- 扫描 ID:
- e8ee5cfc-18aa-464e-b25c-f436b4a513a2已完成
- 提交的 URL:
- https://www.liquiditas.com/已重定向
- 报告完成时间:
HTTP 事务 · 检测到 14 个
在当前会话期间资源发出的所有 HTTP 请求和响应的列表
方法 | URL | 状态 | 协议 | 类型 | 大小 |
---|---|---|---|---|---|
GET | https://www.liquiditas.com/ | 301 | h2 | text/html | 0B |
GET | https://liquiditas.com/ | 200 | h2 | text/html | 518.78kB |
GET | https://fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2 | 200 | h2 | font/woff2 | 48.24kB |
GET | https://fonts.gstatic.com/s/opensans/v40/memtYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWqWuU6F.woff2 | 200 | h2 | font/woff2 | 50.3kB |
GET | https://fonts.gstatic.com/s/roboto/v32/KFOmCnqEu92Fr1Mu4mxK.woff2 | 200 | h2 | font/woff2 | 18.54kB |
GET | https://liquiditas.com/wp-content/plugins/elementor/assets/lib/font-awesome/webfonts/fa-solid-900.woff2 | 200 | h2 | font/woff2 | 78.2kB |
GET | https://liquiditas.com/wp-content/uploads/2023/03/hero-fluid.jpg | 200 | h2 | image/jpeg | 242.73kB |
GET | https://liquiditas.com/wp-content/uploads/2023/03/logo.svg | 200 | h2 | image/svg+xml | 771B |
GET | https://liquiditas.com/wp-content/plugins/wp-rocket/assets/js/lazyload/17.8.3/lazyload.min.js | 200 | h2 | application/javascript | 8.89kB |
GET | https://liquiditas.com/cdn-cgi/challenge-platform/scripts/jsd/main.js | 302 | h2 | 0B |
DNS 记录 · 找到 4 个
DNS 记录提供有关域的信息,包括与其关联的 IP 地址
类型 | 名称 | 内容 | DNSSEC |
---|---|---|---|
A | liquiditas.com | 104.21.46.15 | 已禁用 |
A | liquiditas.com | 172.67.222.63 | 已禁用 |
AAAA | liquiditas.com | 2606:4700:3033::ac43:de3f | 已禁用 |
AAAA | liquiditas.com | 2606:4700:3032::6815:2e0f | 已禁用 |