- 扫描 ID:
- 1657224c-622b-418f-a95f-ecb06abbacfd已完成
- 提交的 URL:
- https://haveibeenpwned.com/
- 报告完成时间:
HTTP 事务 · 检测到 40 个
在当前会话期间资源发出的所有 HTTP 请求和响应的列表
方法 | URL | 状态 | 协议 | 类型 | 大小 |
---|---|---|---|---|---|
GET | https://haveibeenpwned.com/ | 200 | h2 | text/html | 31.6kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/css/bootstrap.min.css | 200 | h2 | text/css | 121.2kB |
GET | https://haveibeenpwned.com/content/css/pwned?v=l-PSrblX7vf9eicCwy8GIKZZEgr2tgWv8vdHZNKZii81 | 200 | h2 | text/css | 24.5kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css | 200 | h2 | text/css | 31kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/1PasswordLogo.svg | 200 | h2 | image/svg+xml | 9.83kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/Step1.png | 200 | h2 | image/webp | 9.34kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/Step2.png | 200 | h2 | image/webp | 2.59kB |
GET | https://haveibeenpwned.com/Content/Images/PasswordManager/Step3.png | 200 | h2 | image/webp | 3.29kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js | 200 | h2 | application/javascript | 85.58kB |
GET | https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js | 200 | h2 | application/javascript | 37.05kB |
DNS 记录 · 找到 4 个
DNS 记录提供有关域的信息,包括与其关联的 IP 地址
类型 | 名称 | 内容 | DNSSEC |
---|---|---|---|
A | haveibeenpwned.com | 104.16.124.33 | 已启用 |
A | haveibeenpwned.com | 104.16.123.33 | 已启用 |
AAAA | haveibeenpwned.com | 2606:4700::6810:7b21 | 已启用 |
AAAA | haveibeenpwned.com | 2606:4700::6810:7c21 | 已启用 |