kernelmode.blog valuation and analysis

Robots.txt Information
Robot Path Permission
GoogleBot /
BingBot /
BaiduSpider /
YandexBot /
User-agent: *
Sitemap: https://www.kernelmode.blog/sitemap.xml
Disallow: /ghost/
Disallow: /p/
Disallow: /email/
Meta Tags
Title Kernel
Description Kernel Mode Home About Contact Subscribe Kernel Mode ls ~/threat-research malware Laravel QR Code Generator Infected with Malware On September 8th 2021 I
Keywords N/A
Server Information
WebSite kernelmode faviconkernelmode.blog
Host IP 178.128.137.126
Location Greece
Related Websites
Site Rank
More to Explore
kernelmode.blog Valuation
US$356,531
Last updated: 2022-07-16 21:11:03

kernelmode.blog has Semrush global rank of 29,686,927. kernelmode.blog has an estimated worth of US$ 356,531, based on its estimated Ads revenue. kernelmode.blog receives approximately 41,139 unique visitors each day. Its web server is located in Greece, with IP address 178.128.137.126. According to SiteAdvisor, kernelmode.blog is safe to visit.

Traffic & Worth Estimates
Purchase/Sale Value US$356,531
Daily Ads Revenue US$330
Monthly Ads Revenue US$9,874
Yearly Ads Revenue US$118,478
Daily Unique Visitors 2,743
Note: All traffic and earnings values are estimates.
DNS Records
Host Type TTL Data
kernelmode.blog. A 3599 IP: 178.128.137.126
kernelmode.blog. NS 21600 NS Record: ns-cloud-a2.googledomains.com.
kernelmode.blog. NS 21600 NS Record: ns-cloud-a4.googledomains.com.
kernelmode.blog. NS 21600 NS Record: ns-cloud-a3.googledomains.com.
kernelmode.blog. NS 21600 NS Record: ns-cloud-a1.googledomains.com.
HtmlToTextCheckTime:2022-07-16 21:11:03
Kernel Mode Home About Contact Subscribe Kernel Mode ls ~/threat-research malware Laravel QR Code Generator Infected with Malware On September 8th 2021 I discovered a backdoor in a Composer package for generating QR codes in the Laravel framework. The package laraveli/qr-code contains malware that attackers can use to remotely execute code on a compromised website or install and access a web shell. The code was traced back Sean Murphy Sep 11, 2021 • 3 min read malware Typosquatting Malware Found in Composer Repository On September 8th 2021, as part of greenfield research project, I discovered a malicious package in Packagist, the main Composer repository. The symfont/process package contains malware and uses a technique called "package typosquatting" to target users of the popular symfony/process package which has been downloaded over 300 million Sean Murphy Sep 9, 2021 • 3 min read Kernel Mode © 2022 Powered by
HTTP Headers
HTTP/1.1 301 Moved Permanently
Server: openresty
Date: Tue, 02 Nov 2021 10:53:37 GMT
Content-Type: text/html
Content-Length: 166
Connection: keep-alive
Location: https://www.kernelmode.blog/

HTTP/2 200 
server: openresty
content-type: text/html; charset=utf-8
status: 200 OK
x-request-id: 7a82d1a03d7edc17277049da3bddd9b0
ghost-cache: HIT
cache-control: public, max-age=0
ghost-age: 85569
accept-ranges: bytes
x-request-id: 59bc6bd942a0c5369665ccac8caba213
date: Tue, 02 Nov 2021 10:53:38 GMT
via: 1.1 varnish
x-served-by: cache-stl4822-STL
x-cache: MISS
x-cache-hits: 0
x-timer: S1635850418.170852,VS0,VE321
vary: Accept-Encoding
ghost-fastly: true
content-length: 10662
kernelmode.blog Whois Information
Domain Name: KERNELMODE.BLOG
Registry Domain ID: D249071844-CNIC
Registrar WHOIS Server: whois.google.com
Registrar URL: https://domains.google.com
Updated Date: 2021-09-04T02:12:25.0Z
Creation Date: 2021-09-04T02:12:21.0Z
Registry Expiry Date: 2022-09-04T23:59:59.0Z
Registrar: Google Inc
Registrar IANA ID: 895
Domain Status: serverTransferProhibited https://icann.org/epp#serverTransferProhibited
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registrant Organization: Contact Privacy Inc. Customer 12411004136
Registrant State/Province: ON
Registrant Country: CA
Name Server: NS-CLOUD-A1.GOOGLEDOMAINS.COM
Name Server: NS-CLOUD-A2.GOOGLEDOMAINS.COM
Name Server: NS-CLOUD-A3.GOOGLEDOMAINS.COM
Name Server: NS-CLOUD-A4.GOOGLEDOMAINS.COM
DNSSEC: signedDelegation
Registrar Abuse Contact Email: registrar-abuse@google.com
Registrar Abuse Contact Phone: +1.2065311374
>>> Last update of WHOIS database: 2021-09-20T18:36:45.0Z <<<