- 扫描 ID:
- 51898664-5f6b-45df-8b9e-32d20b639adb已完成
- 提交的 URL:
- https://lang-en.us/已重定向
- 报告完成时间:
HTTP 事务 · 检测到 9 个
在当前会话期间资源发出的所有 HTTP 请求和响应的列表
方法 | URL | 状态 | 协议 | 类型 | 大小 |
---|---|---|---|---|---|
GET | https://lang-en.us/ | 302 | h2 | text/html | 0B |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story.html | 200 | h2 | text/html | 6.73kB |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/story_content/user.js | 200 | h2 | application/javascript | 67B |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/css/output.min.css | 200 | h2 | text/css | 123.13kB |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ds-bootstrap.min.js | 200 | h2 | application/javascript | 529.43kB |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/analytics-frame.html#84dd6ee1-2a66-4ff5-a350-9cb952c0c4a6 | 200 | h2 | text/html | 4.07kB |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/stylesheets/desktop.min.css | 200 | h2 | text/css | 76.95kB |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/lib/scripts/ds-frame.desktop.min.js | 200 | h2 | application/javascript | 217.89kB |
GET | https://training.phriendlyphishing.com/landing_pages/simulated_phishing_page/html5/data/js/frame.js | 200 | h2 | application/javascript | 53.9kB |
DNS 记录 · 找到 4 个
DNS 记录提供有关域的信息,包括与其关联的 IP 地址
类型 | 名称 | 内容 | DNSSEC |
---|---|---|---|
A | training.phriendlyphishing.com | 54.192.177.24 | 已禁用 |
A | training.phriendlyphishing.com | 54.192.177.68 | 已禁用 |
A | training.phriendlyphishing.com | 54.192.177.80 | 已禁用 |
A | training.phriendlyphishing.com | 54.192.177.14 | 已禁用 |