Real-time Status

I have a problem with...
User Reports (Last 24h)
Check: 13:10:32

User reports indicate no current problems at expired-domain.com

Real-time Status
  • HTTP Status 405
  • Response Time 198 ms
  • Server Unknown
Tech Stack
No specific technologies detected.
SSL/TLS Certificate
Valid & Secure
  • Issuer: GoDaddy.com, Inc.
  • Expires In: 223 days
DNS Summary
A
2
MX
1
NS
2
TXT
1
Infrastructure Health
21 FTP
CLOSED
22 SSH
CLOSED
80 HTTP
OPEN 110ms
443 HTTPS
OPEN 92ms
3306 MySQL
CLOSED
Global Latency
LocationPing
🇺🇸 New York 169 ms
🇬🇧 London 190 ms
🇩🇪 Frankfurt 220 ms
🇸🇬 Singapore 679 ms
🇯🇵 Tokyo 832 ms
🇦🇺 Sydney 855 ms
Domain Identity
  • Registrar
    Hidden/Proxy
  • Creation Date
    Unknown
  • Contact Email
    Redacted
  • btn_view_whois
Corporate Intelligence (OSINT)
Public Contacts (Emails)
No public contact info found on homepage.
Social Footprint
No public contact info found on homepage.
Email Security & Spoofing
SPF Record
Active
v=spf1 -all
DMARC Policy
Missing
High Risk: Missing SPF or DMARC allows spoofing.
TypeContentTTL
A 76.223.54.146 3600
A 13.248.169.48 3600
NS ns2.afternic.com 86400
NS ns1.afternic.com 86400
SOA ns1.afternic.com 3600
MX 3600
TXT v=spf1 -all 3599

No security headers detected or site unreachable.

  • 1. http://expired-domain.com
  • 2. Final Status: 405
Publicité (Header Leaderboard)

Reputation Analysis

Instantly verify if an IP is involved in DDoS, spam, or hacking attempts using our community database.

CIDR Navigation

Easily browse the entire IPv4 space. Our drill-down structure (/8, /16, /24) allows intuitive network exploration.

Whois & Reverse DNS

Get official registration info (ASN, ISP, Location) and PTR records in real-time.

ads_placeholder
Historique
No recent search.

Cybersecurity Knowledge Base

Understanding the threats detected by our systems.

SSH Brute Force

An automated attack where a script attempts to guess the password of a Secure Shell (SSH) server by trying thousands of combinations. This is a common method used by botnets to gain unauthorized access to servers.

Port Scanning

The practice of sending packets to specific ports on a host to identify open services. While used by administrators for auditing, it is often the first step in an attack to find vulnerabilities.

Botnet Activity

A network of compromised computers (bots) controlled by a third party. They are often used to coordinate DDoS attacks, send spam, or perform distributed brute-force attacks.