- 扫描 ID:
- 4860c0c3-7fd8-437e-a94d-5c0594f8973c已完成
- 提交的 URL:
- https://hacktorx.com/
- 报告完成时间:
HTTP 事务 · 检测到 49 个
Copy link在当前会话期间资源发出的所有 HTTP 请求和响应的列表
方法 | URL | 状态 | 协议 | 类型 | 大小 |
---|---|---|---|---|---|
GET | https://hacktorx.com/ | 200 | h2 | text/html | 24.65kB |
GET | https://hacktorx.com/wp-content/cache/wpfc-minified/31hp7thm/7xj0p.css | 200 | h2 | text/css | 19.17kB |
GET | https://hacktorx.com/wp-content/cache/wpfc-minified/f56vwyv5/7xj0p.css | 200 | h2 | text/css | 5.68kB |
GET | https://fonts.googleapis.com/css2?family=Kumbh+Sans%3Awght%40400%3B500%3B600%3B700&display=swap&ver=1.0.0 | 200 | h2 | text/css | 1.9kB |
GET | https://fonts.googleapis.com/css2?family=Open+Sans%3Aital%2Cwght%400%2C400%3B0%2C600%3B0%2C700%3B1%2C400%3B1%2C700&display=swap&ver=1.0.0 | 200 | h2 | text/css | 2.08kB |
GET | https://hacktorx.com/wp-content/cache/wpfc-minified/lln2vich/7xj0p.css | 200 | h2 | text/css | 59.38kB |
GET | https://hacktorx.com/wp-content/cache/wpfc-minified/fqheuu6k/7xjnz.js | 200 | h2 | application/javascript | 41.28kB |
GET | https://hacktorx.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js | 200 | h2 | application/javascript | 1.08kB |
GET | https://hacktorx.com/wp-content/plugins/table-of-contents-plus/front.min.js?ver=2411.1 | 200 | h2 | application/javascript | 2.95kB |
GET | https://hacktorx.com/wp-includes/js/imagesloaded.min.js?ver=5.0.0 | 200 | h2 | application/javascript | 2.51kB |
DNS 记录 · 找到 4 个
Copy linkDNS 记录提供有关域的信息,包括与其关联的 IP 地址
类型 | 名称 | 内容 | DNSSEC |
---|---|---|---|
A | hacktorx.com | 104.21.84.137 | 已禁用 |
A | hacktorx.com | 172.67.193.88 | 已禁用 |
AAAA | hacktorx.com | 2606:4700:3031::ac43:c158 | 已禁用 |
AAAA | hacktorx.com | 2606:4700:3036::6815:5489 | 已禁用 |