id
name
processing priority
4
site type
0 (generic, awaiting analysis)
review version
11
html import
20 (imported)
first seen date
2023-10-09 06:16:48
expired found date
-
created at
2024-07-21 01:12:03
updated at
2024-08-30 14:23:19
length
15
crc
25781
tld
2211
nm parts
0
nm random digits
0
nm rare letters
0
is subdomain of id
-
previous id
0
replaced with id
0
related id
-
dns primary id
dns alternative id
0
lifecycle status
0 (unclassified, or currently active)
deleted subdomains
0
page imported products
0
page imported random
0
page imported parking
0
count skipped due to recent timeouts on the same server IP
0
count content received but rejected due to 11-799
0
count dns errors
0
count cert errors
0
count timeouts
0
count http 429
0
count http 404
0
count http 403
0
count http 5xx
0
next operation date
-
server bits
—
server ip
-
mp import status
20
mp rejected date
-
mp saved date
-
mp size orig
36001
mp size raw text
17459
mp inner links count
2
mp inner links status
10 (links queued, awaiting import)
title
description
Tracking the FREAK Attack
image
site name
author
updated
2026-02-21 18:02:42
raw text
Tracking the FREAK Attack Tracking the FREAK Attack On Tuesday, March 3, 2015, researchers announced a new SSL/TLS vulnerability called the FREAK attack. It allows an attacker to intercept HTTPS connections between vulnerable clients and servers and force them to use weakened encryption, which the attacker can break to steal or manipulate sensitive data. This site is dedicated to tracking the impact of the attack and helping users test whether they’re vulnerable. The FREAK attack was discovered by Karthikeyan Bhargavan at INRIA in Paris and the miTLS team . Further disclosure was coordinated by Matthew Green . This report is maintained by computer scientists at the University of Michigan, including Zakir Durumeric , David Adrian , Ariana Mirian, Michael Bailey , and J. Alex Halderman . The team can be contacted at freakattack@umich.edu . For additional details about the attack and its implications, see this post by Matt Green , this site by the discoverers , this...
redirect type
0 (-)
block type
0 (no issues)
detected language
1 (English)
category id
index version
1
spam phrases
0
text nonlatin
0
text cyrillic
0
text characters
12543
text words
3244
text unique words
1283
text lines
1128
text sentences
42
text paragraphs
14
text words per sentence
77
text matched phrases
0
text matched dictionaries
0
links self subdomains
0
links other subdomains
9 - cve.freakattack.com, prosecco.inria.fr, blog.cryptographyengineering.com, tools.keycdn.com, cve.mitre.org, wiki.mozilla.org
links other domains
11 - smacktls.com, mitls.org, zakird.com, davidadrian.org, jhalderm.com, freedom-to-tinker.com, alexa.com, ssllabs.com
links spam adult
0
links spam random
0
links spam expired
0
links ext activities
1
links ext ecommerce
0
links ext finance
0
links ext crypto
0
links ext booking
0
links ext news
1
links ext leaks
0
links ext ugc
1
links ext klim
0
links ext generic
5
dol status
0
dol updated
2026-02-21 18:02:42
rss path
rss status
1 (priority 1 already searched, no matches found)
rss found date
-
rss size orig
0
rss items
0
rss spam phrases
0
rss detected language
0 (awaiting analysis)
inbefore feed id
-
inbefore status
0 (new)
sitemap path
sitemap status
1 (priority 1 already searched, no matches found)
sitemap review version
2
sitemap urls count
0
sitemap urls adult
0
sitemap filtered products
0
sitemap filtered videos
0
sitemap found date
-
sitemap process date
-
sitemap first import date
-
sitemap last import date
-