Main

type

5 (blog/news article)

status

20 (imported old-v1, waiting for another import)

review version

0

cleanup version

0

pending deletion

0 (-)

created at

2025-09-06 15:17:24

updated at

2025-09-06 15:17:24

Address

url

https://hawk-eye.io/2024/02/cve-2024-21893-new-ivanti-zero-day-vulnerability-actively-exploited/

url length

96

url crc

22813

url crc32

1628461341

location type

1 (url matches target location, page_location is empty)

canonical status

10 (verified canonical url)

canonical page id

2592251545

Source

domain id

41268484

domain tld

86

domain parts

0

originating warc id

-

originating url

https://data.commoncrawl.org/crawl-data/CC-MAIN-2025-33/segments/1754151578345.75/warc/CC-MAIN-20250815111715-20250815141715-00879.warc.gz

source type

11 (CommonCrawl)

Server response

server ip

104.26.0.83

Publication date

2025-08-15 12:40:11

Fetch attempts

0

Original html size

155462

Normalized and saved size

59121

Text analysis

block type

0

extracted fields

141

extracted bits

detected location

0

detected language

1 (English)

category id

-

index version

1

paywall score

0

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

4214

text words

720

text unique words

346

text lines

96

text sentences

28

text paragraphs

13

text words per sentence

25

text matched phrases

0

text matched dictionaries

0