INSERT INTO sites(host) VALUES('') 1045: Access denied for user 'www-data'@'localhost' (using password: NO) Estimated Worth $468,299 - MYIP.NET Website Information
Welcome to!
 Set MYIP as homepage      


Web Page Information

Meta Description:
Meta Keywords:
sponsored links:
sponsored links:

Traffic and Estimation


Website Ranks

Alexa Rank:
Google Page Rank:
Sogou Rank:
Baidu Cache:

Search Engine Indexed

Search EngineIndexedLinks

Server Data

Web Server:
IP address:    

Registry information

ICANN Registrar:
Name Server:
Whois Server:

Alexa Rank and trends

Traffic: Today One Week Avg. Three Mon. Avg.
Unique IP:

More ranks in the world

Users from these countries/regions

Where people go on this site

Alexa Charts

Alexa Reach and Rank

Whois data

Who is at


Registry Domain ID: 92950382_DOMAIN_NET-VRSN

Registrar WHOIS Server:

Registrar URL:

Updated Date: 2014-02-17T06:02:41Z

Creation Date: 2002-12-09T12:46:58Z

Registry Expiry Date: 2018-12-09T12:46:58Z

Registrar: Gandi SAS

Registrar IANA ID: 81

Registrar Abuse Contact Email: abuse

Registrar Abuse Contact Phone: +33.170377661

Domain Status: clientTransferProhibited

Name Server:

Name Server:

Name Server:

DNSSEC: unsigned

URL of the ICANN Whois Inaccuracy Complaint Form:

>>> Last update of whois database: 2017-09-07T10:29:21Z <<<

For more information on Whois status codes, please visit

The expiration date displayed in this record is the date the

registrar's sponsorship of the domain name registration in the registry is

currently set to expire. This date does not necessarily reflect the expiration

date of the domain name registrant's agreement with the sponsoring

registrar. Users may consult the sponsoring registrar's Whois database to

view the registrar's reported date of expiration for this registration.

You are not authorized to access or query our Whois

database through the use of electronic processes that are high-volume and

automated except as reasonably necessary to register domain names or

modify existing registrations; the Data in VeriSign Global Registry

Services' ("VeriSign") Whois database is provided by VeriSign for

information purposes only, and to assist persons in obtaining information

about or related to a domain name registration record. VeriSign does not

guarantee its accuracy. By submitting a Whois query, you agree to abide

by the following terms of use: You agree that you may use this Data only

for lawful purposes and that under no circumstances will you use this Data

(1) allow, enable, or otherwise support the transmission of mass

unsolicited, commercial advertising or solicitations via e-mail, telephone,

or facsimile; or (2) enable high volume, automated, electronic processes

that apply to VeriSign (or its computer systems). The compilation,

repackaging, dissemination or other use of this Data is expressly

prohibited without the prior written consent of VeriSign. You agree not to

use electronic processes that are automated and high-volume to access or

query the Whois database except as reasonably necessary to register

domain names or modify existing registrations. VeriSign reserves the right

to restrict your access to the Whois database in its sole discretion to ensure

operational stability. VeriSign may restrict or terminate your access to the

Whois database for failure to abide by these terms of use. VeriSign

reserves the right to modify these terms at any time.

The Registry database contains ONLY .COM, .NET, .EDU domains and


Front Page Thumbnail

sponsored links:

Front Page Loading Time

Keyword Hits (Biger,better)

Other TLDs of gray-world

TLDs Created Expires Registered

Similar Websites


Search Engine Spider Emulation Team
Body: Team
Unusual firewall bypassing techniques, network and computer security.
.niaga tuo teg ot reve saw ehs woh gnirednow ,elddim eht nwod yldas deklaw ehs ,rood yreve gniyrt ,rehto eht pu dna edis eno nwod yaw eht lla neeb dah ecilA nehw dna ;dekcol lla erew yeht tub ,llah eht dnuor lla srood erew erehT
Lewis Carroll "Alice In Wonderland"
Home |
Projects |
Papers |
Forum |
Team |
Links |
Welcome on the GW team website dedicated to our
main areas of interest and research which are the "Network Access Control
Systems" bypassing techniques : Tunneling, Covert channels, Network related
steganographic methods and so on.
Covert channels are simple yet very effective mechanisms that enable
communication via unauthorized or not even thought of methods. They can pass
over various access control, monitoring and reporting network systems as these
systems usually fail to check the intrinsic value of data streams in transit.
Network Covert Channels are often based on the concept of Tunneling. This
mechanism allows encapsulation of any protocol within another enabling thus
authorized data streams to carry arbitrary data.
At present, we've developed some projects that allow to establish Covert
Channels inside TCP (HTTP, HTTPS, MSN) and UDP protocols :
Active Port Forwarder - SSL secure packet tunneling;
CCTT - arbitrary TCP and UDP data transfers through
TCP,UDP and HTTP POST messages;
Firepass - arbitrary TCP and UDP data transfers
through HTTP POST messages;
MsnShell - remote Linux shell through the MSN
Wsh - remote Unix/Win shell through HTTP and HTTPS
Cooking channels - communication channel over
HTTP cookies;
g00gle CrewBots - communication channels over the
Read our papers related to Covert Channel techniques
: creation, covering and detection of such kind data flows.
All of our programs/papers are released under the GNU General Public License
(GPL) version 2.0 or under the GNU Free Documentation License, Version 1.2
(GFDL). They are meant to be used for educational/research purposes.
We also have other interesting links and
papers, related to our favorite topic or to the
main computer and network security research field. If you have any
suggestion or comment, don't hesitate to drop few lines at our
general discussion forum or to visit us on the Irc.
Along with NACS bypassing topics, we are also interested to team up or
cooperate on other areas related to computer and network security.
If you find our work of interest or use, please do consider
Skeeve - is POC tool allowing to tunnel TCP connection into ICMP
echo requests/reply using a spoofing method and a bounce server.
[learn more]
Team member's sites:
GNU General Public License
GNU Free Documentation License

Updated Time

Friend links: ProxyFire    More...
Site Map 1 2 3 4 5 6 7 8 9 10 20 30 40 50 60 70 80 90 100 110 120 130 140 150 160 170 180 190 200 250 300 350 400 450 500 550 600 610 620 630 640 650 660 670 680 690 700 710 720 730 740 750
TOS | Contact us
© 2009 Dev by MYIP Elapsed:58.048ms