- ID de l'analyse :
- 95bfa1e5-00de-4eb0-9d5d-7f2cf3664193Terminée
- URL soumise :
- https://haveibeenpwned.com/
- Fin du rapport :
Transactions HTTP · 38 détectées
Copy linkUne liste de toutes les requêtes et réponses HTTP émises par la ressource au cours de la session en cours
Méthode | URL | Statut | Protocole | Type | Taille |
---|---|---|---|---|---|
GET | https://haveibeenpwned.com/ | 200 | h2 | text/html | 8.14kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/css/bootstrap.min.css | 200 | h2 | text/css | 16.5kB |
GET | https://haveibeenpwned.com/content/css/pwned?v=l-PSrblX7vf9eicCwy8GIKZZEgr2tgWv8vdHZNKZii81 | 200 | h2 | text/css | 5.85kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css | 200 | h2 | text/css | 6.3kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/1PasswordLogo.svg | 200 | h2 | image/svg+xml | 2.69kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/Step1.png | 200 | h2 | image/webp | 9.53kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/Step2.png | 200 | h2 | image/webp | 2.71kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/Step3.png | 200 | h2 | image/webp | 3.4kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js | 200 | h2 | application/javascript | 27.3kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js | 200 | h2 | application/javascript | 9.05kB |
Enregistrements DNS : 4 trouvé(s)
Copy linkLes enregistrements DNS fournissent des informations concernant un domaine, notamment l'adresse IP à laquelle il est associé
Type | Nom | Contenu | DNSSEC |
---|---|---|---|
A | haveibeenpwned.com | 104.16.123.33 | Activé |
A | haveibeenpwned.com | 104.16.124.33 | Activé |
AAAA | haveibeenpwned.com | 2606:4700::6810:7b21 | Activé |
AAAA | haveibeenpwned.com | 2606:4700::6810:7c21 | Activé |