glenscott.net Report : Visit Site


  • Server:nginx...

    The main IP address: 95.183.51.216,Your server Switzerland,Zurich ISP:Solar Communications GMBH  TLD:net CountryCode:CH

    The description :-- sysadmin, scripting, and security -- home about archives software theme -- infosec linux meta-writing miscellany mobile devices netbook psychology python rant studies sysadmin technical website par...

    This report updates in 12-Jul-2018

Created Date:2005-08-08
Changed Date:2016-08-07
Expires Date:2017-08-08

Technical data of the glenscott.net


Geo IP provides you such as latitude, longitude and ISP (Internet Service Provider) etc. informations. Our GeoIP service found where is host glenscott.net. Currently, hosted in Switzerland and its service provider is Solar Communications GMBH .

Latitude: 47.366668701172
Longitude: 8.5500001907349
Country: Switzerland (CH)
City: Zurich
Region: Zurich
ISP: Solar Communications GMBH

HTTP Header Analysis


HTTP Header information is a part of HTTP protocol that a user's browser sends to called nginx containing the details of what the browser wants and will accept back from the web server.

X-XSS-Protection:1; mode=block
X-Content-Type-Options:nosniff
Content-Encoding:gzip
Transfer-Encoding:chunked
Strict-Transport-Security:max-age=15552000; includeSubdomains
Server:nginx
Connection:keep-alive
X-Rickroll:Never gonna give you up, never gonna let you down
Link:; rel="https://api.w.org/"
Date:Thu, 12 Jul 2018 10:41:23 GMT
X-Frame-Options:deny
Content-Type:text/html; charset=UTF-8
X-Clacks-Overhead:GNU Terry Pratchett

DNS

soa:ns1.he.net. hostmaster.he.net. 2017070500 10800 1800 604800 86400
txt:"v=spf1 mx -all"
ns:ns2.he.net.
ns3.he.net.
ns5.he.net.
ns4.he.net.
ns1.he.net.
ipv4:IP:95.183.51.216
ASN:197988
OWNER:SOLARCOM, CH
Country:CH
mx:MX preference = 0, mail exchanger = aspmx.l.google.com.

HtmlToText

-- sysadmin, scripting, and security -- home about archives software theme -- infosec linux meta-writing miscellany mobile devices netbook psychology python rant studies sysadmin technical website parsing openvas reports in python posted by glen on july 27th, 2015 in infosec , python , technical [ no comments] i was using openvas to do some network auditing and accessing report results via the (greenbone security assistant) web interface quite often seemed somewhat slow and clunky. the report is downloadable as an xml file though, and i’ve recently been getting familiar with parsing nmap xml files in python , so a bit of scripting later and voila! goxparse (glens openvas xml parser) – a command line tool to quickly search / filter through the openvas scan results. as an added bonus, you can output a .csv file from an nmap scan using gnxparse.py and feed it to goxparse.py to provide an inline comparison of open ports. $ ./goxparse.py --help usage: goxparse.py filename.xml [ options ] glens openvas xml parser ( goxparse ) positional arguments: file file containing openvas xml report optional arguments: -h, --help show this help message and exit -i, -ips output unfiltered list of scanned ipv4 addresses -host [ hostip ] host to generate a report for -cvssmin [ cvssmin ] minimum cvss level to report -cvssmax [ cvssmax ] maximum cvss level to report -threatlevel [ threat ] threat level to match, log/low/medium/high/critical -matchfile [ matchfile ] .csv file from which to match open ports, in format hostip,port1,port2,port3 -v, --version show program ' s version number and exit usage examples: goxparse.py ./scan.xml -ips goxparse.py ./scan.xml -host <hostip> goxparse.py ./scan.xml -cvssmin 5 -cvssmax 8 goxparse.py ./scan.xml -threatlevel high you can get goxparse from the bitbucket repo here . parsing and merging nmap xml report files in python posted by glen on april 19th, 2015 in infosec , python , technical [ (1) comments] here are a couple of tools i wrote in python to parse and merge/ join nmap .xml report files . tl;dr: gnxparse.py outputs discovered host, port info from nmap .xml, optionally in the form of nmap command(s) to re-scan hosts. gnxmerge.py glues multiple (<host> sections from) nmap xml reports together. you can download them from the git repo here . problem: nmap is great for network auditing. scanning from an internal, privileged, and/or fast network location (eg inside your firewall) is straightforward and fast, but doesn’t give you the whole picture – which discovered hosts and services are exposed from a different – eg external/public network. to get this info, you could do a firewall config audit, but if you don’t have this access or just want to do a functional test of the firewall, you need to run another scan. for the same accuracy, you’ll want the full range (1-65535) portscan, and this takes time. also, this kind of scan is noisy and may generate a lot of firewall/ips logs. lastly, if you traverse an ips/ids with such a noisy scan, it may drop you as malicious, and the rest of the results are lost. solution: an alternative approach is to do a full scan internally, and use the results to make a much quieter external scan targeting only known live hosts and services. gnxparse.py can generate nmap ‘rescan’ commands to run from outside the firewall, and gnxmerge.py helps tidy up the results by merging the multiple output files back into a single report. the workflow goes something like this: perform a thorough scan of your publically routable subnets from a location inside the firewall. (using some fairly well tuned host discovery options in nmap, it takes me about 3 hours to scan the full port range on ~1000 hosts on a fast internal network.) run gnxparse.py with the ‘rescan’ option on the .xml file generated from the internal nmap scan. this will output a bash script with individual nmap commands to probe only those hosts and services found to be up. copy the script to an external host with nmap and run it. (for all discovered services on the ~1000 hosts scaned earlier, it takes me only about five minutes to do a re-scan). run gnxmerge.py on the folder of individual .xml reports generated (one per host) if you need to produce a single nmap xml report file for any reason, for example to load up in zenmap[1] and review which of your services are exposed externally. hopefully someone else finds these tools useful. you can download gnxparse.py and gnxmerge.py from my gnxtools repo on bitbucket. [1] i am aware zenmap can also load multiple nmap report files for viewing; though it does not merge/save. posting domain mapped permalinks via the wp-to-twitter plugin posted by glen on october 28th, 2014 in technical , website [ (1) comments] a really useful wordpress feature is support for hosting multiple sites from the same core install. i used to run wordpress-mu for this purpose before it was rolled into the main version. if you have control of dns you can easily have sites as subdomains, or even map a seperate domain to a subsite using a plugin such as wordpress mu domain mapping . since i use ssl with a wildcard certificate this also means i can securely administer wordpress subsites via https://subsite-example. while having a public non-ssl url of http://subsite-example.tld . i recently installed the plugin wp-to-twitter to use on a subsite, and found that when posting updates to twitter, wordpress unfortunately provides it with the http://subsite-example./link-to-post permalink instead of the http://subsite-example.tld/link-to-post permalink. this doesn’t seem to be the fault of either plugin as mu domain mapping is using some smoke and mirrors rewriting to display the mapped http://subsite-example.tld domain while the plugins in the secure wordpress admin url (including wp-to-twitter) rightly see the site as if it is located at https://subsite-example. . i tried a few combinations of changing the site_url and home_url values in the network admin –> sites panel, but only succeeded in breaking my domain mapping. until domain mapping is baked into the wordpress core i suspect this will continue to be an issue. i’m not a wordpress/plugin dev by any stretch but i spent a couple of hours looking through the code for wp-to-twitter and concocted a (temporary) hack which is now posting the correct permalink to twitter. i would have been happy with hardcoding the domain value since the plugin is only being used on one site, but in the end i learned a few things about core wordpress php functions and came up with a solution which should work for multiple subsites / domains. i based part of this solution on the post here: http://premium.wpmudev.org/forums/topic/permalinks-converted-to-those-domain-based here’s the code: add the following function to wp-content/plugins/wp-to-twitter/wpt-functions.php function get_permalink_dom ( $id ) { global $wpdb ; $linkpath = str_replace ( home_url ( ) , '' , get_permalink ( $id ) ) ; $thisblogid = get_current_blog_id ( ) ; $thisblogdomain = $wpdb -> get_var ( "select domain from wp_domain_mapping where blog_id = $thisblogid and active = 1" ) ; return "http://" . $thisblogdomain . $linkpath ; } edit the following in wp-content/plugins/wp-to-twitter/wpt-truncate.php // comment/remove the below line (15) and replace it with the call to get_permalink_dom //$thisposturl = trim($shrink); $thisposturl = trim ( get_permalink_dom ( $post_id ) ) ; that’s it; the ‘tweet now’ box in the post editor should use the domain mapped link. « previous entries pages about archives software recent posts parsing openvas reports in python parsing and merging nmap xml report files in python posting domain mapped permalinks via the wp-to-twitter plugin scanning and reporting on ssl cert expiry dates – an ssl certificate scanner using bash, php and jquery simple bash script to mass query reverse dns ptr records for a subnet authors charles stross cory doctorow greg egan neal stephenson peter watts richard morgan

URL analysis for glenscott.net


https://www.glenscott.net/archives/
https://www.glenscott.net/category/technical/mobile-devices/
https://www.glenscott.net/category/technical/
https://www.glenscott.net/about/
https://www.glenscott.net/category/technical/python/
https://www.glenscott.net/2012/03/26/simple-bash-script-to-mass-query-reverse-dns-ptr-records-for-a-subnet/
https://www.glenscott.net/category/psychology/
https://www.glenscott.net/category/technical/sysadmin/
https://www.glenscott.net/category/meta-writing/
https://www.glenscott.net/page/2/
https://www.glenscott.net/category/studies/
https://www.glenscott.net/category/technical/linux/
https://www.glenscott.net/2013/08/15/scanning-and-reporting-on-ssl-cert-expiry-dates-bash-php-and-jquery/
https://www.glenscott.net/2015/04/19/parsing-and-merging-nmap-xml-report-files-in-python/#comments
https://www.glenscott.net/category/technical/infosec/

Whois Information


Whois is a protocol that is access to registering information. You can reach when the website was registered, when it will be expire, what is contact details of the site with the following informations. In a nutshell, it includes these informations;


Whois Server Version 2.0

Domain names in the .com and .net domains can now be registered
with many different competing registrars. Go to http://www.internic.net
for detailed information.

Domain Name: GLENSCOTT.NET
Registrar: GANDI SAS
Sponsoring Registrar IANA ID: 81
Whois Server: whois.gandi.net
Referral URL: http://www.gandi.net
Name Server: NS1.HE.NET
Name Server: NS2.HE.NET
Name Server: NS3.HE.NET
Name Server: NS4.HE.NET
Name Server: NS5.HE.NET
Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Updated Date: 07-aug-2016
Creation Date: 08-aug-2005
Expiration Date: 08-aug-2017

>>> Last update of whois database: 2017-07-19T07:29:51Z <<<

For more information on Whois status codes, please visit https://icann.org/epp

NOTICE: The expiration date displayed in this record is the date the
registrar's sponsorship of the domain name registration in the registry is
currently set to expire. This date does not necessarily reflect the expiration
date of the domain name registrant's agreement with the sponsoring
registrar. Users may consult the sponsoring registrar's Whois database to
view the registrar's reported date of expiration for this registration.

TERMS OF USE: You are not authorized to access or query our Whois
database through the use of electronic processes that are high-volume and
automated except as reasonably necessary to register domain names or
modify existing registrations; the Data in VeriSign Global Registry
Services' ("VeriSign") Whois database is provided by VeriSign for
information purposes only, and to assist persons in obtaining information
about or related to a domain name registration record. VeriSign does not
guarantee its accuracy. By submitting a Whois query, you agree to abide
by the following terms of use: You agree that you may use this Data only
for lawful purposes and that under no circumstances will you use this Data
to: (1) allow, enable, or otherwise support the transmission of mass
unsolicited, commercial advertising or solicitations via e-mail, telephone,
or facsimile; or (2) enable high volume, automated, electronic processes
that apply to VeriSign (or its computer systems). The compilation,
repackaging, dissemination or other use of this Data is expressly
prohibited without the prior written consent of VeriSign. You agree not to
use electronic processes that are automated and high-volume to access or
query the Whois database except as reasonably necessary to register
domain names or modify existing registrations. VeriSign reserves the right
to restrict your access to the Whois database in its sole discretion to ensure
operational stability. VeriSign may restrict or terminate your access to the
Whois database for failure to abide by these terms of use. VeriSign
reserves the right to modify these terms at any time.

The Registry database contains ONLY .COM, .NET, .EDU domains and
Registrars.

  REGISTRAR GANDI SAS

  REFERRER http://www.gandi.net

SERVERS

  SERVER net.whois-servers.net

  ARGS domain =glenscott.net

  PORT 43

  SERVER whois.gandi.net

  ARGS glenscott.net

  PORT 43

  TYPE domain

DOMAIN

  NAME glenscott.net

NSERVER

  NS1.HE.NET 216.218.130.2

  NS2.HE.NET 216.218.131.2

  NS3.HE.NET 216.218.132.2

  NS4.HE.NET 216.66.1.2

  NS5.HE.NET 216.66.80.18

STATUS
clientTransferProhibited https://icann.org/epp#clientTransferProhibited

  CHANGED 2016-08-07

  CREATED 2005-08-08

  EXPIRES 2017-08-08

  REGISTERED yes

Go to top

Mistakes


The following list shows you to spelling mistakes possible of the internet users for the website searched .

  • www.uglenscott.com
  • www.7glenscott.com
  • www.hglenscott.com
  • www.kglenscott.com
  • www.jglenscott.com
  • www.iglenscott.com
  • www.8glenscott.com
  • www.yglenscott.com
  • www.glenscottebc.com
  • www.glenscottebc.com
  • www.glenscott3bc.com
  • www.glenscottwbc.com
  • www.glenscottsbc.com
  • www.glenscott#bc.com
  • www.glenscottdbc.com
  • www.glenscottfbc.com
  • www.glenscott&bc.com
  • www.glenscottrbc.com
  • www.urlw4ebc.com
  • www.glenscott4bc.com
  • www.glenscottc.com
  • www.glenscottbc.com
  • www.glenscottvc.com
  • www.glenscottvbc.com
  • www.glenscottvc.com
  • www.glenscott c.com
  • www.glenscott bc.com
  • www.glenscott c.com
  • www.glenscottgc.com
  • www.glenscottgbc.com
  • www.glenscottgc.com
  • www.glenscottjc.com
  • www.glenscottjbc.com
  • www.glenscottjc.com
  • www.glenscottnc.com
  • www.glenscottnbc.com
  • www.glenscottnc.com
  • www.glenscotthc.com
  • www.glenscotthbc.com
  • www.glenscotthc.com
  • www.glenscott.com
  • www.glenscottc.com
  • www.glenscottx.com
  • www.glenscottxc.com
  • www.glenscottx.com
  • www.glenscottf.com
  • www.glenscottfc.com
  • www.glenscottf.com
  • www.glenscottv.com
  • www.glenscottvc.com
  • www.glenscottv.com
  • www.glenscottd.com
  • www.glenscottdc.com
  • www.glenscottd.com
  • www.glenscottcb.com
  • www.glenscottcom
  • www.glenscott..com
  • www.glenscott/com
  • www.glenscott/.com
  • www.glenscott./com
  • www.glenscottncom
  • www.glenscottn.com
  • www.glenscott.ncom
  • www.glenscott;com
  • www.glenscott;.com
  • www.glenscott.;com
  • www.glenscottlcom
  • www.glenscottl.com
  • www.glenscott.lcom
  • www.glenscott com
  • www.glenscott .com
  • www.glenscott. com
  • www.glenscott,com
  • www.glenscott,.com
  • www.glenscott.,com
  • www.glenscottmcom
  • www.glenscottm.com
  • www.glenscott.mcom
  • www.glenscott.ccom
  • www.glenscott.om
  • www.glenscott.ccom
  • www.glenscott.xom
  • www.glenscott.xcom
  • www.glenscott.cxom
  • www.glenscott.fom
  • www.glenscott.fcom
  • www.glenscott.cfom
  • www.glenscott.vom
  • www.glenscott.vcom
  • www.glenscott.cvom
  • www.glenscott.dom
  • www.glenscott.dcom
  • www.glenscott.cdom
  • www.glenscottc.om
  • www.glenscott.cm
  • www.glenscott.coom
  • www.glenscott.cpm
  • www.glenscott.cpom
  • www.glenscott.copm
  • www.glenscott.cim
  • www.glenscott.ciom
  • www.glenscott.coim
  • www.glenscott.ckm
  • www.glenscott.ckom
  • www.glenscott.cokm
  • www.glenscott.clm
  • www.glenscott.clom
  • www.glenscott.colm
  • www.glenscott.c0m
  • www.glenscott.c0om
  • www.glenscott.co0m
  • www.glenscott.c:m
  • www.glenscott.c:om
  • www.glenscott.co:m
  • www.glenscott.c9m
  • www.glenscott.c9om
  • www.glenscott.co9m
  • www.glenscott.ocm
  • www.glenscott.co
  • glenscott.netm
  • www.glenscott.con
  • www.glenscott.conm
  • glenscott.netn
  • www.glenscott.col
  • www.glenscott.colm
  • glenscott.netl
  • www.glenscott.co
  • www.glenscott.co m
  • glenscott.net
  • www.glenscott.cok
  • www.glenscott.cokm
  • glenscott.netk
  • www.glenscott.co,
  • www.glenscott.co,m
  • glenscott.net,
  • www.glenscott.coj
  • www.glenscott.cojm
  • glenscott.netj
  • www.glenscott.cmo
Show All Mistakes Hide All Mistakes