Main

processing priority

4

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2023-10-03 00:55:41

expired found date

-

created at

2024-05-31 10:29:59

updated at

2026-01-06 09:12:11

Domain name statistics

length

26

crc

2891

tld

2644

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

177574318 (patternsinthevoid.net)

previous id

0

replaced with id

0

related id

-

dns primary id

0

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

6

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

2025-04-23 05:57:09

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

30177

mp size raw text

7394

mp inner links count

6

mp inner links status

20 (imported)

Open Graph

title

description

image

site name

author

updated

2025-12-12 09:27:59

raw text

Patterns in the Void Hey, kudos! You don't run arbitrary scripts either! My apologies for the JS on this page… it's prettify.js for syntax highlighting in code blocks. I've added one line of CSS for you; the rest of this site should work fine.       ♥Ⓐ isis Patterns in the Void anarchism hacking physics travel Other articles Pretty Bad {Protocol,People} Wednesday, 13 June 2018 By isis agora lovecruft In hacking tags: security tl;dr: This vulnerability affects GnuPG and several plugins and wrapper libraries, including Vinay Sajip’s “python-gnupg” which I rewrote many years ago after finding a shell injection vulnerability in his code. His code is vulnerable to SigSpoof; mine isn’t. Markus Brinkmann, a NeoPG developer, wrote about a recent signature spoofing vulnerability in GnuPG which carried over...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

index version

2025110801

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

5624

text words

1105

text unique words

542

text lines

206

text sentences

45

text paragraphs

19

text words per sentence

24

text matched phrases

7

text matched dictionaries

9

RSS

rss path

rss status

3 (priority 3 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

34 (reserved: import paused pending content quality/relevance assessment after importing first 500 pages)

sitemap review version

2

sitemap urls count

96

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

2023-12-20 21:29:49

sitemap process date

2025-04-30 07:36:34

sitemap first import date

-

sitemap last import date

2026-01-06 09:12:11