Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
Title | Nothink! |
Description | Honeypot statistics, data and others stuff about malware and network |
Keywords | matteo cantoni,goony,honeypot,metasploit,penetration testing,malware,malware archive,malware network activity,exploit,metasploit,ddos,dns amplification,dns,smb,telnet,ssh,openbsd,perl,snmp,snmpcheck,antivirus,virus,bettercap,bug bounty |
WebSite | nothink.org |
Host IP | 62.149.140.215 |
Location | Italy |
Site | Rank |
US$2,152,643
Last updated: 2023-05-01 16:38:49
nothink.org has Semrush global rank of 4,916,888. nothink.org has an estimated worth of US$ 2,152,643, based on its estimated Ads revenue. nothink.org receives approximately 248,382 unique visitors each day. Its web server is located in Italy, with IP address 62.149.140.215. According to SiteAdvisor, nothink.org is safe to visit. |
Purchase/Sale Value | US$2,152,643 |
Daily Ads Revenue | US$1,988 |
Monthly Ads Revenue | US$59,612 |
Yearly Ads Revenue | US$715,340 |
Daily Unique Visitors | 16,559 |
Note: All traffic and earnings values are estimates. |
Host | Type | TTL | Data |
nothink.org. | A | 7199 | IP: 62.149.140.215 |
nothink.org. | NS | 21600 | NS Record: dns2.technorail.com. |
nothink.org. | NS | 21600 | NS Record: dns.technorail.com. |
nothink.org. | NS | 21600 | NS Record: dns4.arubadns.cz. |
nothink.org. | NS | 21600 | NS Record: dns3.arubadns.net. |
nothink.org. | MX | 21600 | MX Record: 10 mx.nothink.org. |
nothink.org. | TXT | 21600 | TXT Record: v=spf1 include:aruba.it ~all |
Nothink! Father, triathlete , security analyst and bug bounty hunter in spare time. My interests are honeypots, malwares collection, wardriving, forensic and bug bounties. I’m also an OpenBSD enthusiast and occasionally I contribute with the Metasploit project developing modules and porting public exploits for educational purposes only. During the last years I managed many honeypot systems (ADB, DNS (a low bandwidth open resolver server to observe DNS amplification attacks automatically), SMB, SNMP, SSH, Telnet) and I shared data, blacklists and statistics with all the Internet (students, researchers, companies...). Currently the data is no longer shared. But you can find something below. My most successful open source project is snmpcheck , a tool to enumerate information via SNMP protocol. You can find it into the most secure Linux distros. Just out of curiosity, some references to my site or my tools. If you have any question please let me know, my key ID is |
HTTP/1.1 301 Moved Permanently Date: Sun, 24 Oct 2021 06:27:10 GMT Server: Apache Location: http://www.nothink.org/ Content-Type: text/html; charset=iso-8859-1 HTTP/1.1 200 OK Date: Sun, 24 Oct 2021 06:27:10 GMT Server: Apache Upgrade: h2 Connection: Upgrade Content-Type: text/html |
Domain Name: NOTHINK.ORG Registry Domain ID: D105472752-LROR Registrar WHOIS Server: whois.tucows.com Registrar URL: http://www.tucows.com Updated Date: 2020-12-15T10:17:13Z Creation Date: 2004-12-22T13:12:52Z Registry Expiry Date: 2021-12-22T13:12:52Z Registrar: Tucows Domains Inc. Registrar IANA ID: 69 Registrar Abuse Contact Email: domainabuse@tucows.com Registrar Abuse Contact Phone: +1.4165350123 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Registrant Organization: MATTEO CANTONI Registrant State/Province: MI Registrant Country: IT Name Server: DNS2.TECHNORAIL.COM Name Server: DNS.TECHNORAIL.COM Name Server: DNS3.ARUBADNS.NET Name Server: DNS4.ARUBADNS.CZ DNSSEC: unsigned URL of the ICANN Whois Inaccuracy Complaint Form https://www.icann.org/wicf/) >>> Last update of WHOIS database: 2021-09-12T14:25:05Z <<< |