Main

processing priority

4

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2023-10-06 00:53:50

expired found date

-

created at

2024-07-13 20:31:33

updated at

2026-02-28 20:31:19

Domain name statistics

length

14

crc

8547

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

-

previous id

0

replaced with id

0

related id

-

dns primary id

94587248

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

28

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

2026-01-22 18:33:32

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

63225

mp size raw text

5764

mp inner links count

0

mp inner links status

20 (imported)

Open Graph

title

Activity Feed | AttackerKB

description

Not all vulns are created equal.

site name

AttackerKB

author

updated

2026-02-19 05:39:43

raw text

Activity Feed | AttackerKB A Rapid7 Project Activity Feed Topics About Leaderboard Log In Activity Feed sfewer-r7 reported CVE-2023-22515 as Exploited in the Wild October 05, 2023 4:24pm UTC (8 hours ago) Indicated source as Government or Industry Alert (https://www.cisa.gov/news-events/alerts/2023/10/05/cisa-adds-three-known-exploited-vulnerabilities-catalog) Would you like to delete this Exploited in the Wild Report? Yes, delete this report 1 v-p-b replied to ccondon-r7 's assessment of CVE-2023-22515 October 05, 2023 6:33am UTC (18 hours ago) • Edited 18 hours ago Based on the proposed workaround (require authentication on /setup/ paths) and IOC’s provided in the link above: “requests to /setup/*.action in network access logs” “presence of /setup/setupadministrator.action in an exception message in atlassian-confluence-security.log in the Confluence home directory” … it seems that setup pages remain accessib...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

category id

SEC and Crypto [en] (228)

index version

2025123101

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

4353

text words

760

text unique words

269

text lines

164

text sentences

19

text paragraphs

2

text words per sentence

40

text matched phrases

21

text matched dictionaries

4

RSS

rss path

rss status

1 (priority 1 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap path

sitemap status

0 (new)

sitemap review version

2

sitemap urls count

0

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

-

sitemap process date

-

sitemap first import date

-

sitemap last import date

-