id
name
related bits
0
processing priority
4
site type
0 (generic, awaiting analysis)
review version
11
html import
20 (imported)
first seen date
2024-01-08 11:48:12
expired found date
-
created at
2024-06-01 18:31:01
updated at
2025-12-26 16:25:34
length
13
crc
42965
tld
2211
nm parts
0
nm random digits
0
nm rare letters
0
is subdomain of id
-
previous id
0
replaced with id
0
related id
-
dns primary id
dns alternative id
0
lifecycle status
0 (unclassified, or currently active)
deleted subdomains
0
page imported products
0
page imported random
0
page imported parking
0
count skipped due to recent timeouts on the same server IP
0
count content received but rejected due to 11-799
0
count dns errors
0
count cert errors
0
count timeouts
0
count http 429
0
count http 404
0
count http 403
0
count http 5xx
0
next operation date
-
server bits
—
server ip
-
mp import status
20
mp rejected date
-
mp saved date
-
mp size orig
182173
mp size raw text
4447
mp inner links count
1
mp inner links status
20 (imported)
title
Neutralize spear phishing. Without friction - Keystrike
description
Keystrike provides convenient, continuous authentication.Keystrike ensures that employee input was physically made on their computer, not by a remote attacker.
image
site name
Keystrike -
author
updated
2025-12-14 04:51:26
raw text
Neutralize spear phishing. Without friction - Keystrike About Join Us Contact Resources Zero trust, one keystroke at a time Neutralize spear phishing. Without friction. Launching soon — REACH OUT FOR MORE INFORMATION How it works Keystrike attests that the input was physically typed on employee’s workstation. Keystrike controls the impact of phishing. spear phishing. ransomware. supply chain attacks. 1. If a hacker strikes during an active 2FA/MFA session, end-point-security cannot tell if commands are legit or impersonated 2. Keystrike signs every command with cryptographic signatures, making sure all keystrokes and clicks are authenticated 3. The servers are able to look at the signature and recognize if it came from the legitimate employee 4. Keystrike raises an alarm to all unsigned commands and stops hacker’s lateral movement How is Keystrike different? Keystrike guarantees that commands received by remote systems were physically type...
redirect type
0 (-)
block type
0 (no issues)
detected language
1 (English)
category id
index version
2025110801
spam phrases
0
text nonlatin
0
text cyrillic
0
text characters
3564
text words
628
text unique words
342
text lines
81
text sentences
43
text paragraphs
9
text words per sentence
14
text matched phrases
9
text matched dictionaries
7
links self subdomains
0
links other subdomains
0
links other domains
0
links spam adult
0
links spam random
0
links spam expired
0
links ext activities
1
links ext ecommerce
0
links ext finance
0
links ext crypto
0
links ext booking
0
links ext news
0
links ext leaks
0
links ext ugc
1 - linkedin.com
links ext klim
0
links ext generic
0
dol status
0
dol updated
2025-12-14 04:51:26
rss path
rss status
32 (unknown)
rss found date
2024-01-23 19:37:32
rss size orig
155314
rss items
8
rss spam phrases
0
rss detected language
1 (English)
inbefore feed id
-
inbefore status
0 (new)
sitemap path
sitemap status
30 (processing completed, results pushed to table crawler_sitemaps.ext_domain_sitemap_lists)
sitemap review version
1
sitemap urls count
50
sitemap urls adult
0
sitemap filtered products
0
sitemap filtered videos
0
sitemap found date
2024-01-17 08:57:01
sitemap process date
2024-11-27 02:27:06
sitemap first import date
-
sitemap last import date
-