xd.jufangsoft.com
Open in
urlscan Pro
36.103.232.147
Public Scan
Effective URL: https://xd.jufangsoft.com/
Submission: On March 27 via api from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on February 15th 2024. Valid for: 3 months.
This is the only time xd.jufangsoft.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 36.103.232.147 36.103.232.147 | 134761 (CHINANET-...) (CHINANET-NINGXIA-ZHONGWEI-IDC CHINANET NINGXIA province ZHONGWEI IDC network) | |
1 | 185.23.181.26 185.23.181.26 | 138915 (KAOPU-HK ...) (KAOPU-HK Kaopu Cloud HK Limited) | |
1 | 36.103.232.151 36.103.232.151 | 134761 (CHINANET-...) (CHINANET-NINGXIA-ZHONGWEI-IDC CHINANET NINGXIA province ZHONGWEI IDC network) | |
2 | 103.235.46.191 103.235.46.191 | 55967 (BAIDU Bei...) (BAIDU Beijing Baidu Netcom Science and Technology Co.) | |
4 | 36.103.232.7 36.103.232.7 | 134761 (CHINANET-...) (CHINANET-NINGXIA-ZHONGWEI-IDC CHINANET NINGXIA province ZHONGWEI IDC network) | |
19 | 5 |
ASN134761 (CHINANET-NINGXIA-ZHONGWEI-IDC CHINANET NINGXIA province ZHONGWEI IDC network, CN)
xd.jufangsoft.com |
ASN138915 (KAOPU-HK Kaopu Cloud HK Limited, HK)
cdn.bootcss.com |
ASN134761 (CHINANET-NINGXIA-ZHONGWEI-IDC CHINANET NINGXIA province ZHONGWEI IDC network, CN)
www.jufangsoft.com |
ASN55967 (BAIDU Beijing Baidu Netcom Science and Technology Co., Ltd., CN)
hm.baidu.com |
ASN134761 (CHINANET-NINGXIA-ZHONGWEI-IDC CHINANET NINGXIA province ZHONGWEI IDC network, CN)
www.seayoo.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
jufangsoft.com
xd.jufangsoft.com www.jufangsoft.com |
3 MB |
4 |
seayoo.com
www.seayoo.com |
322 KB |
2 |
baidu.com
hm.baidu.com — Cisco Umbrella Rank: 8775 |
12 KB |
1 |
bootcss.com
cdn.bootcss.com — Cisco Umbrella Rank: 64184 |
24 KB |
19 | 4 |
Domain | Requested by | |
---|---|---|
11 | xd.jufangsoft.com |
xd.jufangsoft.com
|
4 | www.seayoo.com |
xd.jufangsoft.com
|
2 | hm.baidu.com |
xd.jufangsoft.com
|
1 | www.jufangsoft.com |
xd.jufangsoft.com
|
1 | cdn.bootcss.com |
xd.jufangsoft.com
|
19 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
bbs.nga.cn |
dxzhgl.miit.gov.cn |
beian.miit.gov.cn |
beian.mps.gov.cn |
www.gov.cn |
www.12377.cn |
www.jufangsoft.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.jufangsoft.com R3 |
2024-02-15 - 2024-05-15 |
3 months | crt.sh |
*.bootcss.com Sectigo RSA Domain Validation Secure Server CA |
2024-01-03 - 2025-02-02 |
a year | crt.sh |
baidu.com GlobalSign RSA OV SSL CA 2018 |
2023-07-06 - 2024-08-06 |
a year | crt.sh |
*.seayoo.com R3 |
2024-02-15 - 2024-05-15 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://xd.jufangsoft.com/
Frame ID: F0CE0D6DDE414D7A0666F3DE06DBB22D
Requests: 19 HTTP requests in this frame
Screenshot
Page Title
反恐行动创世记-女娲补天Page URL History Show full URLs
-
http://xd.jufangsoft.com/
HTTP 307
https://xd.jufangsoft.com/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Baidu Analytics (百度统计) (Analytics) Expand
Detected patterns
- hm\.baidu\.com/hm\.js
Page Statistics
7 Outgoing links
These are links going to different origins than the main page.
Title: 火爆论坛
Search URL Search Domain Scan URL
Title: 增值电信业务经营许可证 川B2-20200717
Search URL Search Domain Scan URL
Title: 蜀ICP备2020028281号-1
Search URL Search Domain Scan URL
Title: 川公网安备51019002003221号
Search URL Search Domain Scan URL
Title: 《中华人民共和国网络安全法》
Search URL Search Domain Scan URL
Title: 违法和不良信息举报中心
Search URL Search Domain Scan URL
Title: 网络游戏行业防沉迷自律公约
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://xd.jufangsoft.com/
HTTP 307
https://xd.jufangsoft.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
xd.jufangsoft.com/ Redirect Chain
|
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading_new.css
xd.jufangsoft.com/css/ |
3 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.bootcss.com/bootstrap/3.3.7/css/ |
118 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
foot.js
www.jufangsoft.com/snippets/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg1.mp4
xd.jufangsoft.com/public/ |
48 KB 0 |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg1.mp4
xd.jufangsoft.com/public/ |
30 KB 30 KB |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg1.mp4
xd.jufangsoft.com/public/ |
3 MB 0 |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.jpg
xd.jufangsoft.com/images/ |
243 B 243 B |
Image
application/xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg_wrap.png
xd.jufangsoft.com/zt/2017/01/images/ |
3 MB 3 MB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
btn1.png
xd.jufangsoft.com/zt/2017/01/images/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
btn2.png
xd.jufangsoft.com/zt/2017/01/images/ |
12 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
btn3.png
xd.jufangsoft.com/zt/2017/01/images/ |
12 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hm.js
hm.baidu.com/ |
29 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kingsoft.png
www.seayoo.com/public/footer/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jssy-w.png
www.seayoo.com/public/footer/ |
15 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
national.png
www.seayoo.com/public/footer/ |
19 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
safe.png
www.seayoo.com/public/footer/ |
278 KB 279 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hm.gif
hm.baidu.com/ |
43 B 299 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
xd.jufangsoft.com/ |
243 B 484 B |
Other
application/xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onpagereveal object| _hmt boolean| _bdhm_loaded_a1595df5c17c76a1e89ab4f9cfc7554a object| mini_tangram_log_pddct03 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.hm.baidu.com/ | Name: HMACCOUNT_BFESS Value: C957B8B054B9C115 |
|
.jufangsoft.com/ | Name: Hm_lvt_a1595df5c17c76a1e89ab4f9cfc7554a Value: 1711539373 |
|
.jufangsoft.com/ | Name: Hm_lpvt_a1595df5c17c76a1e89ab4f9cfc7554a Value: 1711539373 |
12 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.bootcss.com
hm.baidu.com
www.jufangsoft.com
www.seayoo.com
xd.jufangsoft.com
103.235.46.191
185.23.181.26
36.103.232.147
36.103.232.151
36.103.232.7
09fd1c8049b11735dedbf25b8e79f698f1d6643824b9f2860d74c50f5c9a502d
105cd64ba5e7d07aaf97b25d441c30ee20b723eebe1c62a54103bc331df644fc
45de2603e923110429698978809381ad23b9e47f43db7648ae55bbe413829071
5e2634846d6dfbb6c0a9a8e6bc8c06d333cca76990e8d4eec602ee7891728315
70cc6fc053baf81a7eb6425695666e0b3c7fc8ab59c4aca45fb905199908991c
811e8360e8ca227b1e7aca7d88144a46a5f0b51e30e8a7db7bc0c5a7062c0f37
84c7033e65468504758650f1790f6029576557acf3e38e8eb72bc9737650c84e
902211b7bc09f11d1b41d25e2c2c97c56c2a5e65f4e55977ef49a2fc2d58649e
99b78f6746de04daf6e788285b953148a2164646143f0075a02567bde4786d92
a20583c81805fe64f7fa210851ce29754af9d25fd6aa5a3225a9557529602513
a6ebe3e9b618bf374b1987e7c3cf715816b144763e128239e2af5029ba5b532d
b5db81a44041cd6143e5a27842dfe47b09bbc21187eb77857d75b655a909fa45
ced691617add150008b7053dcadaed8abbb1c208ccb72857bb271ad522b90b92
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
db64cf310ed6eddc189d391196f3c38f129dcb1abdb851802c4f494db65cb521
f75e846cc83bd11432f4b1e21a45f31bc85283d11d372f7b19accd1bf6a2635c
f96d6a6ec11139fc0b0e339d335100193c09320fb3d68d04603fcb15d95a7ada