- 扫描 ID:
- 6a7a36e8-f6cd-4a18-bedd-e0205cb1e11c已完成
- 提交的 URL:
- https://richardbrunt.co.uk/blog/debugging-using-the-scientific-method/
- 报告完成时间:
HTTP 事务 · 检测到 13 个
Copy link在当前会话期间资源发出的所有 HTTP 请求和响应的列表
方法 | URL | 状态 | 协议 | 类型 | 大小 |
---|---|---|---|---|---|
GET | https://richardbrunt.co.uk/blog/debugging-using-the-scientific-method/ | 200 | h2 | text/html | 5.52kB |
GET | https://fonts.googleapis.com/css?family=Open+Sans:400,400italic,600,600italic,700,700italic&display=swap | 200 | h2 | text/css | 2.58kB |
GET | https://richardbrunt.co.uk/assets/css/main.css | 200 | h2 | text/css | 1.22kB |
GET | https://richardbrunt.co.uk/assets/css/syntax.css | 200 | h2 | text/css | 1.13kB |
GET | https://analytics.richardbrunt.co.uk/script.js | 200 | h2 | application/javascript | 1.9kB |
GET | https://richardbrunt.co.uk/assets/js/instantclick.min.js | 200 | h2 | application/javascript | 2.41kB |
GET | https://fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2 | 200 | h2 | font/woff2 | 48.37kB |
GET | https://fonts.gstatic.com/s/opensans/v40/memtYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWqWuU6F.woff2 | 200 | h2 | font/woff2 | 50.44kB |
GET | https://fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTUGmu1aB.woff2 | 200 | h2 | font/woff2 | 25.53kB |
GET | https://fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTVOmu1aB.woff2 | 200 | h2 | font/woff2 | 47.27kB |
DNS 记录 · 找到 2 个
Copy linkDNS 记录提供有关域的信息,包括与其关联的 IP 地址
类型 | 名称 | 内容 | DNSSEC |
---|---|---|---|
A | richardbrunt.co.uk | 99.83.231.61 | 已禁用 |
A | richardbrunt.co.uk | 75.2.60.5 | 已禁用 |