Check server response of

Server response
NS records
Whois domain
Response headers
Request headers
Raw HTML code
301 Moved Permanently - them.com
HTTP Status: 301
User-Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected])
Server: nginx/1.10.3 (Ubuntu)
Date: Sun, 18 May 2025 02:53:57 GMT
Content-Type: text/html
Content-Length: 194
Connection: keep-alive
Location: https://www.them.com
Strict-Transport-Security: max-age=63072000; includeSubdomains
X-Content-Type-Options: nosniff

HTTP Code 301 Moved Permanently

301 Moved Permanently means that the requested resource has been permanently moved to a new URL. All future requests should use the new address.

When is Code 301 used?

  • When changing a website domain
  • When modifying URL structures
  • When setting up redirects for SEO

What does Code 301 mean for the user?

The browser will automatically redirect the user to the new address, and search engines will update their indexes.

200 OK - https://www.them.com
HTTP Status: 200
User-Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected])
Server: nginx/1.10.3 (Ubuntu)
Date: Sun, 18 May 2025 02:53:57 GMT
Content-Type: text/html
Content-Length: 4941
Last-Modified: Wed, 27 May 2020 17:58:19 GMT
Connection: keep-alive
ETag: "5eceaa3b-134d"
Strict-Transport-Security: max-age=63072000; includeSubdomains
X-Content-Type-Options: nosniff
Accept-Ranges: bytes

HTTP Code 200 OK

200 OK is a standard successful HTTP server response. It means that the client’s request (e.g., from a browser) was successfully processed, and the server is delivering the requested data.

When is Code 200 used?

  • When loading a web page
  • When successfully receiving an API response
  • When processing a form or another HTTP request

What does Code 200 mean for the user?

The user receives content without errors, and the page or application functions properly. If Code 200 is accompanied by data, the browser or program processes and displays it to the user.

GET / HTTP/1.1
Host: them.com
Accept: */*
User-Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected])
<!DOCTYPE html>
<html lang="en">
<head>
        <meta charset="utf-8" />
        <title>Secured by THEM</title>
        <link rel="stylesheet" href="./theme/css/main.css" />
        <!--
        <link href="https://www.them.com/feeds/all.atom.xml" type="application/atom+xml" rel="alternate" title="Secured by THEM Atom Feed" />
        -->
        <!--[if IE]>
            <script src="https://html5shiv.googlecode.com/svn/trunk/html5.js"></script>
        <![endif]-->
</head>

<body bgcolor="#ff4f00" id="index" class="home">
<!---->
        <header id="banner" class="body">
<a href="./"><img src="./theme/images/SbT-Logo-Key.png" /></a><br>  <strong>&nbsp;&nbsp;When you are Secured by THEM you don't need to worry about "those" guys!</strong><nav><ul>
                    <li><a href="./pages/why-them.html">Why</a></li>
                    <li><a href="./pages/whats-them.html">What</a></li>
                    <li><a href="./pages/wheres-them.html">Where</a></li>
                    <li><a href="./pages/whos-them.html">Who</a></li>
                    <li><a href="./pages/them-presentations.html">Presentations</a></li>
                </ul></nav> </header><!-- /#banner --> <section id="content" class="body">

<p>In 2017 the biggest threat to small busineses is data breach via hacking. 
According to <a
href="https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html">Small
Business Trends</a> 43% of cyber attacks target small business, and 60% of
small businesses go out of business within six months of a cyber attack.

<p><a
href="https://pages.riskbasedsecurity.com/hubfs/Reports/2016%20Year%20End%20Data%20Breach%20QuickView%20Report.pdf?utm_campaign=2016+Year+End+Data+Breach+QuickView+Report&utm_source=hs_automation&utm_medium=email&utm_content=41076100&_hsenc=p2ANqtz-9YSFTnUDy2n3azbjo5khYqM1kprhERFPK6le6JE3DsBfqVSB5oLIlqqsPdst0oTqFYV7jWcPiXrG12iNfaCjTySbT4_w&_hsmi=41076100">Risk
Based Security (RBS)</a> reported "In 2016 there were 4,149 succesful data breaches,
which compromised more than 4.2 billion records, shattering the previous
all-time high of about 1 billion exposed records in 2013."  

<p>The <a
href="https://otalliance.org/resources/cyber-incident-breach-response">Online
Trust Alliance (OTA)</a> documents that there have been 82,000 “cyber
incidents” in 2016 negatively impacting organizations; admits there could
have been more than 250,000 when accounting for unreported incidents.  OTA
says that because most incidents aren’t reported to regulators or law
enforcement agencies.

<p><b>Welcome to <span style="color: #e9722f"><b>Secured by THEM</b></span>, we
protect your business against data loss.  As a small business owner you have
many things to be concerned about.  Let <span style="color:
#e9722f"><b>Secured by THEM</b></span> monitor your business systems 24x7,
365 days a year and your business’s data is one less thing you will have to
worry about.  We can do it for less than a Starbucks’ Grande Latte a
day!</b></p>

<p>At this point, you may have some questions about <span style="color:
#e9722f"><b>Secured by THEM</b></span> and the service we offer.  If you
click on the above tab <a href="./pages/whos-them.html">“Who”</a> you
can see our technical background, the <a
href="./pages/whats-them.html">“What”</a> tab will explain our service
in detail.</p>

<p>If you are interested in what you can do to add security to your office
and office network for free, we have some presentations under the <a
href="./pages/them-presentations.html">“Presentations”</a> tab that we
would like to share with you, they contain many tips on easy things you can
do yourself to make your business network more secure.</p>

<p>Look around, send us an email with any questions you might have or pick
up the phone, yes we take phone calls!  What we don't do is spend a fortune
building our web site.  It's simple, easy to maintain and functions well
enough.  We are a small business just like you, and we choose to focus on
our products vs a flashy web site, or slick marketing glossies.</p>

<p>What we are going to do is focus on expanding the quality of our service
to protect your business.  I mean isn't that what would you want us to do,
spend the hard earned income we get from you on improving the product that
you are relying on?</p>
        
<p>As time goes on, we will add blogging, by content experts, they will be
aimed at giving you more information to help you keep your business
secure.</p>
</section> 
 
        <section id="banner" class="body">         
    &nbsp;&nbsp;Let us monitor your Network Security so you can concentrate on your daily business. Contact <span style="color:
    #e9722f"><b>Secured by THEM</b></span> at:
    <p><center>Email: [email protected]<br>
       Phone: (469) 298-8436<br></p>
        </section><!--/#extras -->

    <footer id="banner" class="body">
    </footer><!-- /#contentinfo -->
</body>
</html>                               

Whois info of domain

Domain Name: THEM.COM
Registry Domain ID: 604206_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://networksolutions.com
Updated Date: 2025-03-18T06:25:09Z
Creation Date: 1995-05-16T04:00:00Z
Registry Expiry Date: 2026-05-17T04:00:00Z
Registrar: Network Solutions, LLC
Registrar IANA ID: 2
Registrar Abuse Contact Email: [email protected]
Registrar Abuse Contact Phone: +1.8777228662
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: NS1.LINODE.COM
Name Server: NS2.LINODE.COM
Name Server: NS3.LINODE.COM
Name Server: NS4.LINODE.COM
Name Server: NS5.LINODE.COM
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of whois database: 2025-05-18T02:53:45Z <<<
For more information on Whois status codes, please visit https://icann.org/epp
NOTICE: The expiration date displayed in this record is the date the
TERMS OF USE: You are not authorized to access or query our Whois
by the following terms of use: You agree that you may use this Data only
to: (1) allow, enable, or otherwise support the transmission of mass