xenoterracide.com valuation and analysis

Robots.txt Information
Robot Path Permission
GoogleBot /
BingBot /
BaiduSpider /
YandexBot /
User-agent: * Sitemap:
Meta Tags
Title Caleb Cushing’s Blog - Also known as
Description Gradle With Caleb Cushing’s Blog Also known as XenoTerraCide Gradle With Gdub 2020-05-28 2021-08-10 gradle gdub java development build-tools monorepo So I found this
Keywords N/A
Server Information
WebSite xenoterracide faviconxenoterracide.com
Host IP 76.76.21.21
Location United States
Related Websites
Site Rank
More to Explore
xenoterracide.com Valuation
US$320,105
Last updated: 2023-05-11 18:21:13

xenoterracide.com has Semrush global rank of 33,065,107. xenoterracide.com has an estimated worth of US$ 320,105, based on its estimated Ads revenue. xenoterracide.com receives approximately 36,936 unique visitors each day. Its web server is located in United States, with IP address 76.76.21.21. According to SiteAdvisor, xenoterracide.com is safe to visit.

Traffic & Worth Estimates
Purchase/Sale Value US$320,105
Daily Ads Revenue US$296
Monthly Ads Revenue US$8,865
Yearly Ads Revenue US$106,374
Daily Unique Visitors 2,463
Note: All traffic and earnings values are estimates.
DNS Records
Host Type TTL Data
xenoterracide.com. A 299 IP: 76.76.21.21
xenoterracide.com. NS 86400 NS Record: ns1.vercel-dns.com.
xenoterracide.com. NS 86400 NS Record: ns2.vercel-dns.com.
HtmlToTextCheckTime:2023-05-11 18:21:13
Caleb Cushing’s Blog Also known as XenoTerraCide Gradle With Gdub 2020-05-28 2021-08-10 gradle gdub java development build-tools monorepo So I found this cool tool the other day when researching how to do Gradle multi-module (monorepo). The tool is called gdub and what it does, is it behaves more or less like git, instead of having to be in the directory with ./gradlew all you have to do is be in the directory, or a sub directory, and it will fall back to gradle on the path if ./gradlew isn’t present. Beware of SQL injection with Spring Boot and Flyway 2017-05-01 2021-09-04 java code exploit injection postgresql spring spring boot h2 vulnerability flyway sql injection sql So this is a hard to accomplish exploit, and is really only accomplishable by first exploiting another exploit first, or by an employee with some level of trusted access, though this employee might not normally have actual database access. I do believe you should be aware of it, as it leaves open an avenue you may
HTTP Headers
HTTP/1.1 308 Permanent Redirect
Date: Tue, 09 Nov 2021 09:44:12 GMT
Content-Type: text/plain
Connection: keep-alive
Location: https://xenoterracide.com/
Refresh: 0;url=https://xenoterracide.com/
server: Vercel
x-vercel-id: cle1::x8mrd-1636451052283-a34d89895c80

HTTP/2 200 
date: Tue, 09 Nov 2021 09:44:12 GMT
content-type: text/html; charset=utf-8
content-length: 37584
content-disposition: inline; filename="index.html"
cache-control: public, max-age=0, must-revalidate
etag: W/"4d6557bebe490e6f3958a7739a839c5d16e8008a979036fdd3ab198808a3e3b8"
access-control-allow-origin: *
accept-ranges: bytes
age: 2637123
x-vercel-cache: HIT
server: Vercel
x-vercel-id: cle1:cle1::q8hzc-1636451052381-592ea0c58aee
strict-transport-security: max-age=63072000
xenoterracide.com Whois Information
Domain Name: XENOTERRACIDE.COM
Registry Domain ID: 1585906890_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.namecheap.com
Registrar URL: http://www.namecheap.com
Updated Date: 2021-01-21T05:02:57Z
Creation Date: 2010-02-19T00:17:19Z
Registry Expiry Date: 2030-02-19T00:17:19Z
Registrar: NameCheap, Inc.
Registrar IANA ID: 1068
Registrar Abuse Contact Email: abuse@namecheap.com
Registrar Abuse Contact Phone: +1.6613102107
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: A.ZEIT-WORLD.CO.UK
Name Server: B.ZEIT-WORLD.COM
Name Server: C.ZEIT-WORLD.ORG
Name Server: F.ZEIT-WORLD.NET
DNSSEC: unsigned
>>> Last update of whois database: 2021-11-09T08:26:20Z <<<