- 扫描 ID:
- 0c5fcf80-add9-4e04-b25a-fa7a61ea01b2已完成
- 提交的 URL:
- https://infected.fun/reserve已重定向
- 报告完成时间:
HTTP 事务 · 检测到 50 个
Copy link在当前会话期间资源发出的所有 HTTP 请求和响应的列表
方法 | URL | 状态 | 协议 | 类型 | 大小 |
---|---|---|---|---|---|
GET | https://www.infected.fun/reserve | 200 | h2 | text/html | 4.54kB |
GET | https://www.infected.fun/_next/static/media/ecd97348d51f6b89-s.p.ttf | 200 | h2 | font/ttf | 22.32kB |
GET | https://www.infected.fun/_next/static/css/5632ada347cd9188.css?dpl=dpl_3YuZkLLQWCxNo1sXDtYx2eNvZNCt | 200 | h2 | text/css | 4.78kB |
GET | https://www.infected.fun/_next/static/css/7324efbc4deceb24.css?dpl=dpl_3YuZkLLQWCxNo1sXDtYx2eNvZNCt | 200 | h2 | text/css | 8.81kB |
GET | https://www.infected.fun/_next/static/chunks/webpack-ea6fb2e1be5d5f3e.js?dpl=dpl_3YuZkLLQWCxNo1sXDtYx2eNvZNCt | 200 | h2 | application/javascript | 3.57kB |
GET | https://www.infected.fun/_next/static/chunks/fd9d1056-7a77c00dafdfece2.js?dpl=dpl_3YuZkLLQWCxNo1sXDtYx2eNvZNCt | 200 | h2 | application/javascript | 55.38kB |
GET | https://www.infected.fun/_next/static/chunks/2117-c08d81c678c60865.js?dpl=dpl_3YuZkLLQWCxNo1sXDtYx2eNvZNCt | 200 | h2 | application/javascript | 33.28kB |
GET | https://www.infected.fun/_next/static/chunks/main-app-351a7b18c7f87dd5.js?dpl=dpl_3YuZkLLQWCxNo1sXDtYx2eNvZNCt | 200 | h2 | application/javascript | 663B |
GET | https://www.infected.fun/_next/static/chunks/4e88bc13-f6fb14d7b45a9433.js?dpl=dpl_3YuZkLLQWCxNo1sXDtYx2eNvZNCt | 200 | h2 | application/javascript | 37.45kB |
GET | https://www.infected.fun/_next/static/chunks/2240-f433f95b8828a2f5.js?dpl=dpl_3YuZkLLQWCxNo1sXDtYx2eNvZNCt | 200 | h2 | application/javascript | 63.83kB |
DNS 记录 · 找到 2 个
Copy linkDNS 记录提供有关域的信息,包括与其关联的 IP 地址
类型 | 名称 | 内容 | DNSSEC |
---|---|---|---|
CNAME | www.infected.fun | cname.vercel-dns.com. | 已禁用 |
CNAME | www.infected.fun | cname.vercel-dns.com. | 已禁用 |