sentry-labs.com valuation and analysis

Robots.txt Information
Robot Path Permission
GoogleBot /
BingBot /
BaiduSpider /
YandexBot /
Meta Tags
Title CVEs from the stone-age, by Alexander
Description Highscores Alexander Pick’s CVE from the stoneage of
Keywords N/A
Server Information
WebSite sentry-labs faviconsentry-labs.com
Host IP 172.67.156.56
Location United States
Related Websites
Site Rank
More to Explore
sentry-labs.com Valuation
US$1,274
Last updated: 2023-05-17 07:12:09

sentry-labs.com has Semrush global rank of 0. sentry-labs.com has an estimated worth of US$ 1,274, based on its estimated Ads revenue. sentry-labs.com receives approximately 147 unique visitors each day. Its web server is located in United States, with IP address 172.67.156.56. According to SiteAdvisor, sentry-labs.com is safe to visit.

Traffic & Worth Estimates
Purchase/Sale Value US$1,274
Daily Ads Revenue US$1
Monthly Ads Revenue US$35
Yearly Ads Revenue US$423
Daily Unique Visitors 9
Note: All traffic and earnings values are estimates.
DNS Records
Host Type TTL Data
sentry-labs.com. A 299 IP: 172.67.156.56
sentry-labs.com. A 299 IP: 104.21.58.45
sentry-labs.com. AAAA 299 IPV6: 2606:4700:3030::ac43:9c38
sentry-labs.com. AAAA 299 IPV6: 2606:4700:3034::6815:3a2d
sentry-labs.com. NS 86400 NS Record: dana.ns.cloudflare.com.
sentry-labs.com. NS 86400 NS Record: rob.ns.cloudflare.com.
HtmlToTextCheckTime:2023-05-17 07:12:09
H ig hs core s 2000 -2001 Here is a small list of CVE’s from my very early security days, as bug hunting was still for fun and not profit. This was what the 18 yrs old me used to have fun with after school. CVE-2000-0262 - Score 5.0 The AVM KEN! ISDN Proxy server allows remote attackers to cause a denial of service via a malformed request. CVE-2000-0261 - Score 5.0 The AVM KEN! web server allows remote attackers to read arbitrary files via a .. (dot dot) attack. CVE-2001-0698 - Score 5.0 Directory traversal vulnerability in NetWin SurgeFTP 2.0a and 1.0b allows a remote attacker to list arbitrary files and directories via the ’nlist ...’ command. CVE-2001-0749 - Score 7.5 Beck IPC GmbH IPC@CHIP Embedded-Webserver allows remote attackers to read arbitrary files via a webserver root directory set to system root. CVE-2001-0783 - Score 5.0 Cisco TFTP server 1.1 allows remote attackers to read arbitrary files via a ..(dot dot) attack in the GET command. CVE-2001-1291 - Score 10.0 The telnet
HTTP Headers
HTTP/1.1 301 Moved Permanently
Date: Fri, 11 Mar 2022 09:31:45 GMT
Connection: keep-alive
Cache-Control: max-age=3600
Expires: Fri, 11 Mar 2022 10:31:45 GMT
Location: https://sentry-labs.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=9hcF5S5QTB045sw9oVPLaj34vVhWVBWt3qb6l2bq6WHLtrKDlAiqyjC%2B65kcXWYLDFZDi61FffgaZNxxATjN7VX37oN6hiKeFrfgbQ7YAZ2O2lSmYYwp7rg8oOQJZa0GxJ5pi7SKnmW6YBPQTMg%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 6ea347663c6c7597-DME
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400

HTTP/2 200 
date: Fri, 11 Mar 2022 09:31:45 GMT
content-type: text/html
last-modified: Fri, 30 Apr 2021 22:22:51 GMT
cf-cache-status: DYNAMIC
expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=5nCzNolTl%2Bnw6F8pZcd0l2NixISI68wCqb6giPv7G%2BdlXfJ8pkXdpMiw1YtoWLfH42QYloe5vibI%2BDq2jOS3%2FTYe16ttJah8Hy7OREENJ9u35h%2BbXY4lxY0MqT8YnCfuOW9u17TpqkoTrHpdVQo%3D"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server: cloudflare
cf-ray: 6ea34766dc1d9d58-DME
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
sentry-labs.com Whois Information
Domain Name: SENTRY-LABS.COM
Registry Domain ID: 2608677750_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.ionos.com
Registrar URL: http://www.ionos.com
Updated Date: 2021-04-30T05:28:55Z
Creation Date: 2021-04-29T20:38:46Z
Registry Expiry Date: 2022-04-29T20:38:46Z
Registrar: IONOS SE
Registrar IANA ID: 83
Registrar Abuse Contact Email: abuse@ionos.com
Registrar Abuse Contact Phone: +1.6105601459
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: DANA.NS.CLOUDFLARE.COM
Name Server: ROB.NS.CLOUDFLARE.COM
DNSSEC: unsigned
>>> Last update of whois database: 2022-03-11T10:09:05Z <<<