Main

processing priority

4

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2023-10-08 11:36:34

expired found date

-

created at

2024-05-31 15:54:56

updated at

2025-12-25 22:18:14

Domain name statistics

length

9

crc

51059

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

-

previous id

0

replaced with id

0

related id

-

dns primary id

285697825

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

84542

mp size raw text

38977

mp inner links count

5

mp inner links status

20 (imported)

Open Graph

title

description

A sassy weblog written by Nick Heer with topics including technology and policy, Apple, Silicon Valley, and privacy.

image

site name

author

Nick Heer

updated

2025-12-12 21:57:41

raw text

Pixel Envy from the desk of Nick Heer. Articles All Posts Sponsorship About October 6, 2023 ⌥ Genetics Firm 23andMe Confirms User Data, Including Results, Has Leaked ⇥ bleepingcomputer.com Bill Toulas , Bleeping Computer : The initial data leak was limited, with the threat actor releasing 1 million lines of data for Ashkenazi people. However, on October 4, the threat actor offered to sell data profiles in bulk for $1-$10 per 23andMe account, depending on how many were purchased. A 23andMe spokesperson confirmed the data is legitimate and told BleepingComputer that the threat actors used exposed credentials from other breaches to access 23andMe accounts and steal the sensitive data. They apparently used the site’s “DNA Relatives” feature to hop across profiles, and have gained a database of users’ full names, location, and the full genetic results of their 23andMe test. It is unclear exactly how much data was stolen, though it appears to be from at ...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

category id

Sprzęt mobilny (205)

index version

2025110801

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

30570

text words

6306

text unique words

2068

text lines

505

text sentences

247

text paragraphs

93

text words per sentence

25

text matched phrases

13

text matched dictionaries

11

RSS

rss path

rss status

3 (priority 3 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

30 (processing completed, results pushed to table crawler_sitemaps.ext_domain_sitemap_lists)

sitemap review version

1

sitemap urls count

9844

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

2023-12-31 17:51:04

sitemap process date

2024-12-10 10:49:45

sitemap first import date

-

sitemap last import date

-