Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
Title | Victor |
Description | Heyy you have found me |
Keywords | Victor Zhu, Programming, Cybersecurity, Software Engineering |
WebSite | zhuzhuuu.com |
Host IP | 185.199.111.153 |
Location | - |
Site | Rank |
US$871,276
Last updated: 2023-05-13 02:03:02
zhuzhuuu.com has Semrush global rank of 12,148,061. zhuzhuuu.com has an estimated worth of US$ 871,276, based on its estimated Ads revenue. zhuzhuuu.com receives approximately 100,532 unique visitors each day. Its web server is located in -, with IP address 185.199.111.153. According to SiteAdvisor, zhuzhuuu.com is safe to visit. |
Purchase/Sale Value | US$871,276 |
Daily Ads Revenue | US$805 |
Monthly Ads Revenue | US$24,128 |
Yearly Ads Revenue | US$289,532 |
Daily Unique Visitors | 6,703 |
Note: All traffic and earnings values are estimates. |
Host | Type | TTL | Data |
zhuzhuuu.com. | A | 299 | IP: 185.199.111.153 |
zhuzhuuu.com. | A | 299 | IP: 185.199.110.153 |
zhuzhuuu.com. | A | 299 | IP: 185.199.109.153 |
zhuzhuuu.com. | A | 299 | IP: 185.199.108.153 |
zhuzhuuu.com. | NS | 86400 | NS Record: marge.ns.cloudflare.com. |
zhuzhuuu.com. | NS | 86400 | NS Record: kai.ns.cloudflare.com. |
zhuzhuuu.com. | MX | 300 | MX Record: 20 mx2.zoho.com. |
zhuzhuuu.com. | MX | 300 | MX Record: 50 mx3.zoho.com. |
zhuzhuuu.com. | MX | 300 | MX Record: 10 mx.zoho.com. |
Victor Zhu Security Analyst - Red Team Black cat hacker Home / Archive / Categories / Tags / About Me PGP Key 7 APR 2019 • pentesting-lab --> [CVE-2019-5418] Ruby on Rails Arbitrary File Content Disclosure Vulnerability Lab --> There is a File Content Disclosure vulnerability in Action View (Rails) <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 where specially crafted accept headers can cause contents of arbitrary files on the target system’s filesystem to be exposed. 24 SEP 2018 • Vulnerablity --> TradingView Charting Library XSS Vulnerablity --> TradingView Charting Library XSS Vulnerablity, high impact 18 SEP 2018 • hacking-write-ups --> CSAW CTF Quals ’18 Ldab - Web 50 Write-Up (LDAP Injection) --> CSAW CTF Qualification Round 2018 Web 50 Ldab Write-up - LDAP Injection 30 JUL 2018 • pentesting-lab --> Redis Unauthorized Access Vulnerability Lab --> If a Redis is publicly accessible and is not protected by password, a remote attacker can exploit this to |
HTTP/1.1 301 Moved Permanently Server: GitHub.com Content-Type: text/html Location: https://zhuzhuuu.com/ X-GitHub-Request-Id: FFB2:1786:178D5C7:2034CA1:61C06D53 Content-Length: 162 Accept-Ranges: bytes Date: Mon, 20 Dec 2021 11:47:31 GMT Via: 1.1 varnish Age: 0 Connection: keep-alive X-Served-By: cache-ewr18121-EWR X-Cache: MISS X-Cache-Hits: 0 X-Timer: S1640000851.321928,VS0,VE10 Vary: Accept-Encoding X-Fastly-Request-ID: 787d17ebf1f3f9449430dc6c320363f3dcafd0f2 HTTP/2 200 server: GitHub.com content-type: text/html; charset=utf-8 last-modified: Mon, 18 May 2020 01:29:44 GMT access-control-allow-origin: * etag: "5ec1e508-33e6" expires: Mon, 20 Dec 2021 11:57:31 GMT cache-control: max-age=600 x-proxy-cache: MISS x-github-request-id: 93C0:042A:2601DF:9D1357:61C06D53 accept-ranges: bytes date: Mon, 20 Dec 2021 11:47:31 GMT via: 1.1 varnish age: 0 x-served-by: cache-ewr18144-EWR x-cache: MISS x-cache-hits: 0 x-timer: S1640000851.354806,VS0,VE13 vary: Accept-Encoding x-fastly-request-id: 83206e6a2c0bb815ddc42ff5c1b1685e34f514fc content-length: 13286 |
Domain Name: ZHUZHUUU.COM Registry Domain ID: 1849484439_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.cloudflare.com Registrar URL: http://www.cloudflare.com Updated Date: 2021-02-05T20:01:26Z Creation Date: 2014-03-07T03:40:45Z Registry Expiry Date: 2022-03-07T03:40:45Z Registrar: CloudFlare, Inc. Registrar IANA ID: 1910 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Name Server: KAI.NS.CLOUDFLARE.COM Name Server: MARGE.NS.CLOUDFLARE.COM DNSSEC: unsigned >>> Last update of whois database: 2021-12-24T07:29:13Z <<< |