- ID de l'analyse :
- b494ca18-bab6-48f6-b743-7cdee03c3673Terminée
- URL soumise :
- https://haveibeenpwned.com/
- Fin du rapport :
Transactions HTTP · 38 détectées
Une liste de toutes les requêtes et réponses HTTP émises par la ressource au cours de la session en cours
Méthode | URL | Statut | Protocole | Type | Taille |
---|---|---|---|---|---|
GET | https://haveibeenpwned.com/ | 200 | h2 | text/html | 8.08kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/css/bootstrap.min.css | 200 | h2 | text/css | 16.83kB |
GET | https://haveibeenpwned.com/content/css/pwned?v=l-PSrblX7vf9eicCwy8GIKZZEgr2tgWv8vdHZNKZii81 | 200 | h2 | text/css | 5.85kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css | 200 | h2 | text/css | 5.97kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/1PasswordLogo.svg | 200 | h2 | image/svg+xml | 2.66kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/Step1.png | 200 | h2 | image/webp | 9.57kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/Step2.png | 200 | h2 | image/webp | 2.7kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/Step3.png | 200 | h2 | image/webp | 3.4kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js | 200 | h2 | application/javascript | 27.31kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js | 200 | h2 | application/javascript | 9.05kB |
Enregistrements DNS : 4 trouvé(s)
Les enregistrements DNS fournissent des informations concernant un domaine, notamment l'adresse IP à laquelle il est associé
Type | Nom | Contenu | DNSSEC |
---|---|---|---|
A | haveibeenpwned.com | 104.16.124.33 | Activé |
A | haveibeenpwned.com | 104.16.123.33 | Activé |
AAAA | haveibeenpwned.com | 2606:4700::6810:7b21 | Activé |
AAAA | haveibeenpwned.com | 2606:4700::6810:7c21 | Activé |