Main

processing priority

4

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2023-10-09 06:16:48

expired found date

-

created at

2024-07-21 01:12:03

updated at

2024-08-30 14:23:19

Domain name statistics

length

15

crc

25781

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

-

previous id

0

replaced with id

0

related id

-

dns primary id

75337739

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

36001

mp size raw text

17459

mp inner links count

2

mp inner links status

10 (links queued, awaiting import)

Open Graph

title

description

Tracking the FREAK Attack

image

site name

author

updated

2026-02-21 18:02:42

raw text

Tracking the FREAK Attack Tracking the FREAK Attack On Tuesday, March 3, 2015, researchers announced a new SSL/TLS vulnerability called the FREAK attack. It allows an attacker to intercept HTTPS connections between vulnerable clients and servers and force them to use weakened encryption, which the attacker can break to steal or manipulate sensitive data. This site is dedicated to tracking the impact of the attack and helping users test whether they’re vulnerable. The FREAK attack was discovered by Karthikeyan Bhargavan at INRIA in Paris and the miTLS team . Further disclosure was coordinated by Matthew Green . This report is maintained by computer scientists at the University of Michigan, including Zakir Durumeric , David Adrian , Ariana Mirian, Michael Bailey , and J. Alex Halderman . The team can be contacted at freakattack@umich.edu . For additional details about the attack and its implications, see this post by Matt Green , this site by the discoverers , this...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

index version

1

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

12543

text words

3244

text unique words

1283

text lines

1128

text sentences

42

text paragraphs

14

text words per sentence

77

text matched phrases

0

text matched dictionaries

0

RSS

rss path

rss status

1 (priority 1 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap path

sitemap status

1 (priority 1 already searched, no matches found)

sitemap review version

2

sitemap urls count

0

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

-

sitemap process date

-

sitemap first import date

-

sitemap last import date

-