- 扫描 ID:
- 3c0a2399-6c26-4aac-bea7-5a1241115db2已完成
- 提交的 URL:
- https://leakfiles.xyz/
- 报告完成时间:
HTTP 事务 · 检测到 13 个
Copy link在当前会话期间资源发出的所有 HTTP 请求和响应的列表
方法 | URL | 状态 | 协议 | 类型 | 大小 |
---|---|---|---|---|---|
GET | https://leakfiles.xyz/ | 200 | h2 | text/html | 9.11kB |
GET | https://leakfiles.xyz/wp-includes/css/dist/block-library/style.min.css?ver=6.7.1 | 200 | h2 | text/css | 14.11kB |
GET | https://leakfiles.xyz/wp-content/themes/hello-elementor/style.min.css?ver=3.1.1 | 200 | h2 | text/css | 1.67kB |
GET | https://leakfiles.xyz/wp-content/themes/hello-elementor/theme.min.css?ver=3.1.1 | 200 | h2 | text/css | 1.21kB |
GET | https://leakfiles.xyz/wp-content/themes/hello-elementor/header-footer.min.css?ver=3.1.1 | 200 | h2 | text/css | 1.35kB |
GET | https://d2jiwo73gmsmk.cloudfront.net/f43fcbb.js | 200 | h2 | application/javascript | 7.61kB |
GET | https://d3gi4w10ruedfh.cloudfront.net/public/external/v2/htmlxf.4400334.b6f3c.0.js | 200 | h2 | application/javascript | 20.8kB |
GET | https://d3gi4w10ruedfh.cloudfront.net/public/external/css_frontXF.css | 200 | h2 | text/css | 6.48kB |
GET | https://leakfiles.xyz/wp-includes/js/wp-emoji-release.min.js?ver=6.7.1 | 200 | h2 | application/x-javascript | 4.75kB |
GET | https://d3gi4w10ruedfh.cloudfront.net/public/clockers/CustomButton/cssXF.css | 200 | h2 | text/css | 1.23kB |
DNS 记录 · 找到 2 个
Copy linkDNS 记录提供有关域的信息,包括与其关联的 IP 地址
类型 | 名称 | 内容 | DNSSEC |
---|---|---|---|
A | leakfiles.xyz | 157.173.216.23 | 已禁用 |
AAAA | leakfiles.xyz | 2a02:4780:11:1653:0:328f:d31e:6 | 已禁用 |