zjumbrella.com
Open in
urlscan Pro
154.204.166.10
Public Scan
Submission: On November 16 via api from BE — Scanned from US
Summary
This is the only time zjumbrella.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 154.204.166.10 154.204.166.10 | 400619 (AROSS-AS) (AROSS-AS) | |
2 | 27.124.9.52 27.124.9.52 | 152194 (CTGSERVER...) (CTGSERVERLIMITED-AS-AP CTG Server Limited) | |
1 | 2404:2280:1b6... 2404:2280:1b6:0:3::7f4 | 24429 (TAOBAO Zh...) (TAOBAO Zhejiang Taobao Network Co.) | |
1 | 112.34.113.148 112.34.113.148 | 9808 (CHINAMOBI...) (CHINAMOBILE-CN China Mobile Communications Group Co.) | |
19 | 5 |
ASN152194 (CTGSERVERLIMITED-AS-AP CTG Server Limited, HK)
cdn.staticfile.org |
ASN24429 (TAOBAO Zhejiang Taobao Network Co.,Ltd, CN)
lf3-cdn-tos.bytecdntp.com |
ASN9808 (CHINAMOBILE-CN China Mobile Communications Group Co., Ltd., CN)
push.zhanzhang.baidu.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
zjumbrella.com
zjumbrella.com |
132 KB |
2 |
staticfile.org
cdn.staticfile.org — Cisco Umbrella Rank: 126239 |
84 KB |
1 |
baidu.com
push.zhanzhang.baidu.com — Cisco Umbrella Rank: 206135 api.share.baidu.com Failed |
377 B |
1 |
bytecdntp.com
lf9-cdn-tos.bytecdntp.com Failed lf3-cdn-tos.bytecdntp.com — Cisco Umbrella Rank: 190177 lf6-cdn-tos.bytecdntp.com Failed |
1 KB |
19 | 4 |
Domain | Requested by | |
---|---|---|
12 | zjumbrella.com |
zjumbrella.com
|
2 | cdn.staticfile.org |
zjumbrella.com
cdn.staticfile.org |
1 | push.zhanzhang.baidu.com |
zjumbrella.com
|
1 | lf3-cdn-tos.bytecdntp.com |
zjumbrella.com
|
0 | api.share.baidu.com Failed |
zjumbrella.com
|
0 | lf6-cdn-tos.bytecdntp.com Failed |
zjumbrella.com
|
0 | lf9-cdn-tos.bytecdntp.com Failed |
zjumbrella.com
|
19 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.staticfile.org GlobalSign GCC R6 AlphaSSL CA 2023 |
2024-09-15 - 2025-10-17 |
a year | crt.sh |
*.bytecdntp.com RapidSSL TLS RSA CA G1 |
2024-05-21 - 2025-05-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://zjumbrella.com/
Frame ID: 96FBE5AB1793BCC83839BA7EEAFF4824
Requests: 19 HTTP requests in this frame
Screenshot
Page Title
后宫乱(NP 高H),玉漱公主被肉干高H潮文不断,公主(NP高H),少爷们的床奴NP高H,医生高H全肉1v1Page URL History Show full URLs
-
http://zjumbrella.com/
HTTP 307
https://zjumbrella.com/ HTTP 307
http://zjumbrella.com/ Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://zjumbrella.com/
HTTP 307
https://zjumbrella.com/ HTTP 307
http://zjumbrella.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
zjumbrella.com/ Redirect Chain
|
68 KB 20 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
cdn.staticfile.org/font-awesome/4.7.0/css/ |
30 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
zjumbrella.com/index/biquge/css/ |
18 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery.min.js
lf9-cdn-tos.bytecdntp.com/cdn/expire-1-M/jquery/3.4.0/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.cookie.min.js
lf3-cdn-tos.bytecdntp.com/cdn/expire-1-M/jquery-cookie/1.4.1/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery.lazyload.min.js
lf6-cdn-tos.bytecdntp.com/cdn/expire-1-M/jquery_lazyload/1.9.1/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.js
zjumbrella.com/index/biquge/js/ |
20 KB 11 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.js
zjumbrella.com/index/biquge/js/ |
4 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bdd5147fcb86e5e39e684674bfc246a9.jpg
zjumbrella.com/uploads/images/bdd5/ |
18 KB 18 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
8e746f273fcc689595345561d38acd70.jpg
zjumbrella.com/uploads/images/8e74/ |
18 KB 18 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
e7e0db970572dce19690cdeae76984c2.jpg
zjumbrella.com/uploads/images/e7e0/ |
16 KB 16 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
8ec856f3b463f775bf3af0cda46ad054.jpg
zjumbrella.com/uploads/images/8ec8/ |
19 KB 19 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
70588673fd8b5d01ecddfc2a9222c588.jpg
zjumbrella.com/uploads/images/7058/ |
14 KB 14 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nocover.jpg
zjumbrella.com/index/biquge/img/ |
9 KB 9 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
e7e0db970572dce19690cdeae76984c2.jpg
zjumbrella.com/uploads/images/e7e0/ |
16 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nocover.jpg
zjumbrella.com/index/biquge/img/ |
9 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
push.js
push.zhanzhang.baidu.com/ |
281 B 377 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff2
cdn.staticfile.org/font-awesome/4.7.0/fonts/ |
75 KB 76 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
s.gif
api.share.baidu.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- lf9-cdn-tos.bytecdntp.com
- URL
- https://lf9-cdn-tos.bytecdntp.com/cdn/expire-1-M/jquery/3.4.0/jquery.min.js
- Domain
- lf6-cdn-tos.bytecdntp.com
- URL
- https://lf6-cdn-tos.bytecdntp.com/cdn/expire-1-M/jquery_lazyload/1.9.1/jquery.lazyload.min.js
- Domain
- api.share.baidu.com
- URL
- http://api.share.baidu.com/s.gif?l=http://zjumbrella.com/
Verdicts & Comments Add Verdict or Comment
39 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| a_catalog function| a_info function| search function| chkval function| store_menu function| gotop function| gofooter function| setEcho function| setCookies function| readCookies object| jieqiUserInfo function| tips function| logout function| newmessage function| LastRead function| removebook function| removeall function| showtempbooks string| zh_default number| zh_expires string| zh_class string| zh_style_active boolean| zh_autoLang_t boolean| zh_autoLang_s object| zh_langReg_t object| zh_langReg_s string| zh_s string| zh_t function| tran_search function| zh_tranBody function| zh_tran function| zh_getLang function| zh_init object| lastread string| zh_browserLang function| cog function| isnight function| ismini function| changeSize1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
zjumbrella.com/ | Name: zh_choose Value: |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
api.share.baidu.com
cdn.staticfile.org
lf3-cdn-tos.bytecdntp.com
lf6-cdn-tos.bytecdntp.com
lf9-cdn-tos.bytecdntp.com
push.zhanzhang.baidu.com
zjumbrella.com
api.share.baidu.com
lf6-cdn-tos.bytecdntp.com
lf9-cdn-tos.bytecdntp.com
112.34.113.148
154.204.166.10
2404:2280:1b6:0:3::7f4
27.124.9.52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