- 扫描 ID:
- c7498015-ad15-45c4-865d-7c0588bb904a已完成
- 提交的 URL:
- https://breakthrough.donorris.cfd/
- 报告完成时间:
HTTP 事务 · 检测到 17 个
Copy link在当前会话期间资源发出的所有 HTTP 请求和响应的列表
方法 | URL | 状态 | 协议 | 类型 | 大小 |
---|---|---|---|---|---|
GET | https://breakthrough.donorris.cfd/ | 200 | h2 | text/html | 5kB |
GET | https://breakthrough.donorris.cfd/index/css/plugins.css | 200 | h2 | text/css | 35.1kB |
GET | https://breakthrough.donorris.cfd/index/css/style.css | 200 | h2 | text/css | 11.12kB |
GET | https://fonts.googleapis.com/css?family=Raleway:100,200,300,400,500,600,700,800,900%7CMontserrat:400,400i,500,500i,600,600i,700,700i,800,800i,900,900i | 200 | h2 | text/css | 1.67kB |
GET | https://breakthrough.donorris.cfd/index/img/logo-mobile.png | 200 | h2 | image/png | 4.34kB |
GET | https://breakthrough.donorris.cfd/index/img/logo-desktop.png | 200 | h2 | image/png | 4.39kB |
GET | https://breakthrough.donorris.cfd/index/img/logo-desktop-2.png | 200 | h2 | image/png | 4.35kB |
GET | https://breakthrough.donorris.cfd/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js | 200 | h2 | application/javascript | 1.18kB |
GET | https://breakthrough.donorris.cfd/index/js/plugins.js | 200 | h2 | application/javascript | 140.52kB |
GET | https://breakthrough.donorris.cfd/index/js/wildon.js | 200 | h2 | application/javascript | 3.14kB |
DNS 记录 · 找到 2 个
Copy linkDNS 记录提供有关域的信息,包括与其关联的 IP 地址
类型 | 名称 | 内容 | DNSSEC |
---|---|---|---|
A | breakthrough.donorris.cfd | 104.21.12.196 | 已禁用 |
A | breakthrough.donorris.cfd | 172.67.195.162 | 已禁用 |