bengalitvserial.net
✗ Open Directly → ✓ Open Safely →
TellyUpdates.News - Latest Indian TV Serials Written Episode Updates, Bangla Serial, Hindi Serial Pi
Latest Indian TV Serials Episode Written Updates, Bangla Serial, Hindi Serial Picture, Video, News and much more! More for Indian TV serials.
bengalitvserial.net is a not safe website about "TellyUpdates.News - Latest Indian TV Serials Written Episode Updates Bangla Serial Hindi Serial Pi" in february category. Server runing on 104.18.33.104 ip address and the http connection has an SSL certificate. When we did a security search, 1 sources of viruses or malware were detected on bengalitvserial.net. Bengalitvserial.net have daily 113 and monthly 3K unique visitors from worldwide. According to our financial situation analysis, this website earns an estimated daily $1, weekly $2 and monthly $15 from online advertising. If you want to buy this domain, you need to revise $100. Because the value of the website can range from at least $69 to $130. The bengalivideo.co, bengalitvserial.online, bengalitvserial24.com, tellyupdates.news are similar web sites like bengalitvserial.net.
- Daily
Visitor
113 - Daily
Revenue
$1 - Monthly
Visitor
3K - Monthly
Revenue
$15
Search Keywords
bengalitvserial.net☁ Content Meaning
- february 4%
- 2020 4%
- written 4%
- episode 4%
- update 4%
- 17th 4%
- hai 2%
- yeh 1%
- news 1%
- and 1%
- more 1%
- your 1%
- pyaar 1%
- telly 1%
- mere 1%
- dil 1%
- load 1%
- ghar 1%
- babes 1%
- bhabhi 1%
- %
Website raw article content tells search engines what your web page content is about. The word usage rate is very important and the frequency of words used above 4% is perceived as spam.
☯ Technology Analysis
CloudFlare
DoubleClick for Publishers (DFP)
Google AdSense
Google Font API
Gravatar
WordPress
jQuery Migrate
☂ Threat Analysis
- ✔ CLEAN MX
- ✔ DNS8
- ✔ OpenPhish
- ✔ VX Vault
- ✔ ZDB Zeus
- ✔ ZCloudsec
- ✔ PhishLabs
- ✔ Zerofox
- ✔ K7AntiVirus
- ✔ FraudSense
- ✔ Virusdie External Site Scan
- ✔ Quttera
- ✔ AegisLab WebGuard
- ✔ MalwareDomainList
- ✔ ZeusTracker
- ✔ zvelo
- ✔ Google Safebrowsing
- ✔ Kaspersky
- (phishing site) ⚠ BitDefender
- ✔ Opera
- ✔ Certly
- ✔ G-Data
- ✔ C-SIRT
- ✔ CyberCrime
- ✔ SecureBrain
- ✔ Malware Domain Blocklist
- ✔ MalwarePatrol
- ✔ Webutation
- ✔ Trustwave
- ✔ Web Security Guard
- ✔ CyRadar
- ✔ desenmascara.me
- ✔ ADMINUSLabs
- ✔ Malwarebytes hpHosts
- ✔ Dr.Web
- ✔ AlienVault
- ✔ Emsisoft
- ✔ Rising
- ✔ Malc0de Database
- ✔ malwares.com URL checker
- ✔ Phishtank
- ✔ Malwared
- ✔ Avira
- ✔ NotMining
- ✔ StopBadware
- ✔ Antiy-AVL
- ✔ Forcepoint ThreatSeeker
- ✔ SCUMWARE.org
- ✔ Comodo Site Inspector
- ✔ Malekal
- ✔ ESET
- ✔ Sophos
- ✔ Yandex Safebrowsing
- ✔ Spam404
- ✔ Nucleon
- ✔ Sucuri SiteCheck
- ✔ Blueliv
- ✔ Netcraft
- ✔ AutoShun
- ✔ ThreatHive
- ✔ FraudScore
- ✔ Tencent
- ✔ URLQuery
- ✔ Fortinet
- ✔ ZeroCERT
- ✔ Baidu-International
- ✔ securolytics
✇ DNS Records
Record | Class | TTL | Value |
---|---|---|---|
A | IN | 300 | ip: 104.31.76.114 |
A | IN | 300 | ip: 104.31.77.114 |
NS | IN | 86400 | target: gerald.ns.cloudflare.com |
NS | IN | 86400 | target: brenda.ns.cloudflare.com |
TXT | IN | 300 | txt: ca3-9b18497adbf0417cb02958b06f862228 entries: ca3-9b18497adbf0417cb02958b06f862228 |
MX | IN | 300 | pri: 0 target: dc-c432856e61e0.bengalitvserial.net |
SOA | IN | 3600 | mname: brenda.ns.cloudflare.com rname: dns.cloudflare.com serial: 2033308652 refresh: 10000 retry: 2400 expire: 604800 minimum-ttl: 3600 |
AAAA | IN | 300 | ipv6: 2606:4700:3033::681f:4c72 |
AAAA | IN | 300 | ipv6: 2606:4700:3036::681f:4d72 |
ℹ Domain WHOIS
- Domain name: Bengalitvserial.net
- Registry domain id: 1935420596_domain_net-vrsn
- Registrar whois server: Whois.bigrock.com
- Registrar url: Http://www.bigrock.com
- Updated date: 2019-06-05t04:49:53z
- Creation date: 2015-06-04t15:32:04z
- Registry expiry date: 2020-06-04t15:32:04z
- Registrar: Bigrock solutions ltd
- Registrar iana id: 1495
- Registrar abuse contact email: Abuse-contact@publicdomainregistry.com
- Registrar abuse contact phone: +1.2013775952
- Domain status: The owner can't transfer to another company this domain
- Name server: Brenda.ns.cloudflare.com
- Name server: Gerald.ns.cloudflare.com
- Dnssec: Unsigned
- Last update of whois database: 2021-01-14t06:59:05z
✉ Server IP Details
- NetRange: 104.16.0.0 - 104.31.255.255
- CIDR: 104.16.0.0/12
- NetName: CLOUDFLARENET
- NetHandle: NET-104-16-0-0-1
- Parent: NET104 (NET-104-0-0-0-0)
- NetType: Direct Assignment
- OriginAS: AS13335
- Organization: Cloudflare, Inc. (CLOUD14)
- RegDate: 2014-03-28
- Updated: 2017-02-17
- Comment: All Cloudflare abuse reporting can be done via https //www.cloudflare.com/abuse //www.cloudflare.com/abuse
- Ref: https //rdap.arin.net/registry/ip/104.16.0.0 //rdap.arin.net/registry/ip/104.16.0.0
- OrgName: Cloudflare, Inc.
- OrgId: CLOUD14
- Address: 101 Townsend Street
- City: San Francisco
- StateProv: CA
- PostalCode: 94107
- Country: US
- RegDate: 2010-07-09
- Updated: 2019-09-25
- Ref: https //rdap.arin.net/registry/entity/CLOUD14 //rdap.arin.net/registry/entity/CLOUD14
- OrgNOCHandle: NOC11962-ARIN
- OrgNOCName: NOC
- OrgNOCPhone: +1-650-319-8930
- OrgNOCEmail: noc@cloudflare.com
- OrgNOCRef: https //rdap.arin.net/registry/entity/NOC11962-ARIN //rdap.arin.net/registry/entity/NOC11962-ARIN
- OrgAbuseHandle: ABUSE2916-ARIN
- OrgAbuseName: Abuse
- OrgAbusePhone: +1-650-319-8930
- OrgAbuseEmail: abuse@cloudflare.com
- OrgAbuseRef: https //rdap.arin.net/registry/entity/ABUSE2916-ARIN //rdap.arin.net/registry/entity/ABUSE2916-ARIN
- OrgTechHandle: ADMIN2521-ARIN
- OrgTechName: Admin
- OrgTechPhone: +1-650-319-8930
- OrgTechEmail: rir@cloudflare.com
- OrgTechRef: https //rdap.arin.net/registry/entity/ADMIN2521-ARIN //rdap.arin.net/registry/entity/ADMIN2521-ARIN
- RTechHandle: ADMIN2521-ARIN
- RTechName: Admin
- RTechPhone: +1-650-319-8930
- RTechEmail: rir@cloudflare.com
- RTechRef: https //rdap.arin.net/registry/entity/ADMIN2521-ARIN //rdap.arin.net/registry/entity/ADMIN2521-ARIN
- RNOCHandle: NOC11962-ARIN
- RNOCName: NOC
- RNOCPhone: +1-650-319-8930
- RNOCEmail: noc@cloudflare.com
- RNOCRef: https //rdap.arin.net/registry/entity/NOC11962-ARIN //rdap.arin.net/registry/entity/NOC11962-ARIN
- RAbuseHandle: ABUSE2916-ARIN
- RAbuseName: Abuse
- RAbusePhone: +1-650-319-8930
- RAbuseEmail: abuse@cloudflare.com
- RAbuseRef: https //rdap.arin.net/registry/entity/ABUSE2916-ARIN //rdap.arin.net/registry/entity/ABUSE2916-ARIN
☰ HTTP Headers
date | tue, 18 feb 2020 06 |
---|---|
content-type | text/html; charset=utf-8 |
set-cookie | __cfduid=d455a94a2dd35ffa077abd218399c366c1582009152; expires=thu, 19-mar-20 06 |
x-powered-by | php/7.1.33 |
vary | accept-encoding,cookie |
link | <https |
set-cookie | sevisitor=1; expires=tue, 18-feb-2020 07 |
strict-transport-security | max-age=63072000; includesubdomains |
x-frame-options | sameorigin |
x-content-type-options | nosniff |
cache-control | max-age=0 |
expires | tue, 18 feb 2020 06 |
cf-cache-status | dynamic |
expect-ct | max-age=604800, report-uri="https |
server | cloudflare |
cf-ray | 566e1df16e73d254-sof |
content-encoding | gzip |
✔ Robots.txt
User-agent: *
Disallow: /wp-admin/
Allow: /wp-admin/admin-ajax.php
⚔ SSL Analyse
Subject | C = US, ST = CA, L = San Francisco, O = "CloudFlare, Inc.", CN = CloudFlare Inc ECC CA-2 |
---|---|
Issuer | C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore CyberTrust Root |
Version | 2 |
Serial Number | 0ff3e61639aa3d1a1265f41f8b34e5b6 |
Signature Algorithm | sha256WithRSAEncryption |
Public Key Algorithm | id-ecPublicKey |
X509v3 Basic Constraints | CA:TRUE,pathlen:0 |
X509v3 Key Usage | DigitalSignature,CertificateSign,CRLSign |
Authority Information Access | OCSP-URI:http://ocsp.digicert.com |
X509v3 CRL Distribution Points | , FullName:, URI:http://crl3.digicert.com/Omniroot2025.crl |
X509v3 Certificate Policies | Policy:X509v3AnyPolicy, CPS:https://www.digicert.com/CPS |
X509v3 Subject Key Identifier | 3E:74:2D:1F:CF:45:75:04:7E:3F:C0:A2:87:3E:4C:43:83:51:13:C6 |
X509v3 Authority Key Identifier | keyid:E5:9D:59:30:82:47:58:CC:AC:FA:08:54:36:86:7B:3A:B5:04:4D:F0 |
Start date | Oct 14 12:00:00 2015 GMT |
Expire date | Oct 9 12:00:00 2020 GMT |
Signature | 38:5f:a7:ff:fc:85:f2:73:32:e4:d5:a3:89:99:96:60:af:32:c1:03:b3:65:df:be:1e:03:ca:a5:ed:85:b2:8f:af:4b:8c:73:8f:2a:8c:a9:00:0e:01:24:17:f7:ec:52:85:76:c8:e5:1c:79:ca:c3:17:87:50:b6:04:33:36:9e:2a:9e:18:17:96:32:12:af:43:cc:57:18:de:db:c7:d8:88:25:83:e5:ca:06:25:31:fd:bd:5d:48:3b:51:01:dd:2c:14:c7:c1:60:51:e9:95:01:d8:b2:33:56:0e:47:66:8d:6c:cd:af:f9:85:d9:eb:1c:47:47:88:34:e8:f0:fa:c2:ab:4f:69:4e:09:59:d4:57:c6:cc:c1:c8:e3:e6:19:c1:58:38:52:e2:e2:83:85:de:22:34:dc:3f:a6:f7:af:24:bc:e0:6f:c0:ab:68:2d:52:c7:6b:05:57:2c:42:1b:2d:48:87:03:0c:90:ab:48:48:a9:28:be:34:8a:fb:ba:ed:f4:60:99:1d:15:78:11:aa:d9:6d:53:7f:69:28:bc:b7:6b:20:76:7f:a0:55:03:71:79:f5:67:a7:b0:a0:0a:17:57:b2:00:a9:ad:cf:ff:67:8c:3e:26:e5:a7:24:bc:c2:6f:10:e8:89:c6:70:a5:d2:1f:80:ed:0d:3f:27:13: |