Main

processing priority

4

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2023-12-16 14:56:56

expired found date

-

created at

2024-06-08 06:00:27

updated at

2026-01-01 02:26:00

Domain name statistics

length

15

crc

62610

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

-

previous id

0

replaced with id

0

related id

-

dns primary id

235404269

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

93470

mp size raw text

6129

mp inner links count

6

mp inner links status

20 (imported)

Open Graph

title

Soft2Secure

description

The latest computer security technologies in the IT world

image

site name

Soft2Secure

author

updated

2025-12-20 09:27:35

raw text

Soft2Secure - The latest computer security technologies in the IT world Soft2Secure Soft2Secure News Software KnowledgeBase Forums Contact Soft2Secure Home Soft2Secure The complete security vulnerability assessment checklist Posted by Siren on September 23, 2023 Security vulnerability assessment ensures timely troubleshooting of security flaws before they harm business IT infrastructure. The 21st century’s trend for business informatization leaves enterprises almost no chance for IT-free operation. Hardly any company functions without an integrated information system or smart devices that are capable of enhancing business output and customer experience. Business owners savor […] Read more → Posted in: KnowledgeBase Leave a Comment (0) → Guarding the chains: Imperative of security in blockchain applications Posted by Siren on August 15, 2023 Blockchain ...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

category id

Zastosowania AI (149)

index version

2025110801

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

4374

text words

861

text unique words

409

text lines

132

text sentences

33

text paragraphs

10

text words per sentence

26

text matched phrases

5

text matched dictionaries

10

RSS

rss status

32 (unknown)

rss found date

2024-01-24 12:25:42

rss size orig

12327

rss items

10

rss spam phrases

0

rss detected language

1 (English)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

34 (reserved: import paused pending content quality/relevance assessment after importing first 500 pages)

sitemap review version

2

sitemap urls count

407

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

2024-01-23 17:48:00

sitemap process date

2025-03-05 05:55:51

sitemap first import date

-

sitemap last import date

2025-04-11 11:58:04