Help
RSS
API
Feed
Maltego
Contact
Domain > yl.xcjob.cn
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2017-04-08
210.22.60.214
(
ClassC
)
2025-01-13
180.163.146.99
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: TengineDate: Mon, 13 Jan 2025 16:45:28 GMTContent-Type: text/htmlContent-Length: 262Connection: keep-aliveLocation: https://yl.xcjob.cn/Via: kunlun6.cn7174,0Timing-Allow-Origin: *EagleId: b4a3921a17367867284207000e !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>301 Moved Permanently/h1>p>The requested resource has been assigned a new permanent URI./p>hr/>Powered by Tengine/body>/html>
Port 443
HTTP/1.1 500 Internal Server ErrorServer: TengineContent-Type: text/html; charsetutf-8Content-Length: 5066Connection: keep-aliveCache-Control: privateX-AspNet-Version: 4.0.30319X-Powered-By: ASP.NETDate: Mon, 13 Jan 2025 16:45:29 GMTVia: cache74.l2cn302293,93,500-1281,M, cache49.l2cn302293,0, kunlun9.cn7174100,100,500-1281,M, kunlun9.cn7174137,103,0Ali-Swift-Global-Savetime: 1736786729X-Cache: MISS TCP_MISS dirn:-2:-2X-Swift-Error: orig response 5xx errorX-Swift-SaveTime: Mon, 13 Jan 2025 16:45:29 GMTX-Swift-CacheTime: 0Timing-Allow-Origin: *EagleId: b4a3921d17367867293243486e !DOCTYPE html>html> head> title>未将对象引用设置到对象的实例。/title> meta nameviewport contentwidthdevice-width /> style> body {font-family:Verdana;font-weight:normal;font-size: .7em;color:black;} p {font-family:Verdana;font-weight:normal;color:black;margin-top: -5px} b {font-family:Verdana;font-weight:bold;color:black;margin-top: -5px} H1 { font-family:Verdana;font-weight:normal;font-size:18pt;color:red } H2 { font-family:Verdana;font-weight:normal;font-size:14pt;color:maroon } pre {font-family:Consolas,Lucida Console,Monospace;font-size:11pt;margin:0;padding:0.5em;line-height:14pt} .marker {font-weight: bold; color: black;text-decoration: none;} .version {color: gray;} .error {margin-bottom: 10px;} .expandable { text-decoration:underline; font-weight:bold; color:navy; cursor:hand; } @media screen and (max-width: 639px) { pre { width: 440px; overflow: auto; white-space: pre-wrap; word-wrap: break-word; } } @media screen and (max-width: 479px) { pre { width: 280px; } } /style> /head> body bgcolorwhite> span>H1>“/”应用程序中的服务器错误。hr width100% size1 colorsilver>/H1> h2> i>未将对象引用设置到对象的实例。/i> /h2>/span> font faceArial, Helvetica, Geneva, SunSans-Regular, sans-serif > b> 说明: /b>执行当前 Web 请求期间,出现未经处理的异常。请检查堆栈跟踪信息,以了解有关该错误以及代码中导致错误的出处的详细信息。 br>br> b> 异常详细信息: /b>System.NullReferenceException: 未将对象引用设置到对象的实例。br>br> b>源错误:/b> br>br> table width100% bgcolor#ffffcc> tr> td> code>执行当前 Web 请求期间生成了未经处理的异常。可以使用下面的异常堆栈跟踪信息确定有关异常原因和发生位置的信息。/code> /td> /tr> /table> br> b>堆栈跟踪:/b> br>br> table width100% bgcolor#ffffcc> tr> td> code>pre>NullReferenceException: 未将对象引用设置到对象的实例。 XCJOB.fenzhan.fangwen_shouji() +46 XCJOB.fenzhan.IsMobileDevice() +10 WebSite.index.Page_Load(Object sender, EventArgs e) +12 System.Web.Util.CalliEventHandlerDelegateProxy.Callback(Object sender, EventArgs e) +51 System.Web.UI.Control.OnLoad(EventArgs e) +95 System.Web.UI.Control.LoadRecursive() +59 System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) +678/pre>/code> /td> /tr> /table> br> hr width100% size1 colorsilver> b>版本信息:/b> Microsoft .NET Framework 版本:4.0.30319; ASP.NET 版本:4.7.3429.0 /font> /body>/html>!-- NullReferenceException: 未将对象引用设置到对象的实例。 在 XCJOB.fenzhan.fangwen_shouji() 在 XCJOB.fenzhan.IsMobileDevice() 在 WebSite.index.Page_Load(Object sender, EventArgs e) 在 System.Web.Util.CalliEventHandlerDelegateProxy.Callback(Object sender, EventArgs e) 在 System.Web.UI.Control.OnLoad(EventArgs e) 在 System.Web.UI.Control.LoadRecursive() 在 System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint)HttpUnhandledException: 引发类型为“System.Web.HttpUnhandledException”的异常。 在 System.Web.UI.Page.HandleError(Exception e) 在 System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) 在 System.Web.UI.Page.ProcessRequest(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) 在 System.Web.UI.Page.ProcessRequest() 在 System.Web.UI.Page.ProcessRequestWithNoAssert(HttpContext context) 在 System.Web.UI.Page.ProcessRequest(HttpContext context) 在 ASP.index_aspx.ProcessRequest(HttpContext context) 在 System.Web.HttpApplication.CallHandlerExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute() 在 System.Web.HttpApplication.ExecuteStepImpl(IExecutionStep step) 在 System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously)-->!-- 此错误页可能包含敏感信息,因为 ASP.NET 通过 <customErrors modeOff/> 被配置为显示详细错误消息。请考虑在生产环境中使用 <customErrors modeOn/> 或 <customErrors modeRemoteOnly/>。-->
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]