Avatar of cornell256
cornell256

asked on 

Strange webpage - something evil?

I landed on a page today called topmanhattansites.com.

It is a page full of numbers that look like this (this is just a few lines):
9814166385<9814166385!9814166385D9814166385O9814166385C9814166385T9814166385Y9814166385P9814166385E9814166385 9814166385H9814166385T9814166385M9814166385L9814166385 9814166385P9814166385U9814166385B9814166385L9814166385I9814166385C9814166385 9814166385"9814166385-9814166385/9814166385/9814166385W981416638539814166385C9814166385/9814166385/9814166385D9814166385T9814166385D9814166385 9814166385H9814166385T9814166385M9814166385L9814166385 981416638549814166385.98141663850981416638519814166385

Is this ominous?
Security

Avatar of undefined
Last Comment
bbao
Avatar of cornell256
cornell256

ASKER

I notice this is "just" a phone type number repeated over and over with a varying char between each number. Maybe this is a clue from Lost.
ASKER CERTIFIED SOLUTION
Avatar of bbao
bbao
Flag of Australia image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of cornell256
cornell256

ASKER

Thanks so much, now I feel much relieved. I didn't see how it could be anything sinister, but it's so odd. Your quick answer is greatly appreciated!
Avatar of cornell256
cornell256

ASKER

answer accepted from bbao.
Avatar of bbao
bbao
Flag of Australia image

glad to help. :-)

it's strange but harmless. anyway, your awareness is good. :-))
Security
Security

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.

32K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo