Help
RSS
API
Feed
Maltego
Contact
Domain > sjyszq.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Whois
Property
Value
Email
stzoobo@163.com
NameServer
NS4.DNS-DIY.COM
Created
2013-08-07 00:00:00
Changed
2014-10-13 00:00:00
Expires
2023-08-07 00:00:00
Registrar
35 TECHNOLOGY CO., L
DNS Resolutions
Date
IP Address
2024-11-09
125.91.34.187
(
ClassC
)
Port 80
HTTP/1.1 500 Internal Server ErrorCache-Control: privateContent-Type: text/html; charsetutf-8Server: Microsoft-IIS/8.5X-AspNet-Version: 4.0.30319X-Powered-By: ASP.NETDate: Sat, 09 Nov 2024 04:29:06 GMTContent-Length: 4947 !DOCTYPE html>html> head> title>未将对象引用设置到对象的实例。/title> meta nameviewport contentwidthdevice-width /> style> body {font-family:Verdana;font-weight:normal;font-size: .7em;color:black;} p {font-family:Verdana;font-weight:normal;color:black;margin-top: -5px} b {font-family:Verdana;font-weight:bold;color:black;margin-top: -5px} H1 { font-family:Verdana;font-weight:normal;font-size:18pt;color:red } H2 { font-family:Verdana;font-weight:normal;font-size:14pt;color:maroon } pre {font-family:Consolas,Lucida Console,Monospace;font-size:11pt;margin:0;padding:0.5em;line-height:14pt} .marker {font-weight: bold; color: black;text-decoration: none;} .version {color: gray;} .error {margin-bottom: 10px;} .expandable { text-decoration:underline; font-weight:bold; color:navy; cursor:hand; } @media screen and (max-width: 639px) { pre { width: 440px; overflow: auto; white-space: pre-wrap; word-wrap: break-word; } } @media screen and (max-width: 479px) { pre { width: 280px; } } /style> /head> body bgcolorwhite> span>H1>“/”应用程序中的服务器错误。hr width100% size1 colorsilver>/H1> h2> i>未将对象引用设置到对象的实例。/i> /h2>/span> font faceArial, Helvetica, Geneva, SunSans-Regular, sans-serif > b> 说明: /b>执行当前 Web 请求期间,出现未经处理的异常。请检查堆栈跟踪信息,以了解有关该错误以及代码中导致错误的出处的详细信息。 br>br> b> 异常详细信息: /b>System.NullReferenceException: 未将对象引用设置到对象的实例。br>br> b>源错误:/b> br>br> table width100% bgcolor#ffffcc> tr> td> code>pre>行 49: foreach (string tmp_flag in spider_flag_arr)行 50: {font colorred>行 51: if (user_agent.ToLower().IndexOf(tmp_flag.ToLower())!-1) { return true; }/font>行 52: }行 53: return false;/pre>/code> /td> /tr> /table> br> b> 源文件: /b> d:\www\sjyszq\Global.asaxb> 行: /b> 51 br>br> b>堆栈跟踪:/b> br>br> table width100% bgcolor#ffffcc> tr> td> code>pre>NullReferenceException: 未将对象引用设置到对象的实例。 ASP.global_asax.is_spider() in d:\www\sjyszq\Global.asax:51 ASP.global_asax.Session_Start(Object sender, EventArgs e) in d:\www\sjyszq\Global.asax:24 System.Web.SessionState.SessionStateModule.RaiseOnStart(EventArgs e) +10067123 System.Web.SessionState.SessionStateModule.CompleteAcquireState() +160 System.Web.SessionState.SessionStateModule.BeginAcquireState(Object source, EventArgs e, AsyncCallback cb, Object extraData) +1095 System.Web.AsyncEventExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute() +254 System.Web.HttpApplication.ExecuteStepImpl(IExecutionStep step) +48 System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously) +159/pre>/code> /td> /tr> /table> br> hr width100% size1 colorsilver> b>版本信息:/b> Microsoft .NET Framework 版本:4.0.30319; ASP.NET 版本:4.7.3163.0 /font> /body>/html>!-- NullReferenceException: 未将对象引用设置到对象的实例。 在 ASP.global_asax.is_spider() 位置 d:\www\sjyszq\Global.asax:行号 51 在 ASP.global_asax.Session_Start(Object sender, EventArgs e) 位置 d:\www\sjyszq\Global.asax:行号 24 在 System.Web.SessionState.SessionStateModule.RaiseOnStart(EventArgs e) 在 System.Web.SessionState.SessionStateModule.CompleteAcquireState() 在 System.Web.SessionState.SessionStateModule.BeginAcquireState(Object source, EventArgs e, AsyncCallback cb, Object extraData) 在 System.Web.HttpApplication.AsyncEventExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute() 在 System.Web.HttpApplication.ExecuteStepImpl(IExecutionStep step) 在 System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously)-->!-- 此错误页可能包含敏感信息,因为 ASP.NET 通过 <customErrors modeOff/> 被配置为显示详细错误消息。请考虑在生产环境中使用 <customErrors modeOn/> 或 <customErrors modeRemoteOnly/>。-->
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]