excess-xss.com valuation and analysis

Robots.txt Information
Robot Path Permission
GoogleBot /
BingBot /
BaiduSpider /
YandexBot /
Meta Tags
Title Excess XSS: A comprehensive tutorial on cross-site
Description A comprehensive tutorial on cross-site
Keywords N/A
Server Information
WebSite excess-xss faviconexcess-xss.com
Host IP 172.104.133.158
Location -
Related Websites
Site Rank
More to Explore
excess-xss.com Valuation
US$1,543,860
Last updated: 2023-04-30 19:50:09

excess-xss.com has Semrush global rank of 6,855,741. excess-xss.com has an estimated worth of US$ 1,543,860, based on its estimated Ads revenue. excess-xss.com receives approximately 178,138 unique visitors each day. Its web server is located in -, with IP address 172.104.133.158. According to SiteAdvisor, excess-xss.com is safe to visit.

Traffic & Worth Estimates
Purchase/Sale Value US$1,543,860
Daily Ads Revenue US$1,426
Monthly Ads Revenue US$42,754
Yearly Ads Revenue US$513,037
Daily Unique Visitors 11,876
Note: All traffic and earnings values are estimates.
DNS Records
Host Type TTL Data
excess-xss.com. A 86400 IP: 172.104.133.158
excess-xss.com. AAAA 86399 IPV6: 2a01:7e01::f03c:91ff:fe40:dfe8
excess-xss.com. NS 86400 NS Record: ns2.linode.com.
excess-xss.com. NS 86400 NS Record: ns3.linode.com.
excess-xss.com. NS 86400 NS Record: ns4.linode.com.
excess-xss.com. NS 86400 NS Record: ns1.linode.com.
excess-xss.com. NS 86400 NS Record: ns5.linode.com.
excess-xss.com. MX 86400 MX Record: 10 mail.excess-xss.com.
HtmlToTextCheckTime:2023-04-30 19:50:09
Excess XSS A comprehensive tutorial on cross-site scripting Created by Jakob Kallin and Irene Lobo Valbuena Overview XSS Attacks Preventing XSS Summary Part One: Overview What is XSS? Cross-site scripting (XSS) is a code injection attack that allows an attacker to execute malicious JavaScript in another user’s browser. The attacker does not directly target his victim. Instead, he exploits a vulnerability in a website that the victim visits, in order to get the website to deliver the malicious JavaScript for him. To the victim’s browser, the malicious JavaScript appears to be a legitimate part of the website, and the website has thus acted as an unintentional accomplice to the attacker. How the malicious JavaScript is injected The only way for the attacker to run his malicious JavaScript in the victim’s browser is to inject it into one of the pages that the victim downloads from the website. This can happen if the website directly includes user input in its pages, because the attacker
HTTP Headers
HTTP/1.1 302 Found
Date: Sat, 23 Oct 2021 12:47:29 GMT
Server: Apache/2.4.29 (Ubuntu)
Location: https://excess-xss.com/
Content-Type: text/html; charset=iso-8859-1

HTTP/1.1 200 OK
Date: Sat, 23 Oct 2021 12:47:30 GMT
Server: Apache/2.4.29 (Ubuntu)
Last-Modified: Thu, 27 Apr 2017 22:15:47 GMT
ETag: "cae6-54e2d4c784ac0"
Accept-Ranges: bytes
Content-Length: 51942
Vary: Accept-Encoding
Content-Type: text/html
excess-xss.com Whois Information
Domain Name: EXCESS-XSS.COM
Registry Domain ID: 1802901665_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.ascio.com
Registrar URL: http://www.ascio.com
Updated Date: 2021-05-06T10:01:37Z
Creation Date: 2013-05-21T16:50:41Z
Registry Expiry Date: 2022-05-21T16:50:41Z
Registrar: Ascio Technologies, Inc. Danmark - Filial af Ascio technologies, Inc. USA
Registrar IANA ID: 106
Registrar Abuse Contact Email: abuse@ascio.com
Registrar Abuse Contact Phone: +1.4165350123
Domain Status: ok https://icann.org/epp#ok
Name Server: NS1.LINODE.COM
Name Server: NS2.LINODE.COM
Name Server: NS3.LINODE.COM
Name Server: NS4.LINODE.COM
Name Server: NS5.LINODE.COM
DNSSEC: unsigned
>>> Last update of whois database: 2021-09-11T23:50:29Z <<<