id
processing priority
4
site type
3 (personal blog or private political site, e.g. Blogspot, Substack, also small blogs on own domains)
review version
11
html import
20 (imported)
first seen date
2024-10-08 13:04:31
expired found date
-
created at
2024-10-08 13:04:31
updated at
2026-02-27 07:14:04
length
18
crc
18962
tld
2211
nm parts
0
nm random digits
0
nm rare letters
0
is subdomain of id
13642151 (wordpress.com)
previous id
0
replaced with id
0
related id
-
dns primary id
0
dns alternative id
0
lifecycle status
0 (unclassified, or currently active)
deleted subdomains
0
page imported products
0
page imported random
0
page imported parking
0
count skipped due to recent timeouts on the same server IP
0
count content received but rejected due to 11-799
0
count dns errors
0
count cert errors
0
count timeouts
0
count http 429
0
count http 404
0
count http 403
0
count http 5xx
0
next operation date
-
server bits
—
server ip
-
mp import status
20
mp rejected date
-
mp saved date
-
mp size orig
133154
mp size raw text
37806
mp inner links count
23
mp inner links status
20 (imported)
title
Direct Connect: Just These Guys, Ya Know?
description
Topics relating to the Direct Connect network
image
site name
Direct Connect: Just These Guys, Ya Know?
author
updated
2026-02-22 06:09:23
raw text
Direct Connect: Just These Guys, Ya Know? | Topics relating to the Direct Connect network Direct Connect: Just These Guys, Ya Know? Topics relating to the Direct Connect network Search: Home Blog Topic Suggestion Box Bug reporting Post list Posts Comments General ADC Documentation Clients NMDC Security Developers Release Source code DC++ Vulnerability disclosure: remote code execution in Scripting Plugin March 30, 2024 by emtee Leave a comment A new version of the Scripting DC Plugin has been released today fixing a serious vulnerability that allows attackers to remotely execute any code in the host system running any DC client compatible with DC Plugins , such as DC++ . The nature of this vulnerability can cause various security issues, for example it makes the attacker possible to aquire any files from the host’s mounted filesystems. For successful exploitation, Scripting Plugin version 1.0 should be installed AND enabled in any ...
redirect type
31 (document.location)
block type
0 (no issues)
detected language
1 (English)
category id
index version
1
spam phrases
0
text nonlatin
0
text cyrillic
0
text characters
29123
text words
6115
text unique words
1432
text lines
631
text sentences
289
text paragraphs
82
text words per sentence
21
text matched phrases
0
text matched dictionaries
0
links self subdomains
0
links other subdomains
13 - dcplusplus.sourceforge.io, hublist.pwiam.com, adc.sourceforge.io, nmdc.sourceforge.io, hacks.mozilla.org, blog.chromium.org, forum.dchublist.org, builds.dcbase.org
links other domains
14 - te-home.net, mailfud.org, gnu.org, klondike.es, dcbase.org, openssl.org, airdcpp.net, fedoraproject.org, habr.com, weakdh.org, dslreports.com
links spam adult
0
links spam random
0
links spam expired
0
links ext activities
0
links ext ecommerce
0
links ext finance
0
links ext crypto
0
links ext booking
0
links ext news
0
links ext leaks
0
links ext ugc
87 - s0.wp.com, wp.me, s1.wp.com, en.wikipedia.org, wordpress.com
links ext klim
0
links ext generic
32
dol status
0
dol updated
2026-02-22 06:09:23
rss status
32 (unknown)
rss found date
2024-10-08 13:04:33
rss size orig
64623
rss items
10
rss spam phrases
0
rss detected language
1 (English)
inbefore feed id
-
inbefore status
0 (new)
sitemap path
sitemap status
40 (completed successful import of reports.txt file to table in_pages)
sitemap review version
2
sitemap urls count
414
sitemap urls adult
0
sitemap filtered products
0
sitemap filtered videos
0
sitemap found date
2024-10-08 13:04:32
sitemap process date
2024-10-08 13:04:33
sitemap first import date
-
sitemap last import date
2025-06-11 02:42:12