shellandco.net Report : Visit Site


  • Ranking Alexa Global: # 4,505,345

    Server:Apache...

    The main IP address: 91.121.153.160,Your server France,Roubaix ISP:OVH SAS  TLD:net CountryCode:FR

    The description :shell {&} co...

    This report updates in 17-Aug-2018

Created Date:2014-04-24
Changed Date:2018-04-16

Technical data of the shellandco.net


Geo IP provides you such as latitude, longitude and ISP (Internet Service Provider) etc. informations. Our GeoIP service found where is host shellandco.net. Currently, hosted in France and its service provider is OVH SAS .

Latitude: 50.69421005249
Longitude: 3.1745600700378
Country: France (FR)
City: Roubaix
Region: Nord-Pas-de-Calais
ISP: OVH SAS

HTTP Header Analysis


HTTP Header information is a part of HTTP protocol that a user's browser sends to called Apache containing the details of what the browser wants and will accept back from the web server.

Content-Length:14797
X-Xss-Protection:1; mode=block
Content-Security-Policy:font-src 'self' wordpress.com *.wp.com *.gstatic.com *.amazonaws.com;
X-Content-Type-Options:nosniff
Content-Encoding:gzip
Strict-Transport-Security:max-age=1209600; includeSubDomains
Vary:Accept-Encoding
Keep-Alive:timeout=5, max=100
Server:Apache
Connection:Keep-Alive
Link:; rel="https://api.w.org/", ; rel=shortlink
Date:Thu, 16 Aug 2018 16:16:24 GMT
X-Frame-Options:SAMEORIGIN
Content-Type:text/html; charset=UTF-8
Access-Control-Allow-Origin:*

DNS

soa:dns101.ovh.net. tech.ovh.net. 2018072601 86400 3600 3600000 300
txt:"1|www.shellandco.net"
"v=spf1 ip4:91.121.153.160 -all"
ns:dns101.ovh.net.
ns101.ovh.net.
ipv4:IP:91.121.153.160
ASN:16276
OWNER:OVH, FR
Country:FR
mx:MX preference = 1, mail exchanger = zb20140705.shellandco.net.

HtmlToText

shell {&} co privacy & cookies: this site uses cookies. by continuing to use this website, you agree to their use. to find out more, including how to control cookies, see here: cookie policy menu news powershell active directory cluster database exchange files and folders hardware network operating system pki sccm service and process tips vmware shell filesystem image processing monitoring network process time perl network python network pki project security links privacy policy dns monitoring - based on collectd/influxdb and grafana - keep history - graph queries and monitor disk space now available read more active directory audit free - multi domains - keep history - fast search (date range, event type,...) - low database size - csv export function now available ! read more active directory dashboard active directory dashboard : - cpu/memory/disk performance - directory read/write/search - active directory specific counters (kerberos auth, ntlm auth, ldap bind time,...) now available read more monitor the active directory authentication with splunk read more password database bootstrap, jquery, php and mysql - secure location for your passwords (aes encrypted data) - built-in or active directory authentication - manage entry acl - generate random passwords... now available read more citrix receiver version live status this script or rather these two command lines will output interesting information. in the current situation, the table will have two columns : one for the version number of the citrix receiver and another for the version count number. like… share : click to share on google+ (opens in new window) click to share on twitter (opens in new window) click to share on linkedin (opens in new window) click to share on facebook (opens in new window) click to share on reddit (opens in new window) click to share on whatsapp (opens in new window) click to share on pocket (opens in new window) click to share on telegram (opens in new window) click to share on skype (opens in new window) click to email this to a friend (opens in new window) click to print (opens in new window) nicolas hahang august 7, 2018 citrix , powershell no comments read more list installed certificate properties on remote computers i have written this script to list the installed certificates on remote computers. the script lists first the computer accounts that match a specific os type. currently, the computer account in the active directory domain that have a “server” operating… share : click to share on google+ (opens in new window) click to share on twitter (opens in new window) click to share on linkedin (opens in new window) click to share on facebook (opens in new window) click to share on reddit (opens in new window) click to share on whatsapp (opens in new window) click to share on pocket (opens in new window) click to share on telegram (opens in new window) click to share on skype (opens in new window) click to email this to a friend (opens in new window) click to print (opens in new window) nicolas hahang july 13, 2018 active directory , pki , powershell no comments read more automatic https winrm listener creation in this post i will show you how to create a https winrm listener that is using a certificate issued by your own ms pki. the requirements are the following: – an active directory domain – an enterprise ms pki… share : click to share on google+ (opens in new window) click to share on twitter (opens in new window) click to share on linkedin (opens in new window) click to share on facebook (opens in new window) click to share on reddit (opens in new window) click to share on whatsapp (opens in new window) click to share on pocket (opens in new window) click to share on telegram (opens in new window) click to share on skype (opens in new window) click to email this to a friend (opens in new window) click to print (opens in new window) nicolas hahang june 6, 2018 active directory , operating system , pki , powershell , tips no comments read more create a self-signed certificate on windows server if you don’t have your own pki and just want to perform some tests on a specific application or os feature, you will probably need to generate a self-signed certificate. you can easily achieve this on windows server without any… share : click to share on google+ (opens in new window) click to share on twitter (opens in new window) click to share on linkedin (opens in new window) click to share on facebook (opens in new window) click to share on reddit (opens in new window) click to share on whatsapp (opens in new window) click to share on pocket (opens in new window) click to share on telegram (opens in new window) click to share on skype (opens in new window) click to email this to a friend (opens in new window) click to print (opens in new window) nicolas hahang june 1, 2018 pki , powershell , tips no comments read more active directory functional domain level check this script will help you to check the active directory domain functional level. first the script asks for the domain name (fqdn). then, the domain controllers names of this domain are queried to get the value of the ad attribute… share : click to share on google+ (opens in new window) click to share on twitter (opens in new window) click to share on linkedin (opens in new window) click to share on facebook (opens in new window) click to share on reddit (opens in new window) click to share on whatsapp (opens in new window) click to share on pocket (opens in new window) click to share on telegram (opens in new window) click to share on skype (opens in new window) click to email this to a friend (opens in new window) click to print (opens in new window) nicolas hahang may 16, 2018 active directory , powershell no comments read more get the active directory functional levels/fsmo roles forest wide description with the following script, it is possible in the same array to get useful active directory informations such as: domain names (dns fqdn) domain functional level forest functional level fsmo roles the powershell cmdlets used for this script are… share : click to share on google+ (opens in new window) click to share on twitter (opens in new window) click to share on linkedin (opens in new window) click to share on facebook (opens in new window) click to share on reddit (opens in new window) click to share on whatsapp (opens in new window) click to share on pocket (opens in new window) click to share on telegram (opens in new window) click to share on skype (opens in new window) click to email this to a friend (opens in new window) click to print (opens in new window) nicolas hahang march 19, 2018 active directory , powershell no comments read more list duplicated valid certificates on a ms pki version 3 description one more version of the script provided some weeks ago. this is a minor update but it can be helpful. in that version, the duplicated valid certificates are listed and two options are shown : keep or revoke. it… share : click to share on google+ (opens in new window) click to share on twitter (opens in new window) click to share on linkedin (opens in new window) click to share on facebook (opens in new window) click to share on reddit (opens in new window) click to share on whatsapp (opens in new window) click to share on pocket (opens in new window) click to share on telegram (opens in new window) click to share on skype (opens in new window) click to email this to a friend (opens in new window) click to print (opens in new window) nicolas hahang march 16, 2018 news , pki , powershell , security no comments read more list duplicated valid certificates on a ms pki version 2 description i have written another version of the script provided some weeks ago. this new version is looking for duplicated valid certificates based on both commonname and certificate template. the first version checked only the commonname. all of this cmdlets… share : click to share on google+ (opens in new windo

URL analysis for shellandco.net


https://www.shellandco.net/list-duplicated-valid-certificates-on-a-ms-pki-2/?share=twitter
https://www.shellandco.net/active-directory-functional-domain-level-check/?share=telegram
https://www.shellandco.net/active-directory-functional-domain-level-check/?share=twitter
https://www.shellandco.net/create-a-self-signed-certificate-on-windows-server/
https://www.shellandco.net/get-the-active-directory-functional-levels-fsmo-roles-forest-wide/?share=linkedin
https://www.shellandco.net/create-a-self-signed-certificate-on-windows-server/?share=telegram
https://www.shellandco.net/?cat=14
https://www.shellandco.net/citrix-receiver-version-live-status/?share=twitter
https://www.shellandco.net/get-the-active-directory-functional-levels-fsmo-roles-forest-wide/?share=facebook
https://www.shellandco.net/find-and-revoke-expired-certificates-on-a-microsoft-pki/
https://www.shellandco.net/citrix-receiver-version-live-status/#respond
https://www.shellandco.net/list-duplicated-valid-certificates-on-a-ms-pki-2/?share=email
https://www.shellandco.net/find-and-revoke-expired-certificates-on-a-microsoft-pki/?share=email
https://www.shellandco.net/category/powershell/hardware/
https://www.shellandco.net/citrix-receiver-version-live-status/?share=google-plus-1

Whois Information


Whois is a protocol that is access to registering information. You can reach when the website was registered, when it will be expire, what is contact details of the site with the following informations. In a nutshell, it includes these informations;

Domain Name: SHELLANDCO.NET
Registry Domain ID: 1855993963_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.ovh.com
Registrar URL: http://www.ovh.com
Updated Date: 2018-04-16T11:40:27Z
Creation Date: 2014-04-24T12:11:11Z
Registry Expiry Date: 2020-04-24T12:11:11Z
Registrar: OVH
Registrar IANA ID: 433
Registrar Abuse Contact Email:
Registrar Abuse Contact Phone:
Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: DNS101.OVH.NET
Name Server: NS101.OVH.NET
DNSSEC: signedDelegation
DNSSEC DS Data: 38733 7 2 974B13EAD716AE64BD28BEC9D575CDCF8BE445E3E84F7FBBC725F0B889A3B505
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of whois database: 2018-04-17T16:44:38Z <<<

For more information on Whois status codes, please visit https://icann.org/epp

NOTICE: The expiration date displayed in this record is the date the
registrar's sponsorship of the domain name registration in the registry is
currently set to expire. This date does not necessarily reflect the expiration
date of the domain name registrant's agreement with the sponsoring
registrar. Users may consult the sponsoring registrar's Whois database to
view the registrar's reported date of expiration for this registration.

TERMS OF USE: You are not authorized to access or query our Whois
database through the use of electronic processes that are high-volume and
automated except as reasonably necessary to register domain names or
modify existing registrations; the Data in VeriSign Global Registry
Services' ("VeriSign") Whois database is provided by VeriSign for
information purposes only, and to assist persons in obtaining information
about or related to a domain name registration record. VeriSign does not
guarantee its accuracy. By submitting a Whois query, you agree to abide
by the following terms of use: You agree that you may use this Data only
for lawful purposes and that under no circumstances will you use this Data
to: (1) allow, enable, or otherwise support the transmission of mass
unsolicited, commercial advertising or solicitations via e-mail, telephone,
or facsimile; or (2) enable high volume, automated, electronic processes
that apply to VeriSign (or its computer systems). The compilation,
repackaging, dissemination or other use of this Data is expressly
prohibited without the prior written consent of VeriSign. You agree not to
use electronic processes that are automated and high-volume to access or
query the Whois database except as reasonably necessary to register
domain names or modify existing registrations. VeriSign reserves the right
to restrict your access to the Whois database in its sole discretion to ensure
operational stability. VeriSign may restrict or terminate your access to the
Whois database for failure to abide by these terms of use. VeriSign
reserves the right to modify these terms at any time.

The Registry database contains ONLY .COM, .NET, .EDU domains and
Registrars.

  REGISTRAR OVH

SERVERS

  SERVER net.whois-servers.net

  ARGS domain =shellandco.net

  PORT 43

  TYPE domain

DOMAIN

  NAME shellandco.net

  CHANGED 2018-04-16

  CREATED 2014-04-24

STATUS
clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
clientTransferProhibited https://icann.org/epp#clientTransferProhibited

NSERVER

  DNS101.OVH.NET 213.251.188.145

  NS101.OVH.NET 213.251.128.145

  REGISTERED yes

Go to top

Mistakes


The following list shows you to spelling mistakes possible of the internet users for the website searched .

  • www.ushellandco.com
  • www.7shellandco.com
  • www.hshellandco.com
  • www.kshellandco.com
  • www.jshellandco.com
  • www.ishellandco.com
  • www.8shellandco.com
  • www.yshellandco.com
  • www.shellandcoebc.com
  • www.shellandcoebc.com
  • www.shellandco3bc.com
  • www.shellandcowbc.com
  • www.shellandcosbc.com
  • www.shellandco#bc.com
  • www.shellandcodbc.com
  • www.shellandcofbc.com
  • www.shellandco&bc.com
  • www.shellandcorbc.com
  • www.urlw4ebc.com
  • www.shellandco4bc.com
  • www.shellandcoc.com
  • www.shellandcobc.com
  • www.shellandcovc.com
  • www.shellandcovbc.com
  • www.shellandcovc.com
  • www.shellandco c.com
  • www.shellandco bc.com
  • www.shellandco c.com
  • www.shellandcogc.com
  • www.shellandcogbc.com
  • www.shellandcogc.com
  • www.shellandcojc.com
  • www.shellandcojbc.com
  • www.shellandcojc.com
  • www.shellandconc.com
  • www.shellandconbc.com
  • www.shellandconc.com
  • www.shellandcohc.com
  • www.shellandcohbc.com
  • www.shellandcohc.com
  • www.shellandco.com
  • www.shellandcoc.com
  • www.shellandcox.com
  • www.shellandcoxc.com
  • www.shellandcox.com
  • www.shellandcof.com
  • www.shellandcofc.com
  • www.shellandcof.com
  • www.shellandcov.com
  • www.shellandcovc.com
  • www.shellandcov.com
  • www.shellandcod.com
  • www.shellandcodc.com
  • www.shellandcod.com
  • www.shellandcocb.com
  • www.shellandcocom
  • www.shellandco..com
  • www.shellandco/com
  • www.shellandco/.com
  • www.shellandco./com
  • www.shellandconcom
  • www.shellandcon.com
  • www.shellandco.ncom
  • www.shellandco;com
  • www.shellandco;.com
  • www.shellandco.;com
  • www.shellandcolcom
  • www.shellandcol.com
  • www.shellandco.lcom
  • www.shellandco com
  • www.shellandco .com
  • www.shellandco. com
  • www.shellandco,com
  • www.shellandco,.com
  • www.shellandco.,com
  • www.shellandcomcom
  • www.shellandcom.com
  • www.shellandco.mcom
  • www.shellandco.ccom
  • www.shellandco.om
  • www.shellandco.ccom
  • www.shellandco.xom
  • www.shellandco.xcom
  • www.shellandco.cxom
  • www.shellandco.fom
  • www.shellandco.fcom
  • www.shellandco.cfom
  • www.shellandco.vom
  • www.shellandco.vcom
  • www.shellandco.cvom
  • www.shellandco.dom
  • www.shellandco.dcom
  • www.shellandco.cdom
  • www.shellandcoc.om
  • www.shellandco.cm
  • www.shellandco.coom
  • www.shellandco.cpm
  • www.shellandco.cpom
  • www.shellandco.copm
  • www.shellandco.cim
  • www.shellandco.ciom
  • www.shellandco.coim
  • www.shellandco.ckm
  • www.shellandco.ckom
  • www.shellandco.cokm
  • www.shellandco.clm
  • www.shellandco.clom
  • www.shellandco.colm
  • www.shellandco.c0m
  • www.shellandco.c0om
  • www.shellandco.co0m
  • www.shellandco.c:m
  • www.shellandco.c:om
  • www.shellandco.co:m
  • www.shellandco.c9m
  • www.shellandco.c9om
  • www.shellandco.co9m
  • www.shellandco.ocm
  • www.shellandco.co
  • shellandco.netm
  • www.shellandco.con
  • www.shellandco.conm
  • shellandco.netn
  • www.shellandco.col
  • www.shellandco.colm
  • shellandco.netl
  • www.shellandco.co
  • www.shellandco.co m
  • shellandco.net
  • www.shellandco.cok
  • www.shellandco.cokm
  • shellandco.netk
  • www.shellandco.co,
  • www.shellandco.co,m
  • shellandco.net,
  • www.shellandco.coj
  • www.shellandco.cojm
  • shellandco.netj
  • www.shellandco.cmo
Show All Mistakes Hide All Mistakes