id
related bits
0
processing priority
3
site type
5 (wiki-type site, growing by topic rather than chronologically)
review version
11
html import
20 (imported)
first seen date
2024-01-25 03:43:01
expired found date
-
created at
2024-06-10 07:55:20
updated at
2026-01-05 06:14:19
length
17
crc
21140
tld
86
nm parts
0
nm random digits
0
nm rare letters
0
is subdomain of id
87719371 (github.io)
previous id
0
replaced with id
0
related id
-
dns primary id
0
dns alternative id
0
lifecycle status
0 (unclassified, or currently active)
deleted subdomains
0
page imported products
0
page imported random
0
page imported parking
0
count skipped due to recent timeouts on the same server IP
0
count content received but rejected due to 11-799
0
count dns errors
0
count cert errors
0
count timeouts
0
count http 429
0
count http 404
0
count http 403
0
count http 5xx
0
next operation date
-
server bits
—
server ip
-
mp import status
20
mp rejected date
-
mp saved date
-
mp size orig
11863
mp size raw text
1540
mp inner links count
8
mp inner links status
20 (imported)
title
JBZ CTF Team
description
We Criuz, che si owna di bello?
image
site name
JBZ CTF Team
author
updated
2025-12-22 14:50:24
raw text
JBZ CTF Team | We Criuz, che si owna di bello? JBZ CTF Team Categories Archive About Nov 15, 2020 • Reverse m0leCon CTF 2020 - The Rickshank Rickdemption The chall was a RPG Pokemon-like client-only game. The objectives are: Kill all the Mortys (but sadly every Morty is stronger than you) Find the flag Aug 12, 2020 • Web BugPoc - Buggy Calculator Everything started with a Tweet : Check out our new XSS Challenge- $2,000 worth of prize money! Submit solutions to http://hackerone.com/bugpoc before 08/12. Rules: Must alert(domain), Must bypass CSP, Must work in Chrome, Must provide a BugPoC demo Good luck! #XSS #CTF #bugbounty #hacked May 22, 2020 • Web | Crypto | Misc | Rev | Pwn | Fore M0lecon 2019 This was an on-site CTF by the Polictenico di Torino’s CTF team pwnthem0le , which took place during the M0lecon 2019 event . Our team won the competition :D May 7, 2019 • Web Ins'Hack 2019 - Bypasses Everywhere The challenge description was ...
redirect type
0 (-)
block type
0 (no issues)
detected language
1 (English)
category id
Pozostałe (16)
index version
2025123101
spam phrases
0
text nonlatin
0
text cyrillic
0
text characters
1117
text words
244
text unique words
165
text lines
53
text sentences
12
text paragraphs
3
text words per sentence
20
text matched phrases
0
text matched dictionaries
0
links self subdomains
0
links other subdomains
1 - 2019.m0lecon.it
links other domains
2 - ctftime.org, kaklabs.com
links spam adult
0
links spam random
0
links spam expired
0
links ext activities
0
links ext ecommerce
0
links ext finance
0
links ext crypto
0
links ext booking
0
links ext news
0
links ext leaks
0
links ext ugc
7 - twitter.com
links ext klim
0
links ext generic
0
dol status
0
dol updated
2025-12-22 14:50:24
rss path
rss status
1 (priority 1 already searched, no matches found)
rss found date
-
rss size orig
0
rss items
0
rss spam phrases
0
rss detected language
0 (awaiting analysis)
inbefore feed id
-
inbefore status
0 (new)
sitemap path
sitemap status
30 (processing completed, results pushed to table crawler_sitemaps.ext_domain_sitemap_lists)
sitemap review version
1
sitemap urls count
84
sitemap urls adult
0
sitemap filtered products
0
sitemap filtered videos
0
sitemap found date
2024-01-30 09:04:23
sitemap process date
2024-09-12 08:47:19
sitemap first import date
-
sitemap last import date
-