satyrsecurity.info valuation and analysis

Robots.txt Information
Robot Path Permission
GoogleBot /
BingBot /
BaiduSpider /
YandexBot /
User-agent: *
Allow: /wp-admin/admin-ajax.php
Disallow: /wp-admin/

Sitemap: https://satyrsecurity.info/sitemap.xml
Sitemap: https://satyrsecurity.info/sitemap.rss

Meta Tags
Title Satyr
Description Menu Menu Skip to content Satyr Sec Infosec, Sysadmin, Networking September 18, 2020 by satyrsec on THM Walkthrough: TryHackMe – Blaster Today we will be diggi
Keywords N/A
Server Information
WebSite satyrsecurity faviconsatyrsecurity.info
Host IP 172.67.216.120
Location United States
Related Websites
Site Rank
More to Explore
satyrsecurity.info Valuation
US$1,061
Last updated: 2022-09-07 21:09:07

satyrsecurity.info has Semrush global rank of 0. satyrsecurity.info has an estimated worth of US$ 1,061, based on its estimated Ads revenue. satyrsecurity.info receives approximately 122 unique visitors each day. Its web server is located in United States, with IP address 172.67.216.120. According to SiteAdvisor, satyrsecurity.info is safe to visit.

Traffic & Worth Estimates
Purchase/Sale Value US$1,061
Daily Ads Revenue US$0
Monthly Ads Revenue US$29
Yearly Ads Revenue US$352
Daily Unique Visitors 8
Note: All traffic and earnings values are estimates.
DNS Records
Host Type TTL Data
satyrsecurity.info. A 300 IP: 172.67.216.120
satyrsecurity.info. A 300 IP: 104.21.16.227
satyrsecurity.info. AAAA 300 IPV6: 2606:4700:3036::ac43:d878
satyrsecurity.info. AAAA 300 IPV6: 2606:4700:3037::6815:10e3
satyrsecurity.info. NS 86400 NS Record: daniella.ns.cloudflare.com.
satyrsecurity.info. NS 86400 NS Record: ganz.ns.cloudflare.com.
satyrsecurity.info. MX 300 MX Record: 10 mail.protonmail.ch.
satyrsecurity.info. MX 300 MX Record: 20 mailsec.protonmail.ch.
satyrsecurity.info. TXT 300 TXT Record: Sendinblue-code:0702bc3cf73ae1bcc4547e86435329da
satyrsecurity.info. TXT 300 TXT Record: v=spf1 include:_spf.protonmail.ch include:spf.sendinblue.com mx ~all
satyrsecurity.info. TXT 300 TXT Record: protonmail-verification=0d602a1ad0516ecc6fc59aaec80e6e45cab4d645
HtmlToTextCheckTime:2022-09-07 21:09:07
Menu Skip to content Satyr Sec Infosec, Sysadmin, Networking September 18, 2020 by satyrsec on THM Walkthrough: TryHackMe – Blaster Today we will be digging into the Windows machine Blaster from TryHackMe . Enumeration We begin by using nmap to scan for open ports: nmap -sT -sV -A -v -p- 10.10.158.51 -sT TCP SYN port scan -sV Finds versions of services -A OS Detection, version detection, script scanning and traceroute -v Increase verbosity -p- Scan ports 1 – 65535 We find a few interesting ports in the output including port 80 (HTTP) port 3306 (mysql) and port 3389 (RDP) 80/tcp open http Microsoft IIS httpd 10.0 | http-methods: |_ Potentially risky methods: TRACE |_http-server-header: Microsoft-IIS/10.0 |_http-title: IIS Windows Server 3306/tcp open mysql MySQL (unauthorized) 3389/tcp open ms-wbt-server Microsoft Terminal Services | ssl-cert: Subject: commonName=RetroWeb | Not valid before: 2020-05-21T21:44:38 |_Not valid after: 2020-11-20T21:44:38 |_ssl-date:
HTTP Headers
HTTP/1.1 301 Moved Permanently
Date: Thu, 23 Dec 2021 10:15:57 GMT
Connection: keep-alive
Cache-Control: max-age=3600
Expires: Thu, 23 Dec 2021 11:15:57 GMT
Location: https://satyrsecurity.info/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ISbf6xipN8dFdkFk5UXBuLllq30FWbsFYd7WzgFIn%2FmSVcOW8xbN5jfURsOV9st15zmPIrhjvZeUrPVXoWgXQ%2FVNIGfYIFEdEbSD%2F2Qnq%2F04qunlt9n1GZxKMfllm6eHcP7ZOl4%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 6c20d4e839288ca7-EWR
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400

HTTP/2 200 
date: Thu, 23 Dec 2021 10:15:57 GMT
content-type: text/html; charset=UTF-8
x-powered-by: PHP/7.3.18
link: ; rel="https://api.w.org/"
x-frame-options: SAMEORIGIN
cache-control: max-age=0, no-cache
cf-cache-status: DYNAMIC
expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=RwZSX%2FEseqSfP4F1v6LxTZyOtXodx1O7%2FS4Y6gKF%2FDSco%2BuhUnaJx0n%2BcwMxFw%2FcRk%2FIZaEq9P7hFE8mIbdFmrO%2BDhVrfy5X7UWjMs2q2Z5eBHlU8mn9eWkJ%2FkbrfY5yK8VpWZA%3D"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server: cloudflare
cf-ray: 6c20d4e869f60cc9-EWR
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
satyrsecurity.info Whois Information
Domain Name: satyrsecurity.info
Registry Domain ID: f7d010e8e020465a9696e5db7f9d67aa-DONUTS
Registrar WHOIS Server: whois.godaddy.com/
Registrar URL: http://www.godaddy.com/domains/search.aspx?ci=8990
Updated Date: 2021-11-21T12:14:23Z
Creation Date: 2018-05-28T19:38:23Z
Registry Expiry Date: 2022-05-28T19:38:23Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email: abuse@godaddy.com
Registrar Abuse Contact Phone: +1.4806242505
Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
Registrant Organization: Domains By Proxy, LLC
Registrant State/Province: Arizona
Registrant Country: US
Name Server: ganz.ns.cloudflare.com
Name Server: daniella.ns.cloudflare.com
DNSSEC: unsigned
>>> Last update of WHOIS database: 2021-12-26T18:46:33Z <<<