id
processing priority
4
site type
3 (personal blog or private political site, e.g. Blogspot, Substack, also small blogs on own domains)
review version
11
html import
20 (imported)
first seen date
2024-02-05 21:24:21
expired found date
-
created at
2024-06-11 05:37:52
updated at
2026-01-06 11:02:44
length
28
crc
1861
tld
2211
nm parts
0
nm random digits
0
nm rare letters
0
is subdomain of id
13642151 (wordpress.com)
previous id
0
replaced with id
0
related id
-
dns primary id
0
dns alternative id
0
lifecycle status
0 (unclassified, or currently active)
deleted subdomains
0
page imported products
0
page imported random
0
page imported parking
0
count skipped due to recent timeouts on the same server IP
0
count content received but rejected due to 11-799
0
count dns errors
0
count cert errors
0
count timeouts
0
count http 429
0
count http 404
0
count http 403
0
count http 5xx
0
next operation date
-
server bits
—
server ip
-
mp import status
20
mp rejected date
-
mp saved date
-
mp size orig
195310
mp size raw text
31657
mp inner links count
20
mp inner links status
20 (imported)
title
thenortonsetup
description
We provide technical support for norton. For help visit us at www.thenortonsetup.com
site name
thenortonsetup
author
updated
2025-12-23 23:51:58
raw text
thenortonsetup Skip to content thenortonsetup We provide technical support for norton. For help visit us at www.thenortonsetup.com Menu Home Technology Planet Security How CIA Hack Our Phone, PC, and TV ( WikiLeaks) THE NSA, IT seems, isn’t the sole yank spy agency hacking the planet. Judgement by a replacement, nearly 9,000-page hoarded wealth of secrets from WikiLeaks, the CIA has developed its own astonishingly big range of intrusion tools, too. On Tues morning, WikiLeaks discharged what its line of work Vault seven, a new assortment of internal CIA files—what seem to be a sort of web-based Wiki—that catalog the agency’s apparent hacking techniques. And whereas the hordes of security researchers poring through the documents have nevertheless to seek out any actual code among its spilled secrets, it details shocking capabilities, from dozens of exploits targeting android and iOS to advanced PC-compromise techniques and elaborate makes an attempt to hack Sam...
redirect type
0 (-)
block type
0 (no issues)
detected language
1 (English)
category id
SEC and Crypto [en] (228)
index version
2025123101
spam phrases
33
text nonlatin
0
text cyrillic
0
text characters
25222
text words
4811
text unique words
1554
text lines
343
text sentences
187
text paragraphs
75
text words per sentence
25
text matched phrases
27
text matched dictionaries
16
links self subdomains
0
links other subdomains
links other domains
15 - onlinenortoncomsetup.com, thenortonsetup.com, visual.ly, off-guardian.org, icitech.org
links spam adult
8
links spam random
0
links spam expired
0
links ext activities
0
links ext ecommerce
1 - amazon.com
links ext finance
0
links ext crypto
0
links ext booking
0
links ext news
0
links ext leaks
0
links ext ugc
50 - s0.wp.com, widgets.wp.com, secure.gravatar.com, s1.wp.com, wordpress.com, twitter.com, thenortonsetup.blogspot.com, facebook.com, pinterest.com, onlinenortoncomsetup.wordpress.com, en.wordpress.com
links ext klim
0
links ext generic
1
dol status
0
dol updated
2025-12-23 23:51:58
rss status
32 (unknown)
rss found date
2024-02-28 10:13:03
rss size orig
86277
rss items
10
rss spam phrases
32
rss detected language
1 (English)
inbefore feed id
-
inbefore status
0 (new)
sitemap path
sitemap status
30 (processing completed, results pushed to table crawler_sitemaps.ext_domain_sitemap_lists)
sitemap review version
1
sitemap urls count
41
sitemap urls adult
0
sitemap filtered products
0
sitemap filtered videos
0
sitemap found date
2024-02-26 15:34:15
sitemap process date
2024-11-08 12:06:01
sitemap first import date
-
sitemap last import date
-