fakebts.com valuation and analysis

Robots.txt Information
Robot Path Permission
GoogleBot /
BingBot /
BaiduSpider /
YandexBot /
User-agent: * Disallow: /wp-admin/ Allow: /wp-admin/admin-ajax.php Sitemap: https://fakebts.com/wp-sitemap.xml Disallow:
Meta Tags
Title fakeBTS.com | Fake stations
Description fakeBTS.com Search Primary Menu Welcome Howto Download Arquitecture LTE Search for: Welcome The aim of FakeBTS.com project is to detect fake BTS stations
Keywords N/A
Server Information
WebSite fakebts faviconfakebts.com
Host IP 217.160.0.14
Location Germany
Related Websites
Site Rank
More to Explore
fakebts.com Valuation
US$975,416
Last updated: 2023-05-14 12:24:12

fakebts.com has Semrush global rank of 10,851,072. fakebts.com has an estimated worth of US$ 975,416, based on its estimated Ads revenue. fakebts.com receives approximately 112,548 unique visitors each day. Its web server is located in Germany, with IP address 217.160.0.14. According to SiteAdvisor, fakebts.com is safe to visit.

Traffic & Worth Estimates
Purchase/Sale Value US$975,416
Daily Ads Revenue US$901
Monthly Ads Revenue US$27,012
Yearly Ads Revenue US$324,139
Daily Unique Visitors 7,504
Note: All traffic and earnings values are estimates.
DNS Records
Host Type TTL Data
fakebts.com. A 3600 IP: 217.160.0.14
fakebts.com. AAAA 3600 IPV6: 2001:8d8:100f:f000::2f7
fakebts.com. NS 86400 NS Record: ns1020.ui-dns.biz.
fakebts.com. NS 86400 NS Record: ns1020.ui-dns.de.
fakebts.com. NS 86400 NS Record: ns1020.ui-dns.org.
fakebts.com. NS 86400 NS Record: ns1020.ui-dns.com.
fakebts.com. MX 3600 MX Record: 10 mx01.1and1.es.
fakebts.com. MX 3600 MX Record: 10 mx00.1and1.es.
HtmlToTextCheckTime:2023-05-14 12:24:12
fakeBTS.com Search Primary Menu Welcome Howto Download Arquitecture LTE Search for: Welcome The aim of FakeBTS.com project is to detect fake BTS stations and prevent attacks, using a Linux computer and hardware that allows us to scan the frequencies of GSM / GPRS. And what is a fake cell or fake BTS? Just as someone can create a wireless network with the same name as our original and try to “sniff” our internet traffic (AP rogue), you can create a tiny GSM / GPRS network so our mobile phones will connect to this enemy cell. From this moment, all our communications using mobile phone are in the hands of our attacker; Internet traffic, calls and short messages (SMS). The false cell is also known as; Fake BTS, BTS rogue o IMSI catcher (the purpose of such device is different, but it is also an intrusion ). IMSI catcher How can I realize that my phone is being attacked? Unfortunately our phone (even a Samsung Galaxy S7, iPhone 7, or latest model that you want) will not notice the
HTTP Headers
HTTP/1.1 302 Found
Content-Type: text/html; charset=iso-8859-1
Connection: keep-alive
Keep-Alive: timeout=15
Date: Thu, 23 Dec 2021 10:04:07 GMT
Server: Apache
Location: https://fakebts.com/
Cache-Control: max-age=3600
Expires: Thu, 23 Dec 2021 11:04:07 GMT

HTTP/2 200 
content-type: text/html; charset=UTF-8
date: Thu, 23 Dec 2021 10:04:07 GMT
server: Apache
x-powered-by: PHP/7.4.25
link: ; rel="https://api.w.org/", ; rel="alternate"; type="application/json", ; rel=shortlink
fakebts.com Whois Information
Domain Name: FAKEBTS.COM
Registry Domain ID: 1846726306_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.ionos.com
Registrar URL: http://www.ionos.com
Updated Date: 2021-02-16T08:10:36Z
Creation Date: 2014-02-15T10:57:47Z
Registry Expiry Date: 2022-02-15T10:57:47Z
Registrar: IONOS SE
Registrar IANA ID: 83
Registrar Abuse Contact Email: abuse@ionos.com
Registrar Abuse Contact Phone: +1.6105601459
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: NS1020.UI-DNS.BIZ
Name Server: NS1020.UI-DNS.COM
Name Server: NS1020.UI-DNS.DE
Name Server: NS1020.UI-DNS.ORG
DNSSEC: unsigned
>>> Last update of whois database: 2021-12-26T07:25:12Z <<<