- 扫描 ID:
- 51898664-5f6b-45df-8b9e-32d20b639adb已完成
- 提交的 URL:
- https://lang-en.us/已重定向
- 报告完成时间:
HTTP 事务 · 检测到 8 个
Copy link在当前会话期间资源发出的所有 HTTP 请求和响应的列表
方法 | URL | 状态 | 协议 | 类型 | 大小 |
---|---|---|---|---|---|
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html | 200 | h2 | text/html | 2.91kB |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_content/user.js | 200 | h2 | application/javascript | 392B |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/css/output.min.css | 200 | h2 | text/css | 74.96kB |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ds-bootstrap.min.js | 200 | h2 | application/javascript | 169.98kB |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/analytics-frame.html#84dd6ee1-2a66-4ff5-a350-9cb952c0c4a6 | 200 | h2 | text/html | 1.71kB |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/desktop.min.css | 200 | h2 | text/css | 16.32kB |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ds-frame.desktop.min.js | 200 | h2 | application/javascript | 53.04kB |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/frame.js | 200 | h2 | application/javascript | 37.82kB |
DNS 记录 · 找到 4 个
Copy linkDNS 记录提供有关域的信息,包括与其关联的 IP 地址
类型 | 名称 | 内容 | DNSSEC |
---|---|---|---|
A | training.phriendlyphishing.com | 54.192.177.24 | 已禁用 |
A | training.phriendlyphishing.com | 54.192.177.68 | 已禁用 |
A | training.phriendlyphishing.com | 54.192.177.80 | 已禁用 |
A | training.phriendlyphishing.com | 54.192.177.14 | 已禁用 |