Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
User-agent: * Allow: |
Title | JBZ CTF Team | We Criuz, che si owna di |
Description | m0leCon CTF 2020 - The Rickshank We Criuz, che si owna di |
Keywords | N/A |
WebSite | jbz.team |
Host IP | 185.199.110.153 |
Location | - |
Site | Rank |
US$619,876
Last updated: 2023-05-12 10:25:01
jbz.team has Semrush global rank of 17,074,883. jbz.team has an estimated worth of US$ 619,876, based on its estimated Ads revenue. jbz.team receives approximately 71,525 unique visitors each day. Its web server is located in -, with IP address 185.199.110.153. According to SiteAdvisor, jbz.team is safe to visit. |
Purchase/Sale Value | US$619,876 |
Daily Ads Revenue | US$573 |
Monthly Ads Revenue | US$17,166 |
Yearly Ads Revenue | US$205,990 |
Daily Unique Visitors | 4,769 |
Note: All traffic and earnings values are estimates. |
Host | Type | TTL | Data |
jbz.team. | A | 3599 | IP: 185.199.110.153 |
jbz.team. | A | 3599 | IP: 185.199.109.153 |
jbz.team. | A | 3599 | IP: 185.199.108.153 |
jbz.team. | A | 3599 | IP: 185.199.111.153 |
jbz.team. | AAAA | 3599 | IPV6: 2606:50c0:8001::153 |
jbz.team. | AAAA | 3599 | IPV6: 2606:50c0:8003::153 |
jbz.team. | AAAA | 3599 | IPV6: 2606:50c0:8000::153 |
jbz.team. | AAAA | 3599 | IPV6: 2606:50c0:8002::153 |
jbz.team. | NS | 86400 | NS Record: maceio.porkbun.com. |
jbz.team. | NS | 86400 | NS Record: curitiba.porkbun.com. |
jbz.team. | NS | 86400 | NS Record: salvador.porkbun.com. |
jbz.team. | NS | 86400 | NS Record: fortaleza.porkbun.com. |
jbz.team. | MX | 600 | MX Record: 1 fwd2.porkbun.com. |
jbz.team. | MX | 600 | MX Record: 1 fwd1.porkbun.com. |
jbz.team. | TXT | 600 | TXT Record: v=spf1 mx ~all |
JBZ CTF Team Categories Archive About Nov 15, 2020 • Reverse m0leCon CTF 2020 - The Rickshank Rickdemption The chall was a RPG Pokemon-like client-only game. The objectives are: Kill all the Mortys (but sadly every Morty is stronger than you) Find the flag Aug 12, 2020 • Web BugPoc - Buggy Calculator Everything started with a Tweet : Check out our new XSS Challenge- $2,000 worth of prize money! Submit solutions to http://hackerone.com/bugpoc before 08/12. Rules: Must alert(domain), Must bypass CSP, Must work in Chrome, Must provide a BugPoC demo Good luck! #XSS #CTF #bugbounty #hacked May 22, 2020 • Web | Crypto | Misc | Rev | Pwn | Fore M0lecon 2019 This was an on-site CTF by the Polictenico di Torino’s CTF team pwnthem0le , which took place during the M0lecon 2019 event . Our team won the competition :D May 7, 2019 • Web Ins’Hack 2019 - Bypasses Everywhere The challenge description was minimal: ``` I’m selling very valuable stuff for a reasonable amount of money (for me at least). |
HTTP/1.1 301 Moved Permanently Server: GitHub.com Content-Type: text/html Location: https://jbz.team/ X-GitHub-Request-Id: F9C4:2F7C:19B690:361EEE:61B5B9A5 Content-Length: 162 Accept-Ranges: bytes Date: Sun, 12 Dec 2021 08:58:13 GMT Via: 1.1 varnish Age: 0 Connection: keep-alive X-Served-By: cache-ewr18125-EWR X-Cache: MISS X-Cache-Hits: 0 X-Timer: S1639299493.304730,VS0,VE12 Vary: Accept-Encoding X-Fastly-Request-ID: 58dcb0e9bfcd3596905985e395d8d2f10b0f9f3e HTTP/2 200 server: GitHub.com content-type: text/html; charset=utf-8 last-modified: Sun, 15 Nov 2020 21:09:46 GMT access-control-allow-origin: * etag: "5fb1991a-2e65" expires: Sun, 12 Dec 2021 09:08:13 GMT cache-control: max-age=600 x-proxy-cache: MISS x-github-request-id: 7482:06BA:198207:35C7FB:61B5B9A5 accept-ranges: bytes date: Sun, 12 Dec 2021 08:58:13 GMT via: 1.1 varnish age: 0 x-served-by: cache-ewr18155-EWR x-cache: MISS x-cache-hits: 0 x-timer: S1639299493.337245,VS0,VE15 vary: Accept-Encoding x-fastly-request-id: d28da45b14e446129f4c5364de29ed8536466c92 content-length: 11877 |
Domain Name: jbz.team Registry Domain ID: 18b35e5661594d7f8e1a673a9106a044-DONUTS Registrar WHOIS Server: whois.porkbun.com Registrar URL: http://porkbun.com Updated Date: 2021-04-04T04:41:19Z Creation Date: 2019-04-06T18:52:57Z Registry Expiry Date: 2022-04-06T18:52:57Z Registrar: Porkbun LLC Registrar IANA ID: 1861 Registrar Abuse Contact Email: abuse@porkbun.com Registrar Abuse Contact Phone: +1.5038508351 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Registrant Organization: Private by Design, LLC Registrant State/Province: NC Registrant Country: US Name Server: maceio.porkbun.com Name Server: salvador.porkbun.com Name Server: fortaleza.porkbun.com Name Server: curitiba.porkbun.com DNSSEC: unsigned >>> Last update of WHOIS database: 2021-12-12T09:08:53Z <<< |