- 扫描 ID:
- 2710d64a-c533-4e1e-b103-56ee246386b3已完成
- 提交的 URL:
- https://xiaohongshu.com/已重定向
- 报告完成时间:
HTTP 事务 · 检测到 176 个
Copy link在当前会话期间资源发出的所有 HTTP 请求和响应的列表
方法 | URL | 状态 | 协议 | 类型 | 大小 |
---|---|---|---|---|---|
GET | https://www.xiaohongshu.com/explore | 200 | h2 | text/html | 128.72kB |
GET | https://fe-video-qc.xhscdn.com/fe-platform/feebc0adf4ea0006b9c3b69e7336cee982e7d886.js | 200 | h2 | text/javascript | 53kB |
GET | https://fe-video-qc.xhscdn.com/fe-platform/60d0a1e84604a486f06fa22d72a261caf0e742a9.js?s=sdt_source_init | 200 | h2 | text/javascript | 78.25kB |
GET | https://fe-static.xhscdn.com/formula-static/xhs-pc-web/public/resource/js/bundler-runtime.c0350ea5.js | 200 | h2 | application/javascript | 4.49kB |
GET | https://fe-static.xhscdn.com/formula-static/xhs-pc-web/public/resource/js/vendor-dynamic.beda81d6.js | 200 | h2 | application/javascript | 141.64kB |
GET | https://fe-static.xhscdn.com/formula-static/xhs-pc-web/public/resource/js/library-polyfill.c903050f.js | 200 | h2 | application/javascript | 62.67kB |
GET | https://fe-static.xhscdn.com/formula-static/xhs-pc-web/public/resource/js/vendor.94a74c99.js | 200 | h2 | application/javascript | 194.98kB |
GET | https://fe-static.xhscdn.com/formula-static/xhs-pc-web/public/resource/js/index.9b52cec3.js | 200 | h2 | application/javascript | 165.92kB |
GET | https://sns-webpic-qc.xhscdn.com/202501190948/b6977dfadcc1f543a4c240589d5cb5b3/1040g00830n04vgcll2005n6t8ok5pc8iic27dcg!nc_n_webp_mw_1 | 200 | h2 | image/webp | 41.66kB |
GET | https://sns-avatar-qc.xhscdn.com/avatar/5f029e904317890001b57c4e.jpg?imageView2/2/w/60/format/webp%7CimageMogr2/strip | 200 | h2 | image/webp | 1.79kB |
DNS 记录 · 找到 2 个
Copy linkDNS 记录提供有关域的信息,包括与其关联的 IP 地址
类型 | 名称 | 内容 | DNSSEC |
---|---|---|---|
CNAME | www.xiaohongshu.com | www.xiaohongshu.com.dsa.dnsv1.com. | 已禁用 |
CNAME | www.xiaohongshu.com | www.xiaohongshu.com.dsa.dnsv1.com. | 已禁用 |