is closing

At the end of February, Corebox will cease to display drill results on this website. I wish to thank our loyal clients for their business over the previous twelve years. Running Corebox and meeting so many of you in the industry has been a great pleasure.

Please make sure to take any screenshots you need of the displays. Starting March 1st, you won’t be able to login to the site or view the pages that are currently public. All unearned subscription fees will be returned to clients by mid-February.

If you need to get in touch, you can reach me via the Contact Us page.

Jonathan Longe

Acceptable Use Policy

We ask that you use the website at (the "Corebox website") responsibly.

By using the Corebox website, you agree not to misuse it. Without limiting the generality of the foregoing, you may not do any of the following while using the Corebox website:

  1. access, tamper with, or use non-public areas of the Corebox website, including shared areas of the Corebox website to which you have not been invited and Corebox's (or Corebox's service providers') computer systems;
  2. probe, scan, or test the vulnerability of any system or network, or breach or circumvent any security or authentication measures;
  3. plant malware or otherwise use the Corebox website to distribute malware;
  4. access or search, or attempt to access or search, the Corebox website by any means (automated or otherwise) other than through our currently available, publicly supported interfaces (for example, "scraping");
  5. interfere with or disrupt, or attempt to interfere with or disrupt, the access of any user, host or network, including, without limitation, sending a virus to, overloading, flooding, spamming or mail-bombing the Corebox website, or by scripting the creation of data in such a manner as to interfere with or create an undue burden on the Corebox website;
  6. send unsolicited communications, promotions or advertisements, or spam;
  7. send altered, deceptive or false source-identifying information, including "spoofing", "phishing" or forging TCP/IP packet headers or any part of the header information in any e-mail or posting;
  8. publish anything that is fraudulent, misleading, or infringes another's rights;
  9. copy, upload, download, store, or share files unless you have the right to do so;
  10. promote or advertise products or services other than your own without appropriate authorization;
  11. impersonate or misrepresent your affiliation with any person or entity, or engage in conduct that does or is intended to mislead or deceiver others;
  12. disclose your password to others;
  13. violate the law in any way, or violate the privacy of others, or defame others.