roy12mods.com

roy12mods.com
Roy12 Mods - Erogame Mods: Erogame Mods.
✗ Log in Directly → ✓ Log in Safely →
roy12mods.com is a safe website about "Roy12 Mods - Erogame Mods" in 2019 category. The server is running at 104.26.10.215 ip address and there is a secure connection certificate between the website and the visitor. When we did a security search, no viruses or spam were detected on web page. Roy12 have daily 2K and monthly 72K unique visitors from worldwide. While 65% of users browse the site for a long time, 35% exit immediately. Also, 62% of visitors come from search engines such as Google, Bing, Yandex. According to our financial situation analysis, this website earns an estimated daily $11, weekly $46 and monthly $323 from online advertising. If you want to buy this domain, you need to revise $2113. Because the value of the website can range from at least $1468 to $2758. The yhgamesx.blogspot.com, booru.org, hongfire.com, kenzato.uk similar & alternative web sites to roy12mods.com.

User Reviews roy12mods.com

Please write your , and overall score.


roy12mods Server Status

DateServer StatusSpeed
2024-04-02 12:46:11 Up0.525 Second
2024-04-02 02:00:12 Up0.444 Second
2024-04-01 15:14:12 Up0.557 Second
2024-04-01 04:28:11 Up0.538 Second
2024-03-31 17:42:11 Up0.520 Second
2024-03-31 06:54:12 Up0.534 Second
2024-03-30 00:00:11 Up0.494 Second
2024-03-29 13:14:12 Up0.527 Second
2024-03-29 02:28:11 Up0.455 Second
2024-03-28 15:42:12 Up0.497 Second
2024-03-28 04:56:11 Up0.478 Second
2024-03-27 18:10:12 Up0.585 Second
2024-03-27 07:24:12 Up0.501 Second
2024-03-26 20:38:12 Up0.494 Second
2024-03-26 09:52:11 Up0.507 Second
2024-03-25 23:04:03 Up0.585 Second
2024-03-25 15:18:32 Up0.579 Second
2024-03-25 13:10:37 Up0.583 Second
2024-03-25 11:00:32 Up0.935 Second
2024-03-25 08:50:32 Up0.527 Second

Known Searchs

honey select mods
roy12
honey select roy
honey select mod
honey select

☁ Content Metrics

  1. 2019 4%
  2. december 3%
  3. the 3%
  4. 2017 2%
  5. 2018 2%
  6. roy12 2%
  7. categories 2%
  8. mod 2%
  9. continue 2%
  10. posted 2%
  11. 2020 2%
  12. reading 2%
  13. read 2%
  14. please 2%
  15. author 2%
  16. january 2%
  17. mods 2%
  18. february 2%
  19. 2016 1%
  20. november 1%
  21. %

Website raw article content tells search engines what your web page content is about. The word usage rate is very important and the frequency of words used above 4% is perceived as spam.

☯ Technology Analysis

  • CloudFlare iconCloudFlare
  • Google Font API iconGoogle Font API
  • WordPress iconWordPress
  • jQuery Migrate iconjQuery Migrate
  • reCAPTCHA iconreCAPTCHA

☂ Security Analytics

  • ✔ CLEAN MX
  • ✔ DNS8
  • ✔ VX Vault
  • ✔ ZDB Zeus
  • ✔ AutoShun
  • ✔ Netcraft
  • ✔ Comodo Valkyrie Verdict
  • ✔ PhishLabs
  • ✔ Zerofox
  • ✔ K7AntiVirus
  • ✔ Virusdie External Site Scan
  • ✔ Spamhaus
  • ✔ Quttera
  • ✔ AegisLab WebGuard
  • ✔ MalwareDomainList
  • ✔ ZeusTracker
  • ✔ zvelo
  • ✔ Google Safebrowsing
  • ✔ Kaspersky
  • ✔ BitDefender
  • ✔ Opera
  • ✔ SCUMWARE.org
  • ✔ G-Data
  • ✔ Segasec
  • ✔ CyberCrime
  • ✔ ZeroCERT
  • ✔ Malware Domain Blocklist
  • ✔ MalwarePatrol
  • ✔ Trustwave
  • ✔ Web Security Guard
  • ✔ CyRadar
  • ✔ desenmascara.me
  • ✔ ADMINUSLabs
  • ✔ Malwarebytes hpHosts
  • ✔ Dr.Web
  • ✔ AlienVault
  • ✔ Emsisoft
  • ✔ Rising
  • ✔ Malc0de Database
  • ✔ malwares.com URL checker
  • ✔ Phishtank
  • ✔ EonScope
  • ✔ Malwared
  • ✔ Avira
  • ✔ NotMining
  • ✔ OpenPhish
  • ✔ Antiy-AVL
  • ✔ Forcepoint ThreatSeeker
  • ✔ FraudSense
  • ✔ URLhaus
  • ✔ Comodo Site Inspector
  • ✔ Malekal
  • ✔ ESET
  • ✔ Sophos
  • ✔ Yandex Safebrowsing
  • ✔ SecureBrain
  • ✔ Nucleon
  • ✔ BADWARE.INFO
  • ✔ Sucuri SiteCheck
  • ✔ Blueliv
  • ✔ ZCloudsec
  • ✔ CRDF
  • ✔ ThreatHive
  • ✔ FraudScore
  • ✔ Tencent
  • ✔ URLQuery
  • ✔ StopBadware
  • ✔ Fortinet
  • ✔ ESTsecurity-Threat Inside
  • ✔ Spam404
  • ✔ securolytics
  • ✔ Baidu-International

✇ DNS Records

RecordClassTTLValue
AIN300 ip: 104.26.11.215
AIN300 ip: 104.26.10.215
NSIN86400 target: dom.ns.cloudflare.com
NSIN86400 target: sharon.ns.cloudflare.com
TXTIN300 txt: ca3-b562fe3e090c48fda676a7e6f5134cf6
entries: ca3-b562fe3e090c48fda676a7e6f5134cf6
MXIN300 pri: 0
target: dc-0d992b1b1971.roy12mods.com
SOAIN3600 mname: dom.ns.cloudflare.com
rname: dns.cloudflare.com
serial: 2031173110
refresh: 10000
retry: 2400
expire: 604800
minimum-ttl: 3600
AAAAIN300 ipv6: 2606:4700:20::681a:bd7
AAAAIN300 ipv6: 2606:4700:20::681a:ad7

ℹ Whois Data

  • Domain name: Roy12mods.com
  • Registry domain id: 2083429678_domain_com-vrsn
  • Registrar whois server: Whois.publicdomainregistry.com
  • Registrar url: Http://www.publicdomainregistry.com
  • Updated date: 2019-12-10t23:00:19z
  • Creation date: 2016-12-20t16:40:25z
  • Registry expiry date: 2020-12-20t16:40:25z
  • Registrar: Pdr ltd. d/b/a publicdomainregistry.com
  • Registrar iana id: 303
  • Registrar abuse contact email: Abuse-contact@publicdomainregistry.com
  • Registrar abuse contact phone: +1.2013775952
  • Domain status: The owner can't transfer to another company this domain
  • Name server: Dom.ns.cloudflare.com
  • Name server: Sharon.ns.cloudflare.com
  • Dnssec: Unsigned
  • Last update of whois database: 2021-01-19t09:58:57z

✉ Host Network Data

  • NetRange: 104.16.0.0 - 104.31.255.255
  • CIDR: 104.16.0.0/12
  • NetName: CLOUDFLARENET
  • NetHandle: NET-104-16-0-0-1
  • Parent: NET104 (NET-104-0-0-0-0)
  • NetType: Direct Assignment
  • OriginAS: AS13335
  • Organization: Cloudflare, Inc. (CLOUD14)
  • RegDate: 2014-03-28
  • Updated: 2017-02-17
  • Comment: All Cloudflare abuse reporting can be done via https //www.cloudflare.com/abuse //www.cloudflare.com/abuse
  • Ref: https //rdap.arin.net/registry/ip/104.16.0.0 //rdap.arin.net/registry/ip/104.16.0.0
  • OrgName: Cloudflare, Inc.
  • OrgId: CLOUD14
  • Address: 101 Townsend Street
  • City: San Francisco
  • StateProv: CA
  • PostalCode: 94107
  • Country: US
  • RegDate: 2010-07-09
  • Updated: 2019-09-25
  • Ref: https //rdap.arin.net/registry/entity/CLOUD14 //rdap.arin.net/registry/entity/CLOUD14
  • OrgNOCHandle: NOC11962-ARIN
  • OrgNOCName: NOC
  • OrgNOCPhone: +1-650-319-8930
  • OrgNOCEmail: noc@cloudflare.com
  • OrgNOCRef: https //rdap.arin.net/registry/entity/NOC11962-ARIN //rdap.arin.net/registry/entity/NOC11962-ARIN
  • OrgAbuseHandle: ABUSE2916-ARIN
  • OrgAbuseName: Abuse
  • OrgAbusePhone: +1-650-319-8930
  • OrgAbuseEmail: abuse@cloudflare.com
  • OrgAbuseRef: https //rdap.arin.net/registry/entity/ABUSE2916-ARIN //rdap.arin.net/registry/entity/ABUSE2916-ARIN
  • OrgTechHandle: ADMIN2521-ARIN
  • OrgTechName: Admin
  • OrgTechPhone: +1-650-319-8930
  • OrgTechEmail: rir@cloudflare.com
  • OrgTechRef: https //rdap.arin.net/registry/entity/ADMIN2521-ARIN //rdap.arin.net/registry/entity/ADMIN2521-ARIN
  • RAbuseHandle: ABUSE2916-ARIN
  • RAbuseName: Abuse
  • RAbusePhone: +1-650-319-8930
  • RAbuseEmail: abuse@cloudflare.com
  • RAbuseRef: https //rdap.arin.net/registry/entity/ABUSE2916-ARIN //rdap.arin.net/registry/entity/ABUSE2916-ARIN
  • RTechHandle: ADMIN2521-ARIN
  • RTechName: Admin
  • RTechPhone: +1-650-319-8930
  • RTechEmail: rir@cloudflare.com
  • RTechRef: https //rdap.arin.net/registry/entity/ADMIN2521-ARIN //rdap.arin.net/registry/entity/ADMIN2521-ARIN
  • RNOCHandle: NOC11962-ARIN
  • RNOCName: NOC
  • RNOCPhone: +1-650-319-8930
  • RNOCEmail: noc@cloudflare.com
  • RNOCRef: https //rdap.arin.net/registry/entity/NOC11962-ARIN //rdap.arin.net/registry/entity/NOC11962-ARIN

☰ HTTP Header

date wed, 19 feb 2020 09
content-type text/html; charset=utf-8
set-cookie __cfduid=d19f4200775265f55fee965de816c33501582106347; expires=fri, 20-mar-20 09
vary accept-encoding,cookie,user-agent
last-modified wed, 19 feb 2020 05
cache-control max-age=0
expires wed, 19 feb 2020 09
cf-cache-status dynamic
expect-ct max-age=604800, report-uri="https
server cloudflare
cf-ray 567762e23fd9d437-bud
content-encoding gzip

✔ Robots.txt File

# This space intentionally left blank # If you want to learn about why our robots.txt looks like this, read this post: https://yoa.st/robots-txt User-Agent: * Disallow: /suggest/?*

⚔ SSL Metadata

SubjectC = US, ST = CA, L = San Francisco, O = "CloudFlare, Inc.", CN = CloudFlare Inc ECC CA-2
IssuerC = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore CyberTrust Root
Version2
Serial Number0ff3e61639aa3d1a1265f41f8b34e5b6
Signature Algorithmsha256WithRSAEncryption
Public Key Algorithmid-ecPublicKey
X509v3 Basic ConstraintsCA:TRUE,pathlen:0
X509v3 Key UsageDigitalSignature,CertificateSign,CRLSign
Authority Information AccessOCSP-URI:http://ocsp.digicert.com
X509v3 CRL Distribution Points, FullName:, URI:http://crl3.digicert.com/Omniroot2025.crl
X509v3 Certificate PoliciesPolicy:X509v3AnyPolicy, CPS:https://www.digicert.com/CPS
X509v3 Subject Key Identifier3E:74:2D:1F:CF:45:75:04:7E:3F:C0:A2:87:3E:4C:43:83:51:13:C6
X509v3 Authority Key Identifierkeyid:E5:9D:59:30:82:47:58:CC:AC:FA:08:54:36:86:7B:3A:B5:04:4D:F0
Start dateOct 14 12:00:00 2015 GMT
Expire dateOct 9 12:00:00 2020 GMT

Data Analytics From Other Sites