Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
User-agent: * Crawl-delay: 1 |
Title | Follow That |
Description | Look up a site! No, this does NOT use Netcraft ... Port: Hostname/IP: Wanna see some source code? This page best viewed on a computer. This is the 20,504t |
Keywords | N/A |
WebSite | isthisthingon.org |
Host IP | 173.174.90.117 |
Location | United States |
Site | Rank |
US$2,952,138
Last updated: 2022-06-29 15:39:07
isthisthingon.org has Semrush global rank of 3,585,302. isthisthingon.org has an estimated worth of US$ 2,952,138, based on its estimated Ads revenue. isthisthingon.org receives approximately 340,632 unique visitors each day. Its web server is located in United States, with IP address 173.174.90.117. According to SiteAdvisor, isthisthingon.org is safe to visit. |
Purchase/Sale Value | US$2,952,138 |
Daily Ads Revenue | US$2,726 |
Monthly Ads Revenue | US$81,752 |
Yearly Ads Revenue | US$981,018 |
Daily Unique Visitors | 22,709 |
Note: All traffic and earnings values are estimates. |
Host | Type | TTL | Data |
isthisthingon.org. | A | 300 | IP: 173.174.90.117 |
isthisthingon.org. | NS | 86400 | NS Record: ns-1964.awsdns-53.co.uk. |
isthisthingon.org. | NS | 86400 | NS Record: ns-894.awsdns-47.net. |
isthisthingon.org. | NS | 86400 | NS Record: ns-105.awsdns-13.com. |
isthisthingon.org. | NS | 86400 | NS Record: ns-1191.awsdns-20.org. |
isthisthingon.org. | MX | 300 | MX Record: 10 isthisthingon.org. |
Look up a site! No, this does NOT use Netcraft ... Port: Hostname/IP: Wanna see some source code? This page best viewed on a computer. This is the 20,504th day of my life. Ever wondered about the mystery that is Unicode? Ever wanted to keep track of earthquakes in the Yellowstone Park area? I made this to do that. My Resume , in Word format (hasn’t been updated in a while). Iraqi civilian body count so far (min/max): Cracked Hosts List Note: this isn’t being updated anymore, but I leave it up just in case someone wants it. The latest files were built on 11/11/05. In the course of administering an Apache webserver, I see all kinds of things show up in my access log (which goes back over five years now). One of the things I see is lame Micro$oft-specific hack/crack attempts; default.ida, NULL.printer, etc. A lot of crack attempts come in through FTP as well; any attempted access of "/_vti_*" is usually a crack attempt. Whatever host shows up in these log entries is either a spoofed IP |
HTTP/1.1 200 OK Date: Tue, 26 Oct 2021 18:19:29 GMT Server: Apache Content-Type: text/html; charset=UTF-8 |
WHOIS LIMIT EXCEEDED - SEE WWW.PIR.ORG/WHOIS FOR DETAILS |