Main

processing priority

4

site type

3 (personal blog or private political site, e.g. Blogspot, Substack, also small blogs on own domains)

review version

11

html import

20 (imported)

Events

first seen date

2024-10-08 13:04:31

expired found date

-

created at

2024-10-08 13:04:31

updated at

2026-02-27 07:14:04

Domain name statistics

length

18

crc

18962

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

13642151 (wordpress.com)

previous id

0

replaced with id

0

related id

-

dns primary id

0

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

133154

mp size raw text

37806

mp inner links count

23

mp inner links status

20 (imported)

Open Graph

title

Direct Connect: Just These Guys, Ya Know?

description

Topics relating to the Direct Connect network

image

site name

Direct Connect: Just These Guys, Ya Know?

author

updated

2026-02-22 06:09:23

raw text

Direct Connect: Just These Guys, Ya Know? | Topics relating to the Direct Connect network Direct Connect: Just These Guys, Ya Know? Topics relating to the Direct Connect network Search: Home Blog Topic Suggestion Box Bug reporting Post list Posts Comments General ADC Documentation Clients NMDC Security Developers Release Source code DC++ Vulnerability disclosure: remote code execution in Scripting Plugin March 30, 2024 by emtee Leave a comment A new version of the Scripting DC Plugin has been released today fixing a serious vulnerability that allows attackers to remotely execute any code in the host system running any DC client compatible with DC Plugins , such as DC++ . The nature of this vulnerability can cause various security issues, for example it makes the attacker possible to aquire any files from the host’s mounted filesystems. For successful exploitation, Scripting Plugin version 1.0 should be installed AND enabled in any ...

Text analysis

redirect type

31 (document.location)

block type

0 (no issues)

detected language

1 (English)

index version

1

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

29123

text words

6115

text unique words

1432

text lines

631

text sentences

289

text paragraphs

82

text words per sentence

21

text matched phrases

0

text matched dictionaries

0

RSS

rss status

32 (unknown)

rss found date

2024-10-08 13:04:33

rss size orig

64623

rss items

10

rss spam phrases

0

rss detected language

1 (English)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

40 (completed successful import of reports.txt file to table in_pages)

sitemap review version

2

sitemap urls count

414

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

2024-10-08 13:04:32

sitemap process date

2024-10-08 13:04:33

sitemap first import date

-

sitemap last import date

2025-06-11 02:42:12