2.googlemail.com.
tigersecurity.it. 86400 IN MX 100 aspmx3.googlemail.com.
tigersecurity.it. 86400 IN MX 100 aspmx4.googlemail.com.
tigersecurity.it. 86400 IN MX 100 aspmx5.googlemail.com.
tigersecurity.it. 86400 IN MX 10 aspmx.l.google.com.
tigersecurity.it. 86400 IN MX 50 alt1.aspmx.l.google.com.
tigersecurity.it. 86400 IN MX 50 alt2.aspmx.l.google.com.
tigersecurity.it. 86400 IN A 94.23.68.252
tigersecurity.it. 86400 IN TXT "google-site-verification=ZYrA8A9lqgvqA7ifoT21YFm4OOc2Z6wmGn3nL_CLnG0"
SECTION NOTES:
ns16.ovh.net. 86400 IN A 213.251.128.135
ns16.ovh.net. 86400 IN AAAA 2001:41d0:1:1987::1
dns16.ovh.net. 86400 IN A 213.251.188.135
dns16.ovh.net. 86400 IN AAAA 2001:41d0:1:4a87::1
Received 485 bytes from address 213.251.188.135#53 in 137 ms
Received from the second DNS server
Request to the server "tigersecurity.it"
You used the following DNS server:
DNS Name: ns16.ovh.net
DNS Server Address: 213.251.128.135#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 65507
flag: qr aa rd REQUEST: 1, ANSWER: 12, AUTHORITY: 0, ADDITIONAL: 4
REQUEST SECTION:
tigersecurity.it. IN ANY
ANSWER SECTION:
tigersecurity.it. 86400 IN SOA dns16.ovh.net. tech.ovh.net. 2011100800 86400 3600 3600000 86400
tigersecurity.it. 86400 IN NS dns16.ovh.net.
tigersecurity.it. 86400 IN NS ns16.ovh.net.
tigersecurity.it. 86400 IN MX 100 aspmx5.googlemail.com.
tigersecurity.it. 86400 IN MX 10 aspmx.l.google.com.
tigersecurity.it. 86400 IN MX 50 alt1.aspmx.l.google.com.
tigersecurity.it. 86400 IN MX 50 alt2.aspmx.l.google.com.
tigersecurity.it. 86400 IN MX 100 aspmx2.googlemail.com.
tigersecurity.it. 86400 IN MX 100 aspmx3.googlemail.com.
tigersecurity.it. 86400 IN MX 100 aspmx4.googlemail.com.
tigersecurity.it. 86400 IN A 94.23.68.252
tigersecurity.it. 86400 IN TXT "google-site-verification=ZYrA8A9lqgvqA7ifoT21YFm4OOc2Z6wmGn3nL_CLnG0"
SECTION NOTES:
ns16.ovh.net. 86400 IN A 213.251.128.135
ns16.ovh.net. 86400 IN AAAA 2001:41d0:1:1987::1
dns16.ovh.net. 86400 IN A 213.251.188.135
dns16.ovh.net. 86400 IN AAAA 2001:41d0:1:4a87::1
Received 485 bytes from address 213.251.128.135#53 in 138 ms
Subdomains (the first 50)
Typos (misspells)
rigersecurity.it figersecurity.it gigersecurity.it yigersecurity.it 6igersecurity.it 5igersecurity.it tugersecurity.it tjgersecurity.it tkgersecurity.it togersecurity.it t9gersecurity.it t8gersecurity.it tifersecurity.it tiversecurity.it tibersecurity.it tihersecurity.it tiyersecurity.it titersecurity.it tigwrsecurity.it tigsrsecurity.it tigdrsecurity.it tigrrsecurity.it tig4rsecurity.it tig3rsecurity.it tigeesecurity.it tigedsecurity.it tigefsecurity.it tigetsecurity.it tige5security.it tige4security.it tigeraecurity.it tigerzecurity.it tigerxecurity.it tigerdecurity.it tigereecurity.it tigerwecurity.it tigerswcurity.it tigersscurity.it | tigersdcurity.it tigersrcurity.it tigers4curity.it tigers3curity.it tigersexurity.it tigersevurity.it tigersefurity.it tigersedurity.it tigersecyrity.it tigersechrity.it tigersecjrity.it tigersecirity.it tigersec8rity.it tigersec7rity.it tigersecueity.it tigersecudity.it tigersecufity.it tigersecutity.it tigersecu5ity.it tigersecu4ity.it tigersecuruty.it tigersecurjty.it tigersecurkty.it tigersecuroty.it tigersecur9ty.it tigersecur8ty.it tigersecuriry.it tigersecurify.it tigersecurigy.it tigersecuriyy.it tigersecuri6y.it tigersecuri5y.it tigersecuritt.it tigersecuritg.it tigersecurith.it tigersecuritu.it tigersecurit7.it tigersecurit6.it | igersecurity.it tgersecurity.it tiersecurity.it tigrsecurity.it tigesecurity.it tigerecurity.it tigerscurity.it tigerseurity.it tigersecrity.it tigersecuity.it tigersecurty.it tigersecuriy.it tigersecurit.it itgersecurity.it tgiersecurity.it tiegrsecurity.it tigresecurity.it tigesrecurity.it tigerescurity.it tigersceurity.it tigerseucrity.it tigersecruity.it tigersecuirty.it tigersecurtiy.it tigersecuriyt.it ttigersecurity.it tiigersecurity.it tiggersecurity.it tigeersecurity.it tigerrsecurity.it tigerssecurity.it tigerseecurity.it tigerseccurity.it tigersecuurity.it tigersecurrity.it tigersecuriity.it tigersecuritty.it tigersecurityy.it |
Location
IP: 94.23.68.252
continent: EU, country: Italy (ITA), city:
Website value
rank in the traffic statistics:
There is not enough data to estimate website value.
Basic information
website build using CSS
code weight: 21.93 KB
text per all code ratio: 12 %
title: Tiger Security S.r.l.
description:
keywords:
encoding: UTF-8
language: en-US
Website code analysis
one word phrases repeated minimum three times
Phrase | Quantity |
---|---|
Security | 9 |
Tiger | 8 |
Sicurezza | 6 |
Informatica | 5 |
Servizi | 3 |
Certificazione | 3 |
Prodotti | 3 |
Formazione | 3 |
and | 3 |
Intelligence | 3 |
S.r.l. | 3 |
two word phrases repeated minimum three times
Phrase | Quantity |
---|---|
Sicurezza Informatica | 4 |
Tiger Security | 4 |
Formazione Certificazione | 3 |
Prodotti Tiger | 3 |
Security S.r.l. | 3 |
three word phrases repeated minimum three times
Phrase | Quantity |
---|---|
Tiger Security S.r.l. | 3 |
B tags
U tags
I tags
images
file name | alternative text |
---|---|
tiger_security_srl_logo.png | Tiger Security S.r.l. |
slider-bg-wide-img.jpg | |
tiger_security_srl_slide_formazione.png | |
tiger_security_srl_slide3_proactive_intelligence.png | |
tiger_security_srl_slide3_prodotti_saas.png |
headers
H1
H2
H3
H4
H5
Termini piu’ ricercati
Tiger Security Blog
H6
internal links
address | anchor text |
---|---|
http://www.tigersecurity.it | Tiger Security S.r.l. |
http://www.tigersecurity.it/ | Home |
http://www.tigersecurity.it/azienda/index.aspx | Azienda |
http://www.tigersecurity.it/azienda/la-nostra-storia/index.aspx | La nostra storia |
http://www.tigersecurity.it/azienda/filosofia-aziendale/index.aspx | Filosofia Aziendale |
http://www.tigersecurity.it/azienda/metodologie/index.aspx | Metodologie |
http://www.tigersecurity.it/azienda/partners/index.aspx | Partners |
http://www.tigersecurity.it/azienda/lavora-con-noi/index.aspx | Lavora con noi |
http://www.tigersecurity.it/category/news | News |
http://www.tigersecurity.it/intelligence/index.aspx | Intelligence |
http://www.tigersecurity.it/intelligence/prodotti/index.aspx | Prodotti |
http://www.tigersecurity.it/intelligence/prodotti/tiger-pastewatch/index.aspx | Tiger PasteWatch |
http://www.tigersecurity.it/intelligence/prodotti/tiger-analysis/index.aspx | Tiger Analysis |
http://www.tigersecurity.it/intelligence/servizi/index.aspx | Servizi |
http://www.tigersecurity.it/intelligence/servizi/cyber-profiling/index.aspx | Cyber Profiling |
http://www.tigersecurity.it/intelligence/servizi/proactive-intelligence/index.aspx | Proactive Intelligence |
http://www.tigersecurity.it/intelligence/servizi/strategic-security-advisory/index.aspx | Strategic Security Advisory |
http://www.tigersecurity.it/intelligence/servizi/cyber-criminal-groups-monitoring/index.aspx | Cyber Criminal Groups Monitoring |
http://www.tigersecurity.it/intelligence/formazione/index.aspx | Formazione |
http://www.tigersecurity.it/intelligence/formazione/certificazione-toa/index.aspx | Certificazione TOA |
http://www.tigersecurity.it/sicurezza-offensiva/index.aspx | Sicurezza Offensiva |
http://www.tigersecurity.it/sicurezza-offensiva/prodotti/index.aspx | Prodotti |
http://www.tigersecurity.it/sicurezza-offensiva/prodotti/tiger-compliance/index.aspx | Tiger Compliance |
http://www.tigersecurity.it/sicurezza-offensiva/servizi/index.aspx | Servizi |
http://www.tigersecurity.it/sicurezza-offensiva/servizi/ethical-hacking/index.aspx | Ethical Hacking |
http://www.tigersecurity.it/sicurezza-offensiva/servizi/penetration-test/index.aspx | Penetration Test |
http://www.tigersecurity.it/sicurezza-offensiva/servizi/vulnerability-assessment/index.aspx | Vulnerability Assessment |
http://www.tigersecurity.it/sicurezza-offensiva/servizi/exploit-research-and-production/index.aspx | Exploit Research and Production |
http://www.tigersecurity.it/sicurezza-offensiva/formazione/index.aspx | Formazione |
http://www.tigersecurity.it/sicurezza-offensiva/formazione/certificazione-oscp/index.aspx | Certificazione OSCP |
http://www.tigersecurity.it/sicurezza-offensiva/formazione/backtrack-linux-basic/index.aspx | BackTrack Linux Basic |
http://www.tigersecurity.it/sicurezza-offensiva/formazione/offensive-bash-scripting/index.aspx | Offensive Bash Scripting |
http://www.tigersecurity.it/sicurezza-offensiva/formazione/network-analysis-with-backtrack/index.aspx | Network Analysis with BackTrack |
http://www.tigersecurity.it/sicurezza-offensiva/formazione/exploting-buffer-overflow/index.aspx | Exploting Buffer Overflow |
http://www.tigersecurity.it/sicurezza-difensiva/index.aspx | Sicurezza Difensiva |
http://www.tigersecurity.it/sicurezza-difensiva/prodotti/index.aspx | Prodotti |
http://www.tigersecurity.it/sicurezza-difensiva/prodotti/tiger-defender/index.aspx | Tiger Defender |
http://www.tigersecurity.it/sicurezza-difensiva/servizi/index.aspx | Servizi |
http://www.tigersecurity.it/sicurezza-difensiva/servizi/privacy-and-compliance/index.aspx | Privacy and Compliance |
http://www.tigersecurity.it/sicurezza-difensiva/servizi/consulenza-strategica/index.aspx | Consulenza Strategica |
http://www.tigersecurity.it/sicurezza-difensiva/servizi/crisis-management/index.aspx | Crisis Management |
http://www.tigersecurity.it/sicurezza-difensiva/servizi/incident-response/index.aspx | Incident Response |
http://www.tigersecurity.it/sicurezza-difensiva/servizi/analisi-forense/index.aspx | Informatica Forense |
http://www.tigersecurity.it/sicurezza-difensiva/formazione/index.aspx | Formazione |
http://www.tigersecurity.it/sicurezza-difensiva/formazione/certificazione-tai/index.aspx | Certificazione TAI |
http://www.tigersecurity.it/lab/index.aspx | Lab |
http://www.tigersecurity.it/lab/tools/index.aspx | Tools |
http://www.tigersecurity.it/contatti/index.aspx | Contatti |
http://www.tigersecurity.it/sicurezza-offensiva/formazione/index.aspx | |
http://www.tigersecurity.it/intelligence/index.aspx | |
http://www.tigersecurity.it/sicurezza-difensiva/prodotti/tiger-defender/index.aspx | |
http://www.tigersecurity.it/sicurezza-informatica/index.aspx | Sicurezza Informatica |
http://www.tigersecurity.it/corporate-security/index.aspx | Corporate Security |
http://www.tigersecurity.it/security-advisor/index.aspx | Security Advisor |
http://www.tigersecurity.it/penetration-test/index.aspx | Penetration Test |
http://www.tigersecurity.it/corsi-sicurezza-informatica/index.aspx | Corsi Sicurezza Informatica |
http://www.tigersecurity.it/sicurezza-informatica-proattiva/index.aspx | Sicurezza Informatica Proattiva |
http://www.tigersecurity.it/master-sicurezza-informatica/index.aspx | Master Sicurezza Informatica |
http://www.tigersecurity.it/azienda/lavora-con-noi/index.aspx | Lavora con noi |
http://www.tigersecurity.it/tiger-security-s-r-l-ricerca-profili-di-web-security-analyst/index.aspx | Tiger Security S.r.l. ricerca profili di Web Security Analyst |
http://www.tigersecurity.it/il-pericolo-dei-malware-attraverso-siti-internet-compromessi-prevenzione-ed-individuazione-con-una-new-entry-nel-laboratorio-di-tiger-security-s-r-l/index.aspx | Il pericolo della diffusione del malware attraverso siti internet compromessi: prevenzione ed individuazione. |
http://www.tigersecurity.it/tiger-security-s-r-l-riceve-pubblici-ringraziamenti-per-loperato-di-prevenzione-in-ambito-della-sicurezza-informatica-da-microsoft-inc/index.aspx | Tiger Security S.r.l. riceve pubblici ringraziamenti per l’operato di prevenzione in ambito della sicurezza informatica da Microsoft Inc. |
external links