If you are not sure if the website you want to visit is safe, you can check it out here. Enter the address (url) of the website and see the invisible elements, such as a header or meta data.
site address:www.pasoconya.jp/akabane/userinfo.php?uid=77754...
favicon.ico:
site title:XOOPS Cube Site - ユーザーモジュール
Url ContentHyperText Markup Language (HTML)
MIME Type / Internet Media Typetext/html
MIME Type text
File Extension.html
More Details (link to:)Wikipedia: HTML
Powered by: Very Tiny URL Shortener at https://vturl.net VeryTinyURL
cached page - cached page ( 40 days ago )

Header

HTTP/1.1 200 OK
Date Sun, 05 Jul 2020 10:28:30 GMT
Server Apache/2.2.15 (CentOS)
X-Powered-By PHP/5.3.3
Set-Cookie PHPSESSID=jrib34rq3agdlrq1r4vnckfv32; path=/akabane/
Expires Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control no-store, no-cache, must-revalidate
Pragma no-cache
Last-Modified Sun, 05 Jul 2020 10:28:30 GMT
Cache-Control post-check=0, pre-check=0
Content-Length 7962
Content-Type text/html; charset=EUC-JP

Meta Tags

title="XOOPS Cube Site - ユーザーモジュール"
http-equiv="content-type" content="text/html; charset=EUC-JP"
http-equiv="content-language" content="ja"
name="robots" content="index,follow"
name="keywords" content="news, technology, headlines, xoops, xoop, nuke, myphpnuke, myphp-nuke, phpnuke, SE, geek, geeks, hacker, hackers, linux, software, download, downloads, free, community, mp3, forum, forums, bulletin, board, boards, bbs, php, survey, poll, polls, kernel, comment, comments, portal, odp, open, source, opensource, FreeSoftware, gnu, gpl, license, Unix, *nix, mysql, sql, database, databases, web site, weblog, guru, module, modules, theme, themes, cms, content management"
name="description" content="XOOPS is a dynamic Object Oriented based open source portal script written in PHP."
name="rating" content="general"
name="author" content="XOOPS Cube"
name="copyright" content="Copyright © 2001-2006"
name="generator" content="XOOPS"

Load Info

page size7962
load time (s)0.863889
redirect count0
speed download9216
server IP203.138.99.129


* all occurrences of the string "http://" have been changed to "htt???/"