Возраст домена | 20 лет |
Дата окончания | Истек срок регистрации |
PR | 3 |
ИКС | 0 |
Страниц в Google | 34 |
Страниц в Яндексе | 14 |
Dmoz | Нет |
Яндекс Каталог | Нет |
Alexa Traffic Rank | 8885520 |
Alexa Country | Нет данных |
История изменения показателей | Авторизация |
Идет сбор информации... Обновить
Security Tango℠
security,malware,virus,rootkit,repair,fix,windows,mac,android,iphone
Security from online viruses, malware, and rootkits
UTF-8
175.8 КБ
2 500
124 356 симв.
105 925 симв.
Данные предоставлены сервисом semrush
Сайт | Общие фразы | PR | тИЦ | Alexa Rank | Alexa Country | |
---|---|---|---|---|---|---|
tangopc.com | 8 | n/a | 0 | 2564280 | 1116195 | |
learntodancetango.com | 6 | 2 |
0 | 4167463 | Нет данных | |
soundbytes.org | 5 | 3 |
0 | 4167044 | 767642 | |
tangolingua.com | 4 | 3 |
0 | 19941075 | Нет данных | |
tangoforpc.net | 4 | n/a | 0 | 18331027 | Нет данных | |
viruswarn.com | 4 | 1 |
0 | 21008199 | Нет данных | |
providencetango.com | 3 | n/a | 0 | 17514532 | Нет данных | |
tangoforpc.com | 3 | n/a | 0 | 22345400 | Нет данных | |
tangosec.co.uk | 2 | n/a | 0 | Нет данных | Нет данных | |
asknick.com | 2 | 4 |
0 | 9578075 | Нет данных | |
Еще 40 сайтов после авторизации |
Данные предоставлены сервисом semrush
Счетчик | Посетители за 24 часа | Просмотры | Просмотров на посетителя |
---|---|---|---|
Google Analytics | Нет доступа | Нет доступа | n/a |
Данные linkpad ( 16 Ноября 2016 ) | |
Количество ссылок на сайт | 505 |
Количество доменов, которые ссылаются на сайт | 29 |
Количество найденных анкоров | 14 |
Исходящие (внешние) ссылки домена | 282 |
Количество доменов, на которые ссылается сайт | 93 |
Количество исходящих анкоров | 89 |
Внешние ссылки главной страницы ( 159 ) | |
avast.com/ | avast! |
free.grisoft.com/ | AVG |
www3.ca.com/Solutions/Product.asp?ID=156 | CA's eTrust |
antivirus.comodo.com | Comodo |
mcafee.com/ | McAfee |
pandasoftware.com/ | Panda Software |
safer-networking.org/en/spybotsd/index.html | Spybot |
symantec.com/ | Symantec (Norton) |
malwarebytes.org/mbam.php | Malwarebytes |
superantispyware.com/ | SuperAntiSpy |
us.mcafee.com/root/package.asp?pkgid=103 | McAfee Firewall |
symantec.com/sabu/nis/npf/ | Norton Firewall |
zonelabs.com/store/content/catalog/products/sku_list_za.jsp | ZoneAlarm |
sophos.com/en-us/products/free-tools/sophos-anti-rootkit.asp... | Sophos Anti-Rootkit |
public.avast.com/~gmerek/aswMBR.htm | Avast aswMBR |
gmer.net/ | GMER |
labs.bitdefender.com/projects/rootkit-remover/rootkit-remove... | Bitdefender Anti Rootkit |
ccleaner.com/recuva/ | Recuva |
us-cert.gov/ncas/alerts/aa19-339a | AA19-339A: Dridex Malware |
home.treasury.gov/news/press-releases/sm845 | Treasury Sanctions Evil Corp, the Russia-Based Cybercriminal Group Behind Dridex Malware |
justice.gov/opa/pr/russian-national-charged-decade-long-seri... | Russian National Charged with Decade-Long Series of Hacking and Bank Fraud Offenses Resulting in Tens of Millions in Losses and ... |
us-cert.gov/sites/default/files/publications/AA19-339A_WHITE... | AA19-339A_WHITE.csv |
us-cert.gov/sites/default/files/publications/AA19-339A_WHITE... | AA19-339A_WHITE.stix |
nist.gov/publications/guide-malware-incident-prevention-and-... | https://www.nist.gov/publications/guide-malware-incident-prevention-and-handling-desktops-and-laptops |
nsa.gov/Portals/70/documents/what-we-do/cybersecurity/profes... | https://www.nsa.gov/Portals/70/documents/what-we-do/cybersecurity/professional-resources/csi-nsas-top10-cybersecurity-mitigation... |
fbi.gov/contact-us/field-offices | https://www.fbi.gov/contact-us/field-offices |
us-cert.gov/ncas/alerts/TA15-286A, 13 October 2015 | https://www.us-cert.gov/ncas/alerts/TA15-286A, 13 October 2015 |
cyber.nj.gov/threat-profiles/trojan-variants/dridex | https://www.cyber.nj.gov/threat-profiles/trojan-variants/dridex |
alertlogic.com/resources/threat-reports/dridex-malware-has-e... | https://www.alertlogic.com/resources/threat-reports/dridex-malware-has-evolved-to-locky-ransomware/ |
blog.avast.com/a-closer-look-at-the-locky-ransomware | https://blog.avast.com/a-closer-look-at-the-locky-ransomware |
secureworks.com/research/dridex-bugat-v5-botnet-takeover-ope... | https://www.secureworks.com/research/dridex-bugat-v5-botnet-takeover-operation |
forbes.com/sites/thomasbrewster/2015/10/13/dridex-botnet-tak... | https://www.forbes.com/sites/thomasbrewster/2015/10/13/dridex-botnet-takedown/#2b883f00415b |
fox-it.com/en/about-fox-it/corporate/news/fbi-announces-drid... | https://www.fox-it.com/en/about-fox-it/corporate/news/fbi-announces-dridex-gang-indictments-praises-fox/ |
us-cert.gov/ncas/alerts/TA15-286A | https://www.us-cert.gov/ncas/alerts/TA15-286A |
securityweek.com/dridex-still-active-after-takedown-attempt | https://www.securityweek.com/dridex-still-active-after-takedown-attempt |
forbes.com/sites/geoffwhite/2018/09/26/how-the-dridex-gang-m... | https://www.forbes.com/sites/geoffwhite/2018/09/26/how-the-dridex-gang-makes-millions-from-bespoke-ransomware/ |
cisecurity.org/wp-content/uploads/2018/09/MS-ISAC-Cyber-Crim... | https://www.cisecurity.org/wp-content/uploads/2018/09/MS-ISAC-Cyber-Crime-Technical-Desk-Reference.pdf |
symantec.com/content/en/us/enterprise/media/security_respons... | http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/dridex-financial-trojan.pdf |
welivesecurity.com/2018/01/26/friedex-bitpaymer-ransomware-w... | https://www.welivesecurity.com/2018/01/26/friedex-bitpaymer-ransomware-work-dridex-authors/ |
proofpoint.com/us/threat-insight/post/dridex-campaigns-milli... | https://www.proofpoint.com/us/threat-insight/post/dridex-campaigns-millions-recipients-unpatched-microsoft-zero-day |
proofpoint.com/us/threat-insight/post/high-volume-dridex-cam... | https://www.proofpoint.com/us/threat-insight/post/high-volume-dridex-campaigns-return |
proofpoint.com/us/threat-insight/post/threat-actor-profile-t... | https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta505-dridex-globeimposter |
blogs.forcepoint.com/blog/security-labs/new-year-new-look-dr... | https://blogs.forcepoint.com/blog/security-labs/new-year-new-look-dridex-compromised-ftp |
symantec.com/connect/blogs/dridex-and-how-overcome-it | https://www.symantec.com/connect/blogs/dridex-and-how-overcome-it |
blog.trendmicro.com/trendlabs-security-intelligence/ursnif-e... | https://blog.trendmicro.com/trendlabs-security-intelligence/ursnif-emotet-dridex-and-bitpaymer-gangs-linked-by-a-similar-loader/ |
blogs.cisco.com/security/talos/spam-dridex | https://blogs.cisco.com/security/talos/spam-dridex |
us-cert.gov/privacy/notification | Notification |
dhs.gov/privacy-policy | Privacy & Use |
us-cert.gov/ncas/alerts/aa19-290a | AA19-290A: Microsoft Ending Support for Windows 7 and Windows Server 2008 R2 |
blogs.microsoft.com/on-the-issues/2019/09/20/extending-free-... | Extending free Windows 7 security updates to voting systems |
microsoft.com/en-us/windows/windows-7-end-of-life-support-in... | [1] Microsoft End of Support FAQ |
support.microsoft.com/en-us/help/13853/windows-lifecycle-fac... | [2] Microsoft Windows Lifecyle Fact Sheet |
docs.microsoft.com/en-us/windows/deployment/upgrade/windows-... | [3] Microsoft Windows Upgrade and Migration Considerations |
computerworld.com/article/3431616/leaving-windows-7-here-are... | [4] ComputerWorld: Leaving Windows 7? Here are Some non-Windows Options |
us-cert.gov/ncas/analysis-reports/AR19-133A | [5] CISA Analysis Report AR19-133A: Microsoft Office 365 Security Observations |
us-cert.gov/ncas/alerts/AA19-168A | AA19-168A: Microsoft Operating Systems BlueKeep Vulnerability |
portal.msrc.microsoft.com/en-US/security-guidance/advisory/C... | [3] Microsoft Security Advisory for CVE-2019-0708 |
whitehouse.gov/briefings-statements/press-briefing-on-the-at... | [2] |
support.microsoft.com/en-us/help/4500705/customer-guidance-f... | [4] Microsoft Customer Guidance for CVE-2019-0708 |
whitehouse.gov/briefings-statements/press-briefing-on-the-at... | [2] White House Press Briefing on the Attribution of the WannaCry Malware Attack to North Korea |
us-cert.gov/ncas/alerts/AA19-122A | AA19-122A: New Exploits for Unsecure SAP Systems |
github.com/comaeio/OPCDE/tree/master/2019/Emirates/(SAP)%20G... | [1] Comae Technologies: Operation for Community Development and Empowerment (OPCDE) Cybersecurity Conference Materials |
wiki.scn.sap.com/wiki/display/SI/Gateway+Access+Control+List... | [2] SAP: Gateway Access Control Lists |
onapsis.com | [3] Onapsis Inc. website |
launchpad.support.sap.com/#/notes/1421005 | [6] SAP Note 1421005 |
us-cert.gov/ncas/alerts/AA19-024A | AA19-024A: DNS Infrastructure Hijacking Campaign |
us-cert.gov/sites/default/files/publications/AA19-024A_IOCs.... | IOCs (.csv) |
us-cert.gov/sites/default/files/publications/AA19-024A_IOCs.... | IOCs (.stix) |
blog.talosintelligence.com/2018/11/dnspionage-campaign-targe... | Cisco Talos blog: DNSpionage Campaign Targets Middle East |
blog-cert.opmd.fr/dnspionage-focus-on-internal-actions | CERT-OPMD blog: [DNSPIONAGE] – Focus on internal actions |
fireeye.com/blog/threat-research/2019/01/global-dns-hijackin... | FireEye blog: Global DNS Hijacking Campaign: DNS Record Manipulation at Scale |
crowdstrike.com/blog/widespread-dns-hijacking-activity-targe... | Crowdstrike blog: Widespread DNS Hijacking Activity Targets Multiple Sectors |
us-cert.gov/ncas/alerts/AA18-337A | AA18-337A: SamSam Ransomware |
us-cert.gov/ncas/analysis-reports/AR18-337A | MAR-10219351.r1.v2 – SamSam1 |
us-cert.gov/ncas/analysis-reports/AR18-337B | MAR-10166283.r1.v1 – SamSam2 |
us-cert.gov/ncas/analysis-reports/AR18-337C | MAR-10158513.r1.v1 – SamSam3 |
us-cert.gov/ncas/analysis-reports/AR18-337D | MAR-10164494.r1.v1 – SamSam4 |
us-cert.gov/security-publications/Ransomware | https://www.us-cert.gov/security-publications/Ransomware |
nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83... | [1] NIST SP 800-83: Guide to Malware Incident Prevention and Handling for Desktops and Laptops |
us-cert.gov/forms/feedback | https://www.us-cert.gov/forms/feedback |
us-cert.gov/ncas/alerts/TA18-331A | TA18-331A: 3ve – Major Online Ad Fraud Operation |
ic3.gov | www.ic3.gov |
us-cert.gov/ncas/tips/ST04-005 | https://www.us-cert.gov/ncas/tips/ST04-005 |
us-cert.gov/ncas/tips/ST04-014 | https://www.us-cert.gov/ncas/tips/ST04-014 |
us-cert.gov/ncas/tips/ST04-002 | Choosing and Protecting Passwords |
us-cert.gov/ncas/tips/ST04-006 | https://www.us-cert.gov/ncas/tips/ST04-006 |
eset.com/int/home/online-scanner/ | ESET Online Scanner |
f-secure.com/en/web/home_global/f-secure-online-scanner | F-Secure |
malwarebytes.com/ | Malwarebytes |
mcafee.com/us/downloads/free-tools/index.aspx | McAfee |
microsoft.com/security/scanner/en-us/default.aspx | Microsoft Safety Scanner |
us.norton.com/support/tools/npe.html | Norton Power Eraser |
housecall.trendmicro.com/ | Trend Micro HouseCall |
justice.gov/usao-edny/pr/two-international-cybercriminal-rin... | DOJ Press Release |
github.com/ewhitehats/kovterTools/blob/master/KovterWhitepap... | ewhitehats White Paper on Kovter Malware |
whiteops.com/3ve | White Ops: THE HUNT FOR 3VE |
security.googleblog.com/2018/11/industry-collaboration-leads... | Google Security Blog: Industry collaboration leads to takedown of the “3ve” ad fraud operation |
us-cert.gov/ncas/alerts/AA18-284A | AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide |
acsc.gov.au | [1] Australian Cyber Security Centre (ACSC) |
cyber.gc.ca/en/ | [2] |
ncsc.govt.nz | [3] New Zealand National Cyber Security Centre (NZ NCSC) |
ncsc.gov.uk | [4] UK National Cyber Security Centre (UK NCSC) |
us-cert.gov | [5] US National Cybersecurity and Communications Integration Center |
ncsc.gov.uk/phishing | https://www.ncsc.gov.uk/phishing |
owasp.org/index.php/Category:OWASP_Top_Ten_Project | [6] |
fireeye.com/blog/threat-research/2013/08/breaking-down-the-c... | [7] |
support.microsoft.com/en-us/help/2871997/microsoft-security-... | [8] Microsoft Security Advisory |
docs.microsoft.com/en-us/windows/security/identity-protectio... | minimum requirements for each release of Windows 10 and Windows Server |
docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/... | [9] Microsoft - Best Practices for Securing Active Directory |
digitalshadows.com/blog-and-research/powershell-security-bes... | [10] |
ncsc.gov.uk/guidance/introduction-logging-security-purposes | https://www.ncsc.gov.uk/guidance/introduction-logging-security-purposes |
us-cert.gov/ncas/tips/ST13-003 | https://www.us-cert.gov/ncas/tips/ST13-003 |
ncsc.gov.uk/guidance/protecting-your-organisation-malware | https://www.ncsc.gov.uk/guidance/protecting-your-organisation-malware |
ncsc.gov.uk/guidance/board-toolkit-five-questions-your-board... | https://www.ncsc.gov.uk/guidance/board-toolkit-five-questions-your-boards-agenda |
us-cert.gov/ncas/tips/ST05-012 | https://www.us-cert.gov/ncas/tips/ST05-012 |
ncsc.gov.uk/guidance/multi-factor-authentication-online-serv... | https://www.ncsc.gov.uk/guidance/multi-factor-authentication-online-services |
ncsc.gov.uk/guidance/setting-two-factor-authentication-2fa | https://www.ncsc.gov.uk/guidance/setting-two-factor-authentication-2fa |
ncsc.gov.uk/guidance/mitigating-malware | https://www.ncsc.gov.uk/guidance/mitigating-malware |
ncsc.gov.uk/guidance/preventing-lateral-movement | https://www.ncsc.gov.uk/guidance/preventing-lateral-movement |
ncsc.gov.uk/guidance/10-steps-network-security | https://www.ncsc.gov.uk/guidance/10-steps-network-security |
ncsc.gov.uk/blog-post/protect-your-management-interfaces | https://www.ncsc.gov.uk/blog-post/protect-your-management-interfaces |
ncsc.gov.uk/guidance/10-steps-incident-management | https://www.ncsc.gov.uk/guidance/10-steps-incident-management |
ncsc.gov.uk/guidance/obsolete-platforms-security-guidance | https://www.ncsc.gov.uk/guidance/obsolete-platforms-security-guidance |
ncsc.gov.uk/guidance/protecting-bulk-personal-data-introduct... | https://www.ncsc.gov.uk/guidance/protecting-bulk-personal-data-introduction |
ncsc.gov.uk/guidance/assessing-supply-chain-security | https://www.ncsc.gov.uk/guidance/assessing-supply-chain-security |
ncsc.gov.uk/guidance/eud-security-guidance-windows-10-1709#a... | https://www.ncsc.gov.uk/guidance/eud-security-guidance-windows-10-1709#applicationwhitelistingsection |
ncsc.gov.uk/guidance/end-user-device-security | https://www.ncsc.gov.uk/guidance/end-user-device-security |
ncsc.gov.uk/guidance/macro-security-microsoft-office | https://www.ncsc.gov.uk/guidance/macro-security-microsoft-office |
ncsc.gov.uk/guidance/denial-service-dos-guidance-collection | https://www.ncsc.gov.uk/guidance/denial-service-dos-guidance-collection |
us-cert.gov/Ransomware | https://www.us-cert.gov/Ransomware |
ncsc.gov.uk/guidance/backing-your-data | https://www.ncsc.gov.uk/guidance/backing-your-data |
us-cert.gov/ncas/tips/ST04-013 | https://www.us-cert.gov/ncas/tips/ST04-013 |
ncsc.gov.uk/guidance/gdpr-security-outcomes | https://www.ncsc.gov.uk/guidance/gdpr-security-outcomes |
acsc.gov.au/infosec/mitigationstrategies.htm | https://acsc.gov.au/infosec/mitigationstrategies.htm |
acsc.gov.au/publications/protect/essential-eight-explained.h... | https://acsc.gov.au/publications/protect/essential-eight-explained.htm |
cyber.gc.ca/en/top-10-it-security-actions | https://cyber.gc.ca/en/top-10-it-security-actions |
cse-cst.gc.ca/en/cyberhygiene-pratiques-cybersecurite | https://www.cse-cst.gc.ca/en/cyberhygiene-pratiques-cybersecurite |
cert.govt.nz/it-specialists/critical-controls/ | https://www.cert.govt.nz/it-specialists/critical-controls/ |
cert.govt.nz/businesses-and-individuals/guides/cyber-securit... | https://www.cert.govt.nz/businesses-and-individuals/guides/cyber-security-your-business/top-11-cyber-security-tips-for-your-busi... |
ncsc.govt.nz/resources/ | https://www.ncsc.govt.nz/resources/ |
gcsb.govt.nz/the-nz-information-security-manual/ | https://www.gcsb.govt.nz/the-nz-information-security-manual/ |
ncsc.gov.uk/guidance/10-steps-cyber-security | https://www.ncsc.gov.uk/guidance/10-steps-cyber-security |
ncsc.gov.uk/smallbusiness | https://www.ncsc.gov.uk/smallbusiness |
cyber.gc.ca/en | [2] Canadian Centre for Cyber Security (CCCS) |
owasp.org/index.php/Category:OWASP_Top_Ten_Project | [6] OWASP Top 10 Project |
fireeye.com/blog/threat-research/2013/08/breaking-down-the-c... | [7] FireEye Report on China Chopper |
digitalshadows.com/blog-and-research/powershell-security-bes... | [10] Digital Shadows - PowerShell Security Best Practices |
us-cert.gov/ncas/alerts/TA18-276B | TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers |
us-cert.gov/ncas/alerts/TA17-117A | Alert TA17-117A: Intrusions Affecting Multiple Victims Across Multiple Sectors |
nist.gov/itl/nist-cloud-computing-related-publications | NIST Cloud Computing-Related Publications |
bigdatawg.nist.gov/_uploadfiles/M0008_v1_7256814129.pdf | NIST SP 500-292: Cloud Computing Reference Architecture |
csrc.nist.gov/publications/detail/sp/800-144/final | NIST SP 800-144: Guidelines on Security and Privacy in Public Cloud Computing |
us-cert.gov/ncas/alerts/TA18-276A | TA18-276A: Using Rigorous Credential Control to Mitigate Trusted Network Exploitation |
nist.gov/cyberframework/framework | National Institute of Standards and Technology (NIST) Cybersecurity Framework |
amazon.com/dp/B07WQF6P6T/ | <img> |
amazon.com/dp/B07WQJSWN5/ | <img> |
amazon.com/dp/B07WKBW8D4/ | <img> |
AskNick.com/ | Nick Francesco |
google.com/policies/privacy/partners/ | Read more |
Внутренние ссылки главной страницы ( 13 ) | |
index.php | Home |
# | File Recovery |
securitytango.com/windows.php | The Windows Waltz |
securitytango.com/linux.php | The Linux Lambada |
securitytango.com/android.php | The Android Allemande |
securitytango.com/macintosh.php | arena |
securitytango.com/ios.php | The iPhone Pavane |
passwords.php | Good Passwords |
blame.php | Blame, Credits, etc. |
backup.php | Backup Software |
winupdate.php | Windows Update Problems |
definitions.php | Definitions |
news.php | News |
Domain Name: SECURITYTANGO.COM
Registry Domain ID: 117856047_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.fastdomain.com
Registrar URL: http://www.fastdomain.com
Updated Date: 2017-04-21T12:06:04Z
Creation Date: 2004-04-21T12:05:55Z
Registry Expiry Date: 2018-04-21T12:05:55Z
Registrar: FastDomain, Inc.
Registrar IANA ID: 1154
Registrar Abuse Contact Email:
Registrar Abuse Contact Phone:
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: NS1.BLUEHOST.COM
Name Server: NS2.BLUEHOST.COM
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of whois database: 2017-10-07T10:20:16Z <<<
For more information on Whois status codes, please visit https://icann.org/epp
NOTICE: The expiration date displayed in this record is the date the
registrar's sponsorship of the domain name registration in the registry is
currently set to expire. This date does not necessarily reflect the expiration
date of the domain name registrant's agreement with the sponsoring
registrar. Users may consult the sponsoring registrar's Whois database to
view the registrar's reported date of expiration for this registration.
TERMS OF USE: You are not authorized to access or query our Whois
database through the use of electronic processes that are high-volume and
automated except as reasonably necessary to register domain names or
modify existing registrations; the Data in VeriSign Global Registry
Services' ("VeriSign") Whois database is provided by VeriSign for
information purposes only, and to assist persons in obtaining information
about or related to a domain name registration record. VeriSign does not
guarantee its accuracy. By submitting a Whois query, you agree to abide
by the following terms of use: You agree that you may use this Data only
for lawful purposes and that under no circumstances will you use this Data
to: (1) allow, enable, or otherwise support the transmission of mass
unsolicited, commercial advertising or solicitations via e-mail, telephone,
or facsimile; or (2) enable high volume, automated, electronic processes
that apply to VeriSign (or its computer systems). The compilation,
repackaging, dissemination or other use of this Data is expressly
prohibited without the prior written consent of VeriSign. You agree not to
use electronic processes that are automated and high-volume to access or
query the Whois database except as reasonably necessary to register
domain names or modify existing registrations. VeriSign reserves the right
to restrict your access to the Whois database in its sole discretion to ensure
operational stability. VeriSign may restrict or terminate your access to the
Whois database for failure to abide by these terms of use. VeriSign
reserves the right to modify these terms at any time.
The Registry database contains ONLY .COM, .NET, .EDU domains and
Registrars.
User-agent: *
Disallow: /ringtone/
Disallow: /includes/
Disallow: /rss_cache/
Disallow: /usage/
Disallow: /webalizer/
Disallow: /ashnews/
США - 65.44.220.71
Hosting Solutions, LLC
XO Communications
HTTP/1.1 200 OK
Date: Tue, 17 Dec 2019 16:30:23 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Clacks-Overhead: GNU Terry Pratchett
Set-Cookie: PHPSESSID=8n46cd27ekbhl4jqspn6mkpou6; path=/
Upgrade: h2,h2c
Connection: Upgrade
Vary: Accept-Encoding
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
Кнопка для анализа сайта в один клик, для установки перетащите ссылку на "Панель закладок"