2djgame.net

2djgame.net
2DJGAME-Mikocon Entrance
✗ Log in Directly → ✓ Log in Safely →
2djgame.net is a safe website about "2DJGAME-Mikocon Entrance" in 2djgame category. The server is running at 194.127.172.142 ip address and there is a secure connection certificate between the website and the visitor. When we did a security search, no viruses or spam were detected on web page. 2djgame have daily 6K and monthly 180K unique visitors from worldwide. While 78% of users browse the site for a long time, 22% exit immediately. According to our financial situation analysis, this website earns an estimated daily $27, weekly $116 and monthly $810 from online advertising. If you want to buy this domain, you need to revise $5305. Because the value of the website can range from at least $3685 to $6924. The anmo.info, bishoujo.moe, galge.cn, mikocon.com similar & alternative web sites to 2djgame.net.

User Reviews 2djgame.net

Please write your , and overall score.


2djgame Server Status

DateServer StatusSpeed
2024-04-02 03:06:12 Up0.418 Second
2024-04-01 16:20:12 Up0.483 Second
2024-04-01 05:34:12 Up0.460 Second
2024-03-31 18:48:12 Up0.569 Second
2024-03-31 08:00:12 Up0.471 Second
2024-03-30 01:06:11 Up0.442 Second
2024-03-29 14:20:12 Up0.472 Second
2024-03-29 03:34:12 Up0.455 Second
2024-03-28 16:48:12 Up0.489 Second
2024-03-28 06:02:11 Up0.431 Second
2024-03-27 19:16:11 Up0.492 Second
2024-03-27 08:30:11 Up0.443 Second
2024-03-26 21:44:11 Up0.465 Second
2024-03-26 10:58:12 Up0.466 Second
2024-03-26 00:12:12 Up0.445 Second
2024-03-25 15:32:31 Up0.755 Second
2024-03-25 13:22:32 Up0.677 Second
2024-03-25 11:12:32 Up0.463 Second
2024-03-25 09:04:32 Up0.555 Second
2024-03-25 06:54:25 Up0.646 Second

Known Searchs

2djgame
mikocon
快感即イキ満淫電車 torrent
淫魔殺しと無謀な勇者
彼女の媚肉が堕ちるまで torrent

☁ Content Metrics

  1. 2djgame 8%
  2. mikocon 8%
  3. entrance 5%
  4. you 5%
  5. this 5%
  6. for 3%
  7. under 3%
  8. are 3%
  9. window 3%
  10. close 3%
  11. please 3%
  12. only 3%
  13. adults 3%
  14. seconds 3%
  15. website 3%
  16. forum 3%
  17. the 3%
  18. redirected 3%
  19. will 3%
  20. welcome 3%
  21. %

Website raw article content tells search engines what your web page content is about. The word usage rate is very important and the frequency of words used above 4% is perceived as spam.

☯ Technology Analysis

  • - PHP - ASP.NET - Microsoft-IIS

☂ Security Analytics

  • ✔ Feodo Tracker
  • ✔ CLEAN MX
  • ✔ DNS8
  • ✔ NotMining
  • ✔ VX Vault
  • ✔ securolytics
  • ✔ Tencent
  • ✔ MalwarePatrol
  • ✔ MalSilo
  • ✔ Comodo Valkyrie Verdict
  • ✔ PhishLabs
  • ✔ EmergingThreats
  • ✔ Sangfor
  • ✔ K7AntiVirus
  • ✔ Spam404
  • ✔ Virusdie External Site Scan
  • ✔ Artists Against 419
  • ✔ IPsum
  • ✔ Cyren
  • ✔ Quttera
  • ✔ AegisLab WebGuard
  • ✔ MalwareDomainList
  • ✔ Lumu
  • ✔ zvelo
  • ✔ Google Safebrowsing
  • ✔ Kaspersky
  • ✔ BitDefender
  • ✔ GreenSnow
  • ✔ G-Data
  • ✔ OpenPhish
  • ✔ Malware Domain Blocklist
  • ✔ AutoShun
  • ✔ Trustwave
  • ✔ Web Security Guard
  • ✔ Cyan
  • ✔ CyRadar
  • ✔ desenmascara.me
  • ✔ ADMINUSLabs
  • ✔ CINS Army
  • ✔ Dr.Web
  • ✔ AlienVault
  • ✔ Emsisoft
  • ✔ Spamhaus
  • ✔ malwares.com URL checker
  • ✔ Phishtank
  • ✔ EonScope
  • ✔ Malwared
  • ✔ Avira
  • ✔ Cisco Talos IP Blacklist
  • ✔ CyberCrime
  • ✔ Antiy-AVL
  • ✔ Forcepoint ThreatSeeker
  • ✔ SCUMWARE.org
  • ✔ Certego
  • ✔ URLhaus
  • ✔ Yandex Safebrowsing
  • ✔ ESET
  • ✔ Threatsourcing
  • ✔ BlockList
  • ✔ SecureBrain
  • ✔ Nucleon
  • ✔ PREBYTES
  • ✔ Sophos
  • ✔ Blueliv
  • ✔ Hoplite Industries
  • ✔ Netcraft
  • ✔ CRDF
  • ✔ ThreatHive
  • ✔ BADWARE.INFO
  • ✔ FraudScore
  • ✔ Quick Heal
  • ✔ Rising
  • ✔ StopBadware
  • ✔ Sucuri SiteCheck
  • ✔ Fortinet
  • ✔ StopForumSpam
  • ✔ ZeroCERT
  • ✔ Baidu-International
  • ✔ Phishing Database

✇ DNS Records

RecordClassTTLValue
AIN299 ip: 194.127.172.142
NSIN21599 target: f1g1ns2.dnspod.net
NSIN21599 target: f1g1ns1.dnspod.net
TXTIN119 txt: v=spf1 include:spf.mail.qq.com ~all
entries: v=spf1 include:spf.mail.qq.com ~all
MXIN119 pri: 10
target: mxbiz2.qq.com
MXIN119 pri: 5
target: mxbiz1.qq.com
CNAMEIN599 target: bbs4.2djgame.net
SOAIN179 mname: f1g1ns1.dnspod.net
rname: freednsadmin.dnspod.com
serial: 1616955782
refresh: 3600
retry: 180
expire: 1209600
minimum-ttl: 180

ℹ Whois Data

Domain Name: 2DJGAME.NET Registry Domain ID: 128554508_DOMAIN_NET-VRSN Registrar WHOIS Server: whois.godaddy.com Registrar URL: http://www.godaddy.com Updated Date: 2020-11-04T19:06:31Z Creation Date: 2004-08-28T10:28:17Z Registry Expiry Date: 2021-11-11T11:59:59Z Registrar: GoDaddy.com, LLC Registrar IANA ID: 146 Registrar Abuse Contact Email: abuse@godaddy.com Registrar Abuse Contact Phone: 480-624-2505 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Name Server: F1G1NS1.DNSPOD.NET Name Server: F1G1NS2.DNSPOD.NET DNSSEC: unsigned URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/ >>> Last update of whois database: 2021-04-17T19:56:08Z <<<

✉ Host Network Data

% This is the RIPE Database query service. % The objects are in RPSL format. % % The RIPE Database is subject to Terms and Conditions. % See http://www.ripe.net/db/support/db-terms-conditions.pdf % Note: this output has been filtered. % To receive output for a database update, use the "-B" flag. % Information related to '194.127.172.142 - 194.127.172.142' % Abuse contact for '194.127.172.142 - 194.127.172.142' is 'abuse@clouvider.net' inetnum: 194.127.172.142 - 194.127.172.142 netname: CLOUVIDER-HB-CLIENT-1167 descr: Customer allocation HB Client 1167 country: GB admin-c: hp4192-RIPE tech-c: CLO7-RIPE status: ASSIGNED PA remarks: Hosted by Clouvider mnt-by: CLOUVIDER-MNT mnt-lower: CLOUVIDER-MNT mnt-domains: CLOUVIDER-MNT mnt-routes: CLOUVIDER-MNT created: 2019-12-01T09:26:13Z last-modified: 2019-12-01T09:26:13Z source: RIPE # Filtered role: Clouvider NOC org: ORG-CL248-RIPE address: Clouvider Limited address: 30 Moorgate address: City of London address: London, UK address: EC2R 6PJ phone: +442036035030 abuse-mailbox: abuse@clouvider.net nic-hdl: CLO7-RIPE mnt-by: CLOUVIDER-MNT tech-c: DN3032-RIPE tech-c: JO2974-RIPE tech-c: MO5116-RIPE admin-c: CLO8-RIPE created: 2013-12-11T16:03:30Z last-modified: 2019-08-06T11:26:11Z source: RIPE # Filtered person: Private Customer - Clouvider - Direct - HB-CLIENT-1167 address: 88 Wood Street address: EC2V 7RS, London address: United Kingdom remarks: This NIC handle belongs to a Customer who opted out from publishing personal details phone: +44.2036035030 mnt-by: CLOUVIDER-MNT nic-hdl: hp4192-RIPE created: 2019-12-01T09:26:13Z last-modified: 2019-12-01T09:26:13Z source: RIPE # Filtered % Information related to '194.127.172.0/24AS62240' route: 194.127.172.0/24 descr: Clouvider Limited descr: DDOS mitigation route origin: AS62240 mnt-by: CLOUVIDER-MNT created: 2019-11-05T14:00:21Z last-modified: 2019-11-05T14:00:21Z source: RIPE % This query was served by the RIPE Database Query Service version 1.99 (WAGYU)

☰ HTTP Header

content-type text/html; charset=utf-8
server microsoft-iis/10.0
x-powered-by php/5.6.31
x-powered-by asp.net
strict-transport-security max-age=259200
date sat, 17 apr 2021 19
content-length 1367

✔ Robots.txt File

# # robots.txt for Discuz! X2 # User-agent: * Disallow: /home/api/ Disallow: /home/data/ Disallow: /home/source/ Disallow: /home/install/ Disallow: /home/template/ Disallow: /home/config/ Disallow: /home/uc_client/ Disallow: /home/uc_server/ Disallow: /home/static/ Disallow: /home/admin.php Disallow: /home/search.php Disallow: /home/member.php Disallow: /home/api.php Disallow: /home/misc.php Disallow: /home/connect.php Disallow: /home/forum.php?mod=redirect* Disallow: /home/forum.php?mod=post* Disallow: /home/home.php?mod=spacecp* Disallow: /home/userapp.php?mod=app&amp;* Disallow: /home/*?mod=misc* Disallow: /home/*?mod=attachment* Disallow: /home/*mobile=yes* Disallow: /home/*ftpmanage* Disallow: /lanfebit

⚔ SSL Metadata

SubjectC = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA
IssuerC = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust RSA Certification Authority
Version2
Serial Number7d5b5126b476ba11db74160bbc530da7
Signature Algorithmsha384WithRSAEncryption
Public Key AlgorithmrsaEncryption
X509v3 Authority Key Identifierkeyid:53:79:BF:5A:AA:2B:4A:CF:54:80:E1:D8:9B:C0:9D:F2:B2:03:66:CB
X509v3 Subject Key Identifier8D:8C:5E:C4:54:AD:8A:E1:77:E9:9B:F9:9B:05:E1:B8:01:8D:61:E1
X509v3 Key UsageDigitalSignature,CertificateSign,CRLSign
X509v3 Basic ConstraintsCA:TRUE,pathlen:0
X509v3 Extended Key UsageTLSWebServerAuthentication,TLSWebClientAuthentication
X509v3 Certificate PoliciesPolicy:X509v3AnyPolicy, Policy:2.23.140.1.2.1
X509v3 CRL Distribution Points, FullName:, URI:http://crl.usertrust.com/USERTrustRSACertificationAuthority.crl
Authority Information AccessCAIssuers-URI:http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt, OCSP-URI:http://ocsp.usertrust.com
Start dateNov 2 00:00:00 2018 GMT
Expire dateDec 31 23:59:59 2030 GMT
RSA Public Key2048

Data Analytics From Other Sites