- 扫描 ID:
- 01d6519c-1a7c-44d1-a1ba-050b873d6833已完成
- 提交的 URL:
- https://thebreakdown.xyz/XRayUltimate已重定向
- 报告完成时间:
HTTP 事务 · 检测到 19 个
在当前会话期间资源发出的所有 HTTP 请求和响应的列表
方法 | URL | 状态 | 协议 | 类型 | 大小 |
---|---|---|---|---|---|
GET | https://thebreakdown.xyz/XRayUltimate | 307 | h2 | text/html | 0B |
GET | https://thebreakdown.xyz/how-to-download-install-xrayultimate-in-minecraft/ | 200 | h2 | text/html | 126.24kB |
GET | https://thebreakdown.xyz/wp-content/plugins/affiliatebooster-blocks/dist/assets/fontawesome/webfonts/fa-brands-400.woff2 | 200 | h2 | font/woff2 | 64.14kB |
GET | https://thebreakdown.xyz/wp-content/plugins/affiliatebooster-blocks/dist/assets/fontawesome/webfonts/fa-regular-400.woff2 | 200 | h2 | font/woff2 | 14.89kB |
GET | https://thebreakdown.xyz/wp-content/plugins/affiliatebooster-blocks/dist/assets/fontawesome/webfonts/fa-solid-900.woff2 | 200 | h2 | font/woff2 | 62.47kB |
GET | https://i.ytimg.com/vi/s2vUBo6Sbac/hqdefault.jpg | 200 | h2 | image/jpeg | 27.93kB |
GET | https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-3879009073238449&host=ca-host-pub-2644536267352236 | 200 | h2 | text/javascript | 164.02kB |
GET | https://thebreakdown.xyz/wp-content/plugins/wp-rocket/assets/js/lazyload/17.8.3/lazyload.min.js | 200 | h2 | application/javascript | 8.89kB |
GET | https://pagead2.googlesyndication.com/pagead/managed/js/adsense/m202412090101/show_ads_impl_with_ama_fy2021.js?client=ca-pub-3879009073238449&plah=thebreakdown.xyz | 200 | h2 | text/javascript | 445.18kB |
GET | https://fundingchoicesmessages.google.com/i/ca-pub-3879009073238449?href=https%3A%2F%2Fthebreakdown.xyz%2Fhow-to-download-install-xrayultimate-in-minecraft&ers=2 | 200 | h2 | application/javascript | 201.73kB |
DNS 记录 · 找到 1 个
DNS 记录提供有关域的信息,包括与其关联的 IP 地址
类型 | 名称 | 内容 | DNSSEC |
---|---|---|---|
A | thebreakdown.xyz | 34.174.104.123 | 已禁用 |