Main

related bits

0

processing priority

4

site type

0 (generic, awaiting analysis)

review version

11

html import

27 (unknown)

Events

first seen date

2024-02-26 13:42:07

expired found date

-

created at

2024-06-28 00:41:24

updated at

2026-02-22 20:02:03

Domain name statistics

length

15

crc

48222

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

-

previous id

0

replaced with id

0

related id

-

dns primary id

94587248

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

1

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

2025-10-09 21:03:08

Server

server bits

AMAZONS3

server ip

108.138.51.119

Mainpage statistics

mp import status

27

mp rejected date

-

mp saved date

-

mp size orig

11802

mp size raw text

6109

mp inner links count

0

mp inner links status

20 (imported)

Open Graph

title

description

image

site name

author

updated

2026-02-18 23:47:55

raw text

How to Use a Keylogger         WELCOME TO PHOEBE MICRO What is keylogger Keylogger is a typical surveillance software that is capable of recording and saving a log file every keystroke on the system. A keylogger can record email, instant message and capture any information that you type using your keyboard. This can include usernames, passwords, and any personally identifiable information and after that the log file will be sent to the receiver. This program is mostly used by employers to monitor the activities of their employees. Parents have also shown interest in it to keep track of their kids whereabouts. Unfortunately, some spyware also uses it to extract personal information. How it works When a keylogger is installed on a device, it starts running on the background which enables it to capture every keystroke on the other device. When you type your username and password, these logs are captured. This information is unknowingly sent to a specific email addr...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

category id

SEC and Crypto [en] (228)

index version

2025123101

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

4885

text words

993

text unique words

367

text lines

47

text sentences

55

text paragraphs

16

text words per sentence

18

text matched phrases

1

text matched dictionaries

2

RSS

rss path

rss status

0 (new)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap path

sitemap status

0 (new)

sitemap review version

2

sitemap urls count

0

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

-

sitemap process date

-

sitemap first import date

-

sitemap last import date

-