Main

related bits

0

processing priority

4

site type

3 (personal blog or private political site, e.g. Blogspot, Substack, also small blogs on own domains)

review version

11

html import

20 (imported)

Thumbnail
Events

first seen date

2025-01-01 20:07:28

expired found date

-

created at

2025-01-01 20:07:28

updated at

2026-02-07 15:04:31

Domain name statistics

length

27

crc

61633

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

69893241 (blogspot.com)

previous id

0

replaced with id

0

related id

-

dns primary id

0

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

57927

mp size raw text

13332

mp inner links count

11

mp inner links status

20 (imported)

Open Graph

title

a slice of my story.....

description

image

site name

author

updated

2026-02-06 14:28:23

raw text

a slice of my story..... skip to main | skip to sidebar a slice of my story..... Friday, August 22, 2008 Joomla 1.5.x Remote Admin Password Change Sebuah exploit yang dirilis awal Agustus ini telah membuat para Admin pengguna Joomla (kayak gue :)) harus sedikit cemas. Tidak tanggung2 exploit tersebut mampu mengganti password Admin sang korban. Bagaimana cara kerjanya: 1. Ketikkan alamat: target.com/index.php?option=com_user&view=reset&layout=confirm 2. Jika diminta token maka masukkan ' (tanda koma atas tunggal) 3. Masukkan password baru 2x 4. Silahkan login di target.com/administrator masukkan username admin (semoga blm diganti) dan password yang berhasil direset tadi, dan situs tersebut pun jadi milik Anda. 5.Selengkapnya lihat di http://www.milw0rm.com/exploits/6234. Exploit ini valid untuk Joomla versi 1.50 s/d 1.55 Nah untuk para Admin ayo jangan tidur aja, silahkan patch situs Anda (ambil patch yang cocok, upload dan ekstract) silahkan liat patch yang cocok di ...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

126 (language undetectable (empty document, too short, or engines disagree))

category id

Podsłuchy (13)

index version

2025123101

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

10576

text words

1982

text unique words

907

text lines

156

text sentences

93

text paragraphs

24

text words per sentence

21

text matched phrases

6

text matched dictionaries

6

RSS

rss status

32 (unknown)

rss found date

2025-01-01 20:07:30

rss size orig

27051

rss items

5

rss spam phrases

0

rss detected language

126 (language undetectable (empty document, too short, or engines disagree))

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

40 (completed successful import of reports.txt file to table in_pages)

sitemap review version

2

sitemap urls count

5

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

2025-01-01 20:07:29

sitemap process date

2025-03-24 03:17:13

sitemap first import date

-

sitemap last import date

2025-08-04 15:23:47