- 扫描 ID:
- 21270d62-1a74-411d-8c2b-48fe7151f9a9已完成
- 提交的 URL:
- https://v3rm.net/threads/matcha-external-exposed-rootkit-virus.15452/
- 报告完成时间:
HTTP 事务 · 检测到 38 个
在当前会话期间资源发出的所有 HTTP 请求和响应的列表
方法 | URL | 状态 | 协议 | 类型 | 大小 |
---|---|---|---|---|---|
GET | https://v3rm.net/threads/matcha-external-exposed-rootkit-virus.15452/ | 403 | h2 | text/html | 33.11kB |
GET | https://v3rm.net/css.php?css=public%3Anormalize.css%2Cpublic%3Afa.css%2Cpublic%3Avariations.less%2Cpublic%3Acore.less%2Cpublic%3Aapp.less&s=6&l=1&d=1733687657&k=f017b085115936f5942a970cfdd872a90ff4da5f | 200 | h2 | text/css | 417.19kB |
GET | https://fonts.googleapis.com/css2?family=Poppins:wght@400;500;600;700&display=swap | 200 | h2 | text/css | 3.38kB |
GET | https://v3rm.net/css.php?css=public%3Anotices.less%2Cpublic%3Aextra.less&s=6&l=1&d=1733687657&k=a58d9cc9974026945b07ae82190e469003ce142c | 200 | h2 | text/css | 4.85kB |
GET | https://v3rm.net/js/xf/preamble.min.js?_v=847fae00 | 200 | h2 | application/javascript | 3.79kB |
GET | https://v3rm.net/emojis/cr.gif | 200 | h2 | image/gif | 46.77kB |
GET | https://v3rm.net/js/vendor/vendor-compiled.js?_v=847fae00 | 200 | h2 | application/javascript | 14.68kB |
GET | https://v3rm.net/js/xf/core-compiled.js?_v=847fae00 | 200 | h2 | application/javascript | 175.98kB |
GET | https://v3rm.net/js/xf/login_signup.min.js?_v=847fae00 | 200 | h2 | application/javascript | 3.08kB |
GET | https://v3rm.net/js/xf/webauthn.min.js?_v=847fae00 | 200 | h2 | application/javascript | 5.34kB |
DNS 记录 · 找到 4 个
DNS 记录提供有关域的信息,包括与其关联的 IP 地址
类型 | 名称 | 内容 | DNSSEC |
---|---|---|---|
A | v3rm.net | 104.18.26.209 | 已禁用 |
A | v3rm.net | 104.18.27.209 | 已禁用 |
AAAA | v3rm.net | 2606:4700::6812:1bd1 | 已禁用 |
AAAA | v3rm.net | 2606:4700::6812:1ad1 | 已禁用 |