/*
Navicat MySQL Data Transfer

Source Server         : my
Source Server Version : 50540
Source Host           : localhost:3306
Source Database       : autopentest

Target Server Type    : MYSQL
Target Server Version : 50540
File Encoding         : 65001

Date: 2016-06-28 09:00:25
*/

SET FOREIGN_KEY_CHECKS=0;

-- ----------------------------
-- Table structure for `sqlmaptask`
-- ----------------------------
DROP TABLE IF EXISTS `sqlmaptask`;
CREATE TABLE `sqlmaptask` (
  `siteid` varchar(50) DEFAULT NULL,
  `url` varchar(300) DEFAULT NULL,
  `taskid` varchar(50) DEFAULT NULL
) ENGINE=MyISAM DEFAULT CHARSET=utf8;

-- ----------------------------
-- Records of sqlmaptask
-- ----------------------------
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=5', 'ddc60934cca5844e');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/list.php?shuxing=1&attributeid=16', '5641b81da1c3180f');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=7', '577e0e5654ac188b');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://www.harbin.gov.cn/bsfw/hrbly/list-bwg.jsp?urltype=tree.TreeTempUrl&wbtreeid=10230', 'cd8352166d54b316');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/list.php?shuxing=1&attributeid=13', 'e060018aa046bb78');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/list.php?shuxing=1&attributeid=11', '8a29425ab5fe4e33');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/list.php?shuxing=1&attributeid=10', 'b0af931228d4c6c0');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://www.harbin.gov.cn/zwxxgk/zcjd/list.jsp?urltype=tree.TreeTempUrl&wbtreeid=4697', '989baf939d982452');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://www.harbin.gov.cn/zjhrb/tshrb/index.jsp?urltype=tree.TreeTempUrl&wbtreeid=2168', '841dd417134a4dc5');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=8', '09a6c91b444487d6');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/list.php?shuxing=1&attributeid=18', '068bbf8c76b9becd');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=6', 'c9fcbfd3d5171353');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=1', 'fa653d6e21209b06');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://www.harbin.gov.cn/bsfw/hrbly/list-bwg.jsp?urltype=tree.TreeTempUrl&wbtreeid=10212', 'f5a86f2d02e0f860');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://bxt.harbin.gov.cn/more.php?nameid=1&frameid=1&colorid=1', 'f03e5a73f9873e65');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=30', '58806762fdec080a');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://www.harbin.gov.cn/zwxxgk/hrbspxw/list.jsp?urltype=tree.TreeTempUrl&wbtreeid=8751', 'ec90677f5efeb5a4');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=2', 'eddedc368c49bf2a');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=18', 'fb8364e73ef17bbd');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://bxt.harbin.gov.cn/more.php?nameid=0&frameid=0&colorid=0', '44440913d7b6900c');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=15', '1e14654fc6186387');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=14', 'a3480b69159994a1');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=17', '872694edaf7367bb');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=16', 'feb82f9f0d2b76a0');
INSERT INTO `sqlmaptask` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=11', 'b0529c1fc8bfd767');
INSERT INTO `sqlmaptask` VALUES ('2f4f47f1f0024b1c9633b90ecbf846f9', 'http://www.hrbgjj.gov.cn/https://fund.hrbgjj.gov.cn:8443/fund/webSearchInfoAction.do?method=process&dispatch=loan_init', 'd916ddea5679b541');
INSERT INTO `sqlmaptask` VALUES ('920c2968c96f8812d619a0bf02058b09', 'http://gzfw.hljaic.gov.cn:9081/ICPSP/nameApp.html?page=1', 'a4341399e52904d5');
INSERT INTO `sqlmaptask` VALUES ('920c2968c96f8812d619a0bf02058b09', 'http://www.tls.gov.cn/out.do?viewType=outViewIndex', 'ab42d25fe312c44f');
INSERT INTO `sqlmaptask` VALUES ('920c2968c96f8812d619a0bf02058b09', 'http://www.hljgzw.gov.cn/out.do?viewType=outViewIndex', '5ae864ec8e735518');
INSERT INTO `sqlmaptask` VALUES ('68af326d9740aeabcc195b101c577838', 'http://www.hrbczj.gov.cn//gip/app/interview/zxft-pub-ftsl.jsp?zxftid=18e4ef80c00e11e59ea900237dd7671e', '1cbcc173967323b9');
INSERT INTO `sqlmaptask` VALUES ('68af326d9740aeabcc195b101c577838', 'http://zwgk.harbin.gov.cn/index2.htm?classInfoId=966', '55f9dbf484528103');
INSERT INTO `sqlmaptask` VALUES ('68af326d9740aeabcc195b101c577838', 'http://218.8.25.229:8003/welcome.jsp?dq=2301', '1a25a5c14b2c3b2d');
INSERT INTO `sqlmaptask` VALUES ('0be573e74fd9dd0f5df9f7bac9454862', 'http://61.158.99.162:8083/Bill/open_login.do?redirectTo=%2Fmotion%2Fopen_index.do', 'abbb26ad998a42fa');
INSERT INTO `sqlmaptask` VALUES ('0be573e74fd9dd0f5df9f7bac9454862', 'http://115.159.34.152/hljhebrdzx/Login.aspx?Soft=2&login', '3a08c14484b85f8d');
INSERT INTO `sqlmaptask` VALUES ('0be573e74fd9dd0f5df9f7bac9454862', 'http://www.hrbdw.gov.cn/out.do?viewType=outViewIndex4', 'e8dca6abe6ecd2b7');
INSERT INTO `sqlmaptask` VALUES ('0be573e74fd9dd0f5df9f7bac9454862', 'http://115.159.34.152/hljhebrdzx/Login.aspx?Soft=2', 'cfc9da526fc506fe');
INSERT INTO `sqlmaptask` VALUES ('0be573e74fd9dd0f5df9f7bac9454862', 'http://www.bayan.gov.cn/bayan/hrb_bayan/displaysingle.php?sortid=19', '17835813af871f0d');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hljtax.gov.cn/wwqtnew/nry/content.jsp?sort_id=548&xw_id=4964', '43344819f4ed7b22');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/msg/more.php?mid=146&xtype=25146', 'daeff7faaac82e24');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/bszn/more.php?xtype=688&mid=84&p=zwgk&pNavId=2', '2879e306e6b7f8eb');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/law/main.php?i_law_id=200311141248480911', '58106ad592ff0eed');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hljtax.gov.cn/wwqtnew/lby/zcfg_content.jsp?id=59545', '45e1c5bf0cc84544');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hljtax.gov.cn/wwqtnew/lby/zcfg_content.jsp?id=59544', '51d65c90a50b61a5');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hljtax.gov.cn/wwqtnew/lby/zcfg_content.jsp?id=59543', 'cd6a87cc053770b0');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/bszn/more.php?xtype=68238&mid=238&p=zwgk&pNavId=2', '577ab4de1a6eae2d');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/zwgk/more.php?mid=121&xtype=18216&p=zwgk&pNavId=1', '35ecb48411c028ee');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/dsdt/show.php?mid=46&xtype=3846&id=2103', '55ed270c925034e9');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hljtax.gov.cn/wwqtnew/lby/zcfg_content.jsp?id=59548', 'abc7a13f88292c91');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=186&xtype=59186&id=450', '03f988201b9ea336');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=186&xtype=59186&id=451', '907dc60cd74938b3');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=186&xtype=59186&id=452', 'cf2110a25aaec308');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/zwgk/more.php?mid=118&xtype=18118&p=zwgk&pNavId=1', '4a8f52776999392c');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hljtax.gov.cn/wwqtnew/lby/zcfg_content.jsp?id=59420', 'f39503dd6fed90cf');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/ballot/show.php?mid=108&xtype=1108&id=13', '6737cd0f17f23123');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/map/?&pNavId=1', '9d692d5362c4a32e');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/zcfg/more.php?mid=112&xtype=48112&p=zwgk&pNavId=1', '3b421091059e015f');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/project/list.php?&pNavId=118', '5cca10c5dffb89d1');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/wsbs/dowmcenter.php?mid=52&p=bsfw&pNavId=2', 'dbaa7340e25c1309');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/dialog/object.php?obJectID=eb62a7712eca018e325a541157ddf757', '85bd54ddfd480d3e');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hljtax.gov.cn/wwqtnew/wsbs/wsbs_bsfwt.jsp?&pNavId=2', '9ab3b99afafb3d79');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hljtax.gov.cn/wwqtnew/lby/../nry/content.jsp?sort_id=601&xw_id=5102', '13df56453a3a01cc');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hljtax.gov.cn/wwqtnew/lby/../nry/content.jsp?sort_id=601&xw_id=5103', '652cb2667ff47f18');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/dialog/?mid=20&p=gzcy&pNavId=5', '42e80742c7b7bd0e');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hljtax.gov.cn/wwqtnew/lby/../nry/content.jsp?sort_id=601&xw_id=5101', '5c3f15b2e95e1d1a');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/mod/ballot/show.php?mid=108&xtype=1108&id=14', '52ad01fe31363bb3');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hljtax.gov.cn/wwqtnew/lby/../nry/content.jsp?sort_id=601&xw_id=5100', '38709880d3b096fc');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/site/?sid=230186', 'c3e82fba807efdc4');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/site/?sid=230184', 'cd3846cd7b8fd365');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/site/?sid=230185', '2eb8b27e88acadf9');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/site/?sid=230182', '9e1f7bcaaddf52c1');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/site/?sid=230183', '4a31888c19a5ab9e');
INSERT INTO `sqlmaptask` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn//web/site/?sid=230181', 'f72f8745a1d72632');
INSERT INTO `sqlmaptask` VALUES ('9f5fb7d3fef55d77e8685b047a01650f', 'http://www.hzwzcx.com/wzcx.html?em=bdsswz1', '66b0a326e67bc58b');
INSERT INTO `sqlmaptask` VALUES ('9f5fb7d3fef55d77e8685b047a01650f', 'http://www.hzwzcx.com/wzcx.html?em=bdsswz1', '5495c542a06140ed');
INSERT INTO `sqlmaptask` VALUES ('35c8193d1bbce40fd9e0412c5453054b', 'http://www.jxedz.gov.cn/ index.php?id=243', '16bb3afa066a88dc');
INSERT INTO `sqlmaptask` VALUES ('35c8193d1bbce40fd9e0412c5453054b', 'http://www.jxedz.gov.cn//news.php?id=15453', '3c9c132b8005d6e9');
INSERT INTO `sqlmaptask` VALUES ('35c8193d1bbce40fd9e0412c5453054b', 'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=5', 'bf482a202b907961');
INSERT INTO `sqlmaptask` VALUES ('35c8193d1bbce40fd9e0412c5453054b', 'http://www.jxedz.gov.cn//news.php?id=1550', '290969a5fd6e6c12');
INSERT INTO `sqlmaptask` VALUES ('35c8193d1bbce40fd9e0412c5453054b', 'http://www.jxedz.gov.cn//news.php?id=15455', '1f6c57c6ab67e1fb');
INSERT INTO `sqlmaptask` VALUES ('35c8193d1bbce40fd9e0412c5453054b', 'http://www.jxedz.gov.cn//news.php?id=15489', '3bdd524921c64c72');
INSERT INTO `sqlmaptask` VALUES ('35c8193d1bbce40fd9e0412c5453054b', 'http://www.jxedz.gov.cn//news.php?id=15488', 'ed53834ec95de4f2');
INSERT INTO `sqlmaptask` VALUES ('35c8193d1bbce40fd9e0412c5453054b', 'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=4', 'ecd162c2f6f9c95b');
INSERT INTO `sqlmaptask` VALUES ('35c8193d1bbce40fd9e0412c5453054b', 'http://www.jxedz.gov.cn//index.php?id=259', '1b1c40147e01fcab');
INSERT INTO `sqlmaptask` VALUES ('35c8193d1bbce40fd9e0412c5453054b', 'http://www.jxedz.gov.cn//news.php?id=15483', '4b11b255a7d7125a');
INSERT INTO `sqlmaptask` VALUES ('0b927034c04aa1dce339f455fd2be5dc', 'http://bbs.mas.gov.cn/forum.php?mod=forumdisplay&fid=42', 'da5f616b2da9eb1d');

-- ----------------------------
-- Table structure for `sqlmaptask_info`
-- ----------------------------
DROP TABLE IF EXISTS `sqlmaptask_info`;
CREATE TABLE `sqlmaptask_info` (
  `taskid` varchar(50) DEFAULT NULL,
  `tasklog` text,
  `taskdata` varchar(9000) DEFAULT NULL
) ENGINE=MyISAM DEFAULT CHARSET=utf8;

-- ----------------------------
-- Records of sqlmaptask_info
-- ----------------------------
INSERT INTO `sqlmaptask_info` VALUES ('ddc60934cca5844e', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:13\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:15\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:18\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:21\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:22\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:28\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:28\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:32\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:33\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:35\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:37\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:38\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:42\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:45\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:50\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:53\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:01\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:02\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:02\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:03\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:05\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:05\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:05\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:06\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:09\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:13\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:13\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:14\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:22\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:23\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:24\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:25\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"21:58:27\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:27\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('5641b81da1c3180f', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:11\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:13\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:16\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:20\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:20\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:21\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:22\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:22\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:24\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:27\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:40\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:48\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:48\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:54\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:57\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:01\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:01\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:02\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:06\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:06\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:10\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:10\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:11\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:12\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:12\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:16\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:16\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:17\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:18\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:25\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:25\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:26\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"21:58:32\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:33\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('8a29425ab5fe4e33', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:13\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:15\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:21\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:24\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:25\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:27\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:27\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:27\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:27\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:30\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:31\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:40\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:49\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:52\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:53\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:58\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:03\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:10\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:16\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:17\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:20\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:24\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:29\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:39\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:40\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:48\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:49\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:52\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:53\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:53\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:54\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:54\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"21:58:54\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:54\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('ddc60934cca5844e', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:13\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:15\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:18\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:21\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:22\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:28\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:28\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:32\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:33\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:35\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:37\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:38\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:42\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:45\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:50\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:53\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:01\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:02\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:02\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:03\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:05\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:05\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:05\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:06\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:09\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:13\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:13\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:14\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:22\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:23\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:24\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:25\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"21:58:27\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:27\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('ddc60934cca5844e', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:13\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:15\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:18\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:21\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:22\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:28\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:28\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:32\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:33\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:35\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:37\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:38\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:42\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:45\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:50\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:53\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:01\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:02\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:02\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:03\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:05\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:05\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:05\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:06\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:09\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:13\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:13\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:14\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:22\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:23\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:24\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:25\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"21:58:27\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:27\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('09a6c91b444487d6', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:16\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:16\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:23\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:23\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:26\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:30\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:30\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:32\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:34\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:37\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:39\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:44\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:47\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:48\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:49\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:50\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:53\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:02\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:03\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:06\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:06\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:09\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:19\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:25\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:28\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:31\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:42\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:45\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:51\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:57\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:57\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:59:01\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"21:59:02\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:59:02\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('f03e5a73f9873e65', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:16\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:18\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:18\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:19\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:31\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:32\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:32\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:36\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:38\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:39\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:39\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:40\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:40\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:40\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:41\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:51\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:52\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:54\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:55\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:00\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:03\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:04\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:13\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:20\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:21\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:23\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:28\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:29\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:30\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:32\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:34\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:34\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"21:58:36\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:58:36\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('44440913d7b6900c', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:17\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:17\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:17\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:18\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:31\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:32\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:37\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:41\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:57:43\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:47\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:57:53\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:00\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:00\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:04\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:07\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:12\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:13\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:26\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:48\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:50\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:50\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:57\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:57\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:57\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:58\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:58:58\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:59:04\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:59:06\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:59:09\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:59:10\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"21:59:10\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:59:11\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"21:59:11\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"21:59:11\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('d916ddea5679b541', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:10\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:10\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:10\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:11\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:11\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:16\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:16\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"22:18:16\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:17\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('d916ddea5679b541', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:10\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:10\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:10\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:11\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:11\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:16\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:16\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"22:18:16\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:17\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('a4341399e52904d5', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:20:19\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:19\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:20:19\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:19\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:20\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:21\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:21\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:21\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:20:21\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:22\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:22\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:22\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:22\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:23\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:23\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:23\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:25\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:25\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:25\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:25\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:25\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:25\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:26\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:26\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:26\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:26\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:27\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:27\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:27\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:20:27\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:20:28\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:20:29\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"22:20:29\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:20:29\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('1cbcc173967323b9', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:33\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:34\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:34\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:35\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:35\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:35\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:35\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:39\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:39\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:39\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:39\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:40\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:40\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:41\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:41\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:41\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:42\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:42\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:42\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:43\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:43\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:44\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:45\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:45\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:46\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:46\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:47\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:47\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:47\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:47\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:48\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:48\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"22:39:48\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:49\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('1cbcc173967323b9', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:33\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:34\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:34\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:35\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:35\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:35\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:35\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:39\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:39\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:39\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:39\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:40\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:40\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:41\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:41\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:41\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:42\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:42\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:42\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:43\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:43\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:44\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:45\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:45\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:46\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:46\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:47\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:47\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:47\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:47\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:48\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:48\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"22:39:48\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:49\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('d916ddea5679b541', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:10\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:10\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:10\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:11\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:11\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:12\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:13\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:14\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:15\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:18:16\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:16\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"22:18:16\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:18:17\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('1a25a5c14b2c3b2d', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:34\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:34\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:35\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:35\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:36\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:36\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:36\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:36\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:36\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:37\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:37\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:38\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:38\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:38\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:38\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:39\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:41\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:42\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:42\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:43\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:43\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:43\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:44\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:44\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:44\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:45\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:46\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:46\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:47\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:47\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:47\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:48\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"22:39:48\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:48\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('55f9dbf484528103', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:34\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:34\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:35\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:35\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:36\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:36\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:37\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:37\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:37\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:37\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:38\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:38\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:38\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:38\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:39\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:39\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:39\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:40\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:40\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:40\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:40\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:41\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:41\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:41\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:42\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:42\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:43\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:44\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:45\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:45\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:39:45\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:46\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"22:39:46\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:39:46\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('17835813af871f0d', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:45:44\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:44\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:45:45\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:45\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:48\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:48\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:49\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:49\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:45:49\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:50\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:53\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:53\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:53\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:54\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:55\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:55\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:56\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:56\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:56\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:56\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:57\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:45:59\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:46:01\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:46:01\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:46:03\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:46:03\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:46:04\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:46:05\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:46:05\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:46:05\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"22:46:06\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:46:06\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"22:46:06\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"22:46:06\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');
INSERT INTO `sqlmaptask_info` VALUES ('5495c542a06140ed', '{\n    \"log\": [\n        {\n            \"message\": \"you\'ve provided target URL without any GET parameters (e.g. www.site.com/article.php?id=1) and without providing any POST parameters through --data option\", \n            \"level\": \"WARNING\", \n            \"time\": \"07:04:21\"\n        }, \n        {\n            \"message\": \"testing connection to the target URL\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:21\"\n        }, \n        {\n            \"message\": \"the web server responded with an HTTP error code (405) which could interfere with the results of the tests\", \n            \"level\": \"WARNING\", \n            \"time\": \"07:04:22\"\n        }, \n        {\n            \"message\": \"testing if the target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:22\"\n        }, \n        {\n            \"message\": \"target URL is stable\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:22\"\n        }, \n        {\n            \"message\": \"testing if URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:23\"\n        }, \n        {\n            \"message\": \"confirming that URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:23\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is dynamic\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:23\"\n        }, \n        {\n            \"message\": \"heuristic (basic) test shows that URI parameter \'#1*\' might not be injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"07:04:23\"\n        }, \n        {\n            \"message\": \"testing for SQL injection on URI parameter \'#1*\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:23\"\n        }, \n        {\n            \"message\": \"testing \'AND boolean-based blind - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:23\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 boolean-based blind - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:24\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:24\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:24\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:24\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND error-based - WHERE or HAVING clause (XMLType)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:24\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0 error-based - Parameter replace\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:24\"\n        }, \n        {\n            \"message\": \"testing \'MySQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:25\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:25\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase inline queries\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:25\"\n        }, \n        {\n            \"message\": \"testing \'MySQL > 5.0.11 stacked queries (SELECT - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:25\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:25\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase stacked queries (comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:25\"\n        }, \n        {\n            \"message\": \"testing \'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:26\"\n        }, \n        {\n            \"message\": \"testing \'MySQL >= 5.0.12 AND time-based blind (SELECT)\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:26\"\n        }, \n        {\n            \"message\": \"testing \'PostgreSQL > 8.1 AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:26\"\n        }, \n        {\n            \"message\": \"testing \'Microsoft SQL Server/Sybase time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:26\"\n        }, \n        {\n            \"message\": \"testing \'Oracle AND time-based blind\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:26\"\n        }, \n        {\n            \"message\": \"testing \'Generic UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:27\"\n        }, \n        {\n            \"message\": \"using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option \'--dbms\'\", \n            \"level\": \"WARNING\", \n            \"time\": \"07:04:27\"\n        }, \n        {\n            \"message\": \"testing \'MySQL UNION query (NULL) - 1 to 10 columns\'\", \n            \"level\": \"INFO\", \n            \"time\": \"07:04:27\"\n        }, \n        {\n            \"message\": \"URI parameter \'#1*\' is not injectable\", \n            \"level\": \"WARNING\", \n            \"time\": \"07:04:28\"\n        }, \n        {\n            \"message\": \"all tested parameters appear to be not injectable. Try to increase \'--level\'/\'--risk\' values to perform more tests. Also, you can try to rerun by providing either a valid value for option \'--string\' (or \'--regexp\') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option \'--tamper\' (e.g. \'--tamper=space2comment\')\", \n            \"level\": \"CRITICAL\", \n            \"time\": \"07:04:28\"\n        }, \n        {\n            \"message\": \"HTTP error codes detected during run:\\n404 (Not Found) - 222 times, 405 (Method Not Allowed) - 3 times\", \n            \"level\": \"WARNING\", \n            \"time\": \"07:04:28\"\n        }\n    ], \n    \"success\": true\n}', '{\n    \"data\": [], \n    \"success\": true, \n    \"error\": []\n}');

-- ----------------------------
-- Table structure for `target_baseinfo`
-- ----------------------------
DROP TABLE IF EXISTS `target_baseinfo`;
CREATE TABLE `target_baseinfo` (
  `id` varchar(50) DEFAULT NULL,
  `url` varchar(50) DEFAULT NULL,
  `collect_urls` varchar(8000) DEFAULT NULL,
  `collect_ips` varchar(1000) DEFAULT NULL,
  `collect_dirs` varchar(8000) DEFAULT NULL,
  `ports` varchar(2000) DEFAULT NULL,
  `subdomain` text
) ENGINE=MyISAM DEFAULT CHARSET=utf8;

-- ----------------------------
-- Records of target_baseinfo
-- ----------------------------
INSERT INTO `target_baseinfo` VALUES ('e31258c2c3dd45d4256a577fc7d5b55a', 'http://www.harbin.gov.cn/', '[u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=5\', u\'http://hd.harbin.gov.cn/zfw_grqybs/list.php?shuxing=1&attributeid=16\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=7\', u\'http://www.harbin.gov.cn/bsfw/hrbly/list-bwg.jsp?urltype=tree.TreeTempUrl&wbtreeid=10230\', u\'http://hd.harbin.gov.cn/zfw_grqybs/list.php?shuxing=1&attributeid=13\', u\'http://hd.harbin.gov.cn/zfw_grqybs/list.php?shuxing=1&attributeid=11\', u\'http://hd.harbin.gov.cn/zfw_grqybs/list.php?shuxing=1&attributeid=10\', u\'http://www.harbin.gov.cn/zwxxgk/zcjd/list.jsp?urltype=tree.TreeTempUrl&wbtreeid=4697\', u\'http://www.harbin.gov.cn/zjhrb/tshrb/index.jsp?urltype=tree.TreeTempUrl&wbtreeid=2168\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=8\', u\'http://hd.harbin.gov.cn/zfw_grqybs/list.php?shuxing=1&attributeid=18\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=6\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=1\', u\'http://www.harbin.gov.cn/bsfw/hrbly/list-bwg.jsp?urltype=tree.TreeTempUrl&wbtreeid=10212\', u\'http://bxt.harbin.gov.cn/more.php?nameid=1&frameid=1&colorid=1\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=30\', u\'http://www.harbin.gov.cn/zwxxgk/hrbspxw/list.jsp?urltype=tree.TreeTempUrl&wbtreeid=8751\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=2\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=18\', u\'http://bxt.harbin.gov.cn/more.php?nameid=0&frameid=0&colorid=0\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=15\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=14\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=17\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=16\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=11\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=10\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=13\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=12\', u\'http://hd.harbin.gov.cn/zfw_grqybs/list.php?shuxing=1&attributeid=22\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=24\', u\'http://bxt.harbin.gov.cn/more.php?nameid=0&frameid=0\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=9\', u\'http://hd.harbin.gov.cn/zfw_grqybs/list.php?shuxing=1&attributeid=2\', u\'http://www.harbin.gov.cn/bsfw/shfw/cxfu_list.jsp?urltype=tree.TreeTempUrl&wbtreeid=2611\', u\'http://hd.harbin.gov.cn/zfw_grqybs/list.php?shuxing=1&attributeid=5\', u\'http://www.harbin.gov.cn/zjhrb/ghlc/index.jsp?urltype=tree.TreeTempUrl&wbtreeid=2314\', u\'http://hd.harbin.gov.cn/zfw_grqybs/list.php?shuxing=1&attributeid=8\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=21\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=4\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=25\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=26\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=27\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=20\', u\'http://www.hrbls.org/Sincerity/Default.aspx?Type=0&Kind=0\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=22\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=23\', u\'http://www.hrblyj.com.cn/home.do?event=init\', u\'http://hd.harbin.gov.cn/zfw_grqybs/listqy.php?shuxing=2&author=28\', u\'http://bxt.harbin.gov.cn/more.php?nameid=2&frameid=2&colorid=2\', u\'http://www.harbin.gov.cn/zwxxgk/rdzt/list.jsp?urltype=tree.TreeTempUrl&wbtreeid=1002\']', '[\'61.158.105.84\', \'222.171.236.76\', \'222.171.204.18\', \'218.10.227.7\', \'218.9.149.56\', \'218.10.239.146\', \'218.9.149.53\', \'61.158.99.162\', \'221.212.153.203\', \'61.158.105.11\']', '[u\'http://www.harbin.gov.cn/.bak\', u\'http://www.harbin.gov.cn/.bashrc\', u\'http://www.harbin.gov.cn/.bashrc/\']', '[None, None, None, None, None, \'[+]80/tcp open[+] HTTP/1.1 400 Bad Request\\r\\nConnection: close\\r\\nContent-Type: text/html\\r\\nContent-Length: 170\\r\\n\\r\\n<HTML><\', None, None, None, None, None, None, None, None, None]', '[u\'http://bayanzfw.harbin.gov.cn\', u\'http://bgt.harbin.gov.cn\', u\'http://bingdeng.harbin.gov.cn\', u\'http://binxianzfw.harbin.gov.cn\', u\'http://cb.harbin.gov.cn\', u\'http://daolizfw.harbin.gov.cn\', u\'http://dqw.harbin.gov.cn\', u\'http://fb.harbin.gov.cn\', u\'http://fgw.harbin.gov.cn\', u\'http://fpc.harbin.gov.cn\', u\'http://gcjs.harbin.gov.cn\', u\'http://harbin.gov.cn\', u\'http://hb.harbin.gov.cn\', u\'http://hd.harbin.gov.cn\', u\'http://hrbzfwyh.harbin.gov.cn\', u\'http://hulanzfw.harbin.gov.cn\', u\'http://iem.harbin.gov.cn\', u\'http://jfztc.harbin.gov.cn\', u\'http://mab.harbin.gov.cn\', u\'http://nangangzfw.harbin.gov.cn\', u\'http://nrab.harbin.gov.cn\', u\'http://os.harbin.gov.cn\', u\'http://shangzhizfw.harbin.gov.cn\', u\'http://sme.harbin.gov.cn\', u\'http://ta.harbin.gov.cn\', u\'http://tonghezfw.harbin.gov.cn\', u\'http://xzfwzx.harbin.gov.cn\', u\'http://zf.harbin.gov.cn\', u\'http://yilanzfw.harbin.gov.cn\', u\'http://www.harbin.gov.cn\', u\'http://wuchangzfw.harbin.gov.cn\', u\'http://th.harbin.gov.cn\', u\'http://tb.harbin.gov.cn\', u\'http://songbeizfw.harbin.gov.cn\', u\'http://photo.harbin.gov.cn\', u\'http://mulanzfw.harbin.gov.cn\', u\'http://lb.harbin.gov.cn\', u\'http://fangzhengzfw.harbin.gov.cn\', u\'http://bxt.harbin.gov.cn\', u\'http://achengzfw.harbin.gov.cn\', u\'http://ab.harbin.gov.cn\', u\'http://zxft.harbin.gov.cn\', u\'http://zwgk.harbin.gov.cn\']');
INSERT INTO `target_baseinfo` VALUES ('2f4f47f1f0024b1c9633b90ecbf846f9', 'http://www.hrbgjj.gov.cn/', '[u\'http://www.hrbgjj.gov.cn/https://fund.hrbgjj.gov.cn:8443/fund/webSearchInfoAction.do?method=process&dispatch=loan_init\']', '[\'50.19.220.213\']', '[]', '[\'[-]21/tcp closed\', \'[-]22/tcp closed\', \'[-]23/tcp closed\', \'[-]25/tcp closed\', \'[-]53/tcp closed\', \'[+]80/tcp open[+] <!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\\n<html><head>\\n<title>403 Forbidden</title>\\n</head>\', \'[-]389/tcp closed\', \'[-]8080/tcp closed\', \'[-]1433/tcp closed\', \'[-]2375/tcp closed\', \'[+]3306/tcp open[+] 4\\x00\\x00\\x00\\n5.1.33\\x00\\x9f\\x10\\x05\\x00/&ny8HCV\\x00\\xff\\xf7!\\x02\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00du?zhzLM}QYJ\\x00\', \'[-]3389/tcp closed\', \'[-]6379/tcp closed\', \'[-]11211/tcp closed\', \'[-]27017/tcp closed\']', '[u\'http://cs.hrbgjj.gov.cn\', u\'http://hrbgjj.gov.cn\', u\'http://kgkgbfd1xncb.hrbgjj.gov.cn\', u\'http://www.hrbgjj.gov.cn\']');
INSERT INTO `target_baseinfo` VALUES ('920c2968c96f8812d619a0bf02058b09', 'http://www.hljzwzx.gov.cn/', '[u\'http://gzfw.hljaic.gov.cn:9081/ICPSP/nameApp.html?page=1\', u\'http://www.tls.gov.cn/out.do?viewType=outViewIndex\', u\'http://www.hljgzw.gov.cn/out.do?viewType=outViewIndex\']', '[\'218.10.65.237\', \'1.63.18.108\', \'9.0.45.0\', \'221.212.120.27\', \'1.189.195.100\', \'1.189.195.99\']', '[u\'http://www.hljzwzx.gov.cn/admin/login.jsp\', u\'http://www.hljzwzx.gov.cn/admin/login.do\']', '[\'[-]21/tcp closed\', \'[-]22/tcp closed\', \'[-]23/tcp closed\', \'[-]25/tcp closed\', \'[-]53/tcp closed\', \'[+]80/tcp open[+] HTTP/1.1 400 Bad Request\\r\\nDate: Sat, 25 Jun 2016 14:38:32 GMT\\r\\nContent-Type: text/html\\r\\nContent-Leng\', \'[-]389/tcp closed\', \'[-]8080/tcp closed\', \'[-]1433/tcp closed\', \'[-]2375/tcp closed\', \'[-]3306/tcp closed\', \'[-]3389/tcp closed\', \'[-]6379/tcp closed\', \'[-]11211/tcp closed\', \'[-]27017/tcp closed\']', '[u\'http://hljzwzx.gov.cn\', u\'http://www.hljzwzx.gov.cn\', u\'http://gkml.hljzwzx.gov.cn\']');
INSERT INTO `target_baseinfo` VALUES ('061b9bbd287dc7ae5f8402721298807d', 'http://www.hrbcgs.gov.cn/', '[]', '[]', '[]', '[\'[-]21/tcp closed\', \'[-]22/tcp closed\', \'[+]23/tcp open[+] \\xff\\xfd\\x01\\xff\\xfd\\x1f\\xff\\xfb\\x01\\xff\\xfb\\x03\', \'[-]25/tcp closed\', \'[-]53/tcp closed\', \'[+]80/tcp open[+] <html>\\r\\n<head><title>400 Bad Request</title></head>\\r\\n<body bgcolor=\"white\">\\r\\n<center><h1>400 Bad Req\', \'[-]389/tcp closed\', \'[+]8080/tcp open[+] HTTP/1.1 400 Bad Request\\r\\nServer: Apache-Coyote/1.1\\r\\nDate: Sat, 25 Jun 2016 14:36:18 GMT\\r\\nConnection\', \'[-]1433/tcp closed\', \'[-]2375/tcp closed\', \'[-]3306/tcp closed\', \'[-]3389/tcp closed\', \'[-]6379/tcp closed\', \'[-]11211/tcp closed\', \'[-]27017/tcp closed\']', '[u\'http://hrbcgs.gov.cn\', u\'http://www.hrbcgs.gov.cn\']');
INSERT INTO `target_baseinfo` VALUES ('d738dfd01104e26be66a21b98404ff60', 'http://www.hrbgtj.gov.cn/', '[u\'http://www.hrbgtj.gov.cn//ContextShow/index.htm?/hrbweb/zxzx.action?status=1&pageSize=15&sayclass=3&pageNum=0\', u\'http://www.huhhot.gov.cn/wbj/home/index.asp?dw=hhht_11\', u\'http://www.aili.com/?aoyou\', u\'http://www.hrbgtj.gov.cn/vote.jspx?voteId=20\', u\'http://218.9.149.53:9005/touch3/jsp/fwxm_detail.jsp?cj=1&grqy=2&fl_id=36&type=%25E5%259C%259F%25E5%259C%25B0%25E6%2588%25BF%25E4%25BA%25A7\', u\'http://weibo.com/5466269998/profile?topnav=1&wvr=6#!/p/1001065466269998/home?from=page_100106&mod=TAB#place\', u\'http://www.hrbgtj.gov.cn//vote_result.jspx?voteId=20\', u\'http://www.hrbgtj.gov.cn//ContextShow/index.htm?/hrbweb/tszx.action?status=1&pageSize=15&sayclass=2&pageNum=0\', u\'http://www.hrbgtj.gov.cn//ContextShow/index.htm?/hrbweb/jzxx.action?status=1&pageSize=15&sayclass=1&pageNum=0\', u\'http://www.dangdang.com/?_ddclickunion=P-303956-V3|ad_type=10|sys_id=1#dd_refer=\', u\'http://cn.yahoo.com/?f=E59_38_18\', u\'http://www.hrbgtj.gov.cn//ContextShow/index.htm?/hrbweb/businesslist.action?pageSize=15&itemid=JS120000GT-QR-0003\']', '[\'61.167.104.185\', \'218.9.29.201\', \'218.9.149.53\', \'8.0.35.0\', \'221.212.115.13\']', '[]', '[\'[-]21/tcp closed\', \'[-]22/tcp closed\', \'[-]23/tcp closed\', \'[-]25/tcp closed\', \'[-]53/tcp closed\', \'[-]80/tcp closed\', \'[-]389/tcp closed\', \'[-]8080/tcp closed\', \'[-]1433/tcp closed\', \'[-]2375/tcp closed\', \'[-]3306/tcp closed\', \'[-]3389/tcp closed\', \'[-]6379/tcp closed\', \'[-]11211/tcp closed\', \'[-]27017/tcp closed\']', '[u\'http://dcjyzx.hrbgtj.gov.cn\', u\'http://hrbgtj.gov.cn\', u\'http://kcghy.hrbgtj.gov.cn\', u\'http://ngfj.hrbgtj.gov.cn\', u\'http://pffj.hrbgtj.gov.cn\', u\'http://tdzlzx.hrbgtj.gov.cn\', u\'http://tyzdgzz.hrbgtj.gov.cn\', u\'http://dj.cn.hrbgtj.gov.cn\', u\'http://xffj.hrbgtj.gov.cn\', u\'http://www.hrbgtj.gov.cn\']');
INSERT INTO `target_baseinfo` VALUES ('cae05788d91e4d36f062a6ef0e4116bc', 'http://www.hrblz.gov.cn/', '[u\'http://www.hebxn.gov.cn/index.do?templet=index\', u\'http://www.hrbdw.gov.cn/out.do?viewType=outViewIndex\', u\'http://www.hnsjct.gov.cn/viewpage?path=/index.html\']', '[\'61.158.105.84\', \'218.10.239.146\']', '[u\'http://www.hrblz.gov.cn/index.html\', u\'http://www.hrblz.gov.cn/app\']', '[\'[-]21/tcp closed\', \'[-]22/tcp closed\', \'[-]23/tcp closed\', \'[-]25/tcp closed\', \'[-]53/tcp closed\', \'[+]80/tcp open[+] HTTP/1.1 400 Bad Request\\r\\nServer: Apache-Coyote/1.1\\r\\nTransfer-Encoding: chunked\\r\\nDate: Sat, 25 Jun 2\', \'[-]389/tcp closed\', \'[-]8080/tcp closed\', \'[-]1433/tcp closed\', \'[-]2375/tcp closed\', \'[-]3306/tcp closed\', \'[-]3389/tcp closed\', \'[-]6379/tcp closed\', \'[-]11211/tcp closed\', \'[-]27017/tcp closed\']', '[u\'http://www.hrblz.gov.cn\', u\'http://hrblz.gov.cn\']');
INSERT INTO `target_baseinfo` VALUES ('68af326d9740aeabcc195b101c577838', 'http://www.hrbczj.gov.cn/', '[u\'http://www.hrbczj.gov.cn//gip/app/interview/zxft-pub-ftsl.jsp?zxftid=18e4ef80c00e11e59ea900237dd7671e\', u\'http://zwgk.harbin.gov.cn/index2.htm?classInfoId=966\', u\'http://218.8.25.229:8003/welcome.jsp?dq=2301\']', '[\'218.8.25.229\']', '[]', '[\'[-]21/tcp closed\', \'[-]22/tcp closed\', \'[-]23/tcp closed\', \'[-]25/tcp closed\', \'[-]53/tcp closed\', \'[+]80/tcp open[+] <html>\\n<head><title>501 Method not implemented</title></head>\\n<body>\\n<h1>501 Method not implemented<\', \'[-]389/tcp closed\', \'[-]8080/tcp closed\', \'[-]1433/tcp closed\', \'[-]2375/tcp closed\', \'[-]3306/tcp closed\', \'[-]3389/tcp closed\', \'[-]6379/tcp closed\', \'[-]11211/tcp closed\', \'[-]27017/tcp closed\']', '[u\'http://hrbczj.gov.cn\', u\'http://www.hrbczj.gov.cn\']');
INSERT INTO `target_baseinfo` VALUES ('0be573e74fd9dd0f5df9f7bac9454862', 'http://www.hrbzx.gov.cn/', '[u\'http://61.158.99.162:8083/Bill/open_login.do?redirectTo=%2Fmotion%2Fopen_index.do\', u\'http://115.159.34.152/hljhebrdzx/Login.aspx?Soft=2&login\', u\'http://www.hrbdw.gov.cn/out.do?viewType=outViewIndex4\', u\'http://115.159.34.152/hljhebrdzx/Login.aspx?Soft=2\', u\'http://www.bayan.gov.cn/bayan/hrb_bayan/displaysingle.php?sortid=19\']', '[\'115.159.34.152\', \'61.158.99.162\']', '[]', '[\'[-]21/tcp closed\', \'[-]22/tcp closed\', \'[-]23/tcp closed\', \'[-]25/tcp closed\', \'[-]53/tcp closed\', \'[-]80/tcp closed\', \'[-]389/tcp closed\', \'[-]8080/tcp closed\', \'[-]1433/tcp closed\', \'[-]2375/tcp closed\', \'[-]3306/tcp closed\', \'[-]3389/tcp closed\', \'[-]6379/tcp closed\', \'[-]11211/tcp closed\', \'[-]27017/tcp closed\']', '[u\'http://hrbzx.gov.cn\', u\'http://www.hrbzx.gov.cn\']');
INSERT INTO `target_baseinfo` VALUES ('6dea922f50e40b5dcf7f517ebeeaafee', 'http://www.hrbtax.gov.cn/', '[u\'http://www.hljtax.gov.cn/wwqtnew/nry/content.jsp?sort_id=548&xw_id=4964\', u\'http://www.hrbtax.gov.cn//web/mod/msg/more.php?mid=146&xtype=25146\', u\'http://www.hrbtax.gov.cn//web/mod/bszn/more.php?xtype=688&mid=84&p=zwgk&pNavId=2\', u\'http://www.hrbtax.gov.cn//web/law/main.php?i_law_id=200311141248480911\', u\'http://www.hljtax.gov.cn/wwqtnew/lby/zcfg_content.jsp?id=59545\', u\'http://www.hljtax.gov.cn/wwqtnew/lby/zcfg_content.jsp?id=59544\', u\'http://www.hljtax.gov.cn/wwqtnew/lby/zcfg_content.jsp?id=59543\', u\'http://www.hrbtax.gov.cn//web/mod/bszn/more.php?xtype=68238&mid=238&p=zwgk&pNavId=2\', u\'http://www.hrbtax.gov.cn//web/mod/zwgk/more.php?mid=121&xtype=18216&p=zwgk&pNavId=1\', u\'http://www.hrbtax.gov.cn//web/mod/dsdt/show.php?mid=46&xtype=3846&id=2103\', u\'http://www.hljtax.gov.cn/wwqtnew/lby/zcfg_content.jsp?id=59548\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=186&xtype=59186&id=450\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=186&xtype=59186&id=451\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=186&xtype=59186&id=452\', u\'http://www.hrbtax.gov.cn//web/mod/zwgk/more.php?mid=118&xtype=18118&p=zwgk&pNavId=1\', u\'http://www.hljtax.gov.cn/wwqtnew/lby/zcfg_content.jsp?id=59420\', u\'http://www.hrbtax.gov.cn//web/mod/ballot/show.php?mid=108&xtype=1108&id=13\', u\'http://www.hrbtax.gov.cn//web/map/?&pNavId=1\', u\'http://www.hrbtax.gov.cn//web/mod/zcfg/more.php?mid=112&xtype=48112&p=zwgk&pNavId=1\', u\'http://www.hrbtax.gov.cn//web/mod/project/list.php?&pNavId=118\', u\'http://www.hrbtax.gov.cn//web/mod/wsbs/dowmcenter.php?mid=52&p=bsfw&pNavId=2\', u\'http://www.hrbtax.gov.cn//web/mod/dialog/object.php?obJectID=eb62a7712eca018e325a541157ddf757\', u\'http://www.hljtax.gov.cn/wwqtnew/wsbs/wsbs_bsfwt.jsp?&pNavId=2\', u\'http://www.hljtax.gov.cn/wwqtnew/lby/../nry/content.jsp?sort_id=601&xw_id=5102\', u\'http://www.hljtax.gov.cn/wwqtnew/lby/../nry/content.jsp?sort_id=601&xw_id=5103\', u\'http://www.hrbtax.gov.cn//web/mod/dialog/?mid=20&p=gzcy&pNavId=5\', u\'http://www.hljtax.gov.cn/wwqtnew/lby/../nry/content.jsp?sort_id=601&xw_id=5101\', u\'http://www.hrbtax.gov.cn//web/mod/ballot/show.php?mid=108&xtype=1108&id=14\', u\'http://www.hljtax.gov.cn/wwqtnew/lby/../nry/content.jsp?sort_id=601&xw_id=5100\', u\'http://www.hrbtax.gov.cn//web/site/?sid=230186\', u\'http://www.hrbtax.gov.cn//web/site/?sid=230184\', u\'http://www.hrbtax.gov.cn//web/site/?sid=230185\', u\'http://www.hrbtax.gov.cn//web/site/?sid=230182\', u\'http://www.hrbtax.gov.cn//web/site/?sid=230183\', u\'http://www.hrbtax.gov.cn//web/site/?sid=230181\', u\'http://www.hrbtax.gov.cn//web/mod/video/show.php?mid=44&xtype=4144&id=97\', u\'http://www.hrbtax.gov.cn//web/mod/video/show.php?mid=44&xtype=4144&id=96\', u\'http://www.hrbtax.gov.cn//web/mod/video/show.php?mid=44&xtype=4144&id=95\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/more.php?mid=62&xtype=5962&p=ssxc&pNavId=118\', u\'http://www.hrbtax.gov.cn//web/mod/taxes_search/more.php?mid=227&xtype=52227&p=bsfw&pNavId=2\', u\'http://www.hrbtax.gov.cn//web/mod/video/show.php?mid=44&xtype=4144&id=99\', u\'http://www.hrbtax.gov.cn//web/mod/video/show.php?mid=44&xtype=4144&id=98\', u\'http://www.hljtax.gov.cn/wwqtnew/lby/zcfg_content.jsp?id=59541\', u\'http://www.hrbtax.gov.cn//web/mod/bfzn/more.php?xtype=240242&mid=242&p=bsfw&pNavId=2\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=61&xtype=5961&id=1002\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=61&xtype=5961&id=13\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=61&xtype=5961&id=12\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/more.php?mid=60&xtype=5960\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=61&xtype=5961&id=15\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=61&xtype=5961&id=14\', u\'http://www.hrbtax.gov.cn/web/mod/dialog/object.php?obJectID=c738db44e786149e88cb074a9654da48\', u\'http://www.hrbtax.gov.cn//web/station/index.php?id=4&p=zwgk&pNavId=1\', u\'http://www.hljtax.gov.cn/wwqtnew/nry/content.jsp?sort_id=548&xw_id=4863\', u\'http://www.hrbtax.gov.cn//web/mod/dsdt/more.php?mid=72&xtype=386&p=ssxc&pNavId=118\', u\'http://www.hrbtax.gov.cn//web/lodge/index.php?lb=2&p=gzcy&pNavId=5\', u\'http://www.hrbtax.gov.cn//web/mod/bszn/more.php?xtype=68182&mid=182&p=bsfw&pNavId=2\', u\'http://www.hrbtax.gov.cn//web/consultation/index.php?m=1&p=gzcy&pNavId=5\', u\'http://www.hrbtax.gov.cn//web/mod/dsdt/show.php?mid=46&xtype=3846&id=2083\', u\'http://www.hrbtax.gov.cn//web/mod/dsdt/show.php?mid=46&xtype=3846&id=2082\', u\'http://www.hrbtax.gov.cn//web/mod/znhd/more.php?mid=57&xtype=5657\', u\'http://www.hrbtax.gov.cn//web/mod/scene_services/service.php?m=1&p=bsfw&pNavId=2\', u\'http://www.hrbtax.gov.cn//web/site/?sid=230117\', u\'http://www.hrbtax.gov.cn//web/site/?sid=230116\', u\'http://www.hrbtax.gov.cn//web/site/?sid=230111\', u\'http://www.hrbtax.gov.cn/web/mod/zwgk/show.php?id=117&xtype=1826&mid=26&pNavId=1\', u\'http://www.hrbtax.gov.cn//web/bureau/?mid=212&p=zwgk&pNavId=1\', u\'http://www.hrbtax.gov.cn//web/site/?sid=230119\', u\'http://www.hrbtax.gov.cn//web/site/?sid=230118\', u\'http://www.hrbtax.gov.cn//web/station/index.php?id=2&p=zwgk&pNavId=1\', u\'http://www.hrbtax.gov.cn//web/mod/dsdt/show.php?mid=72&xtype=386&id=2848\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=60&xtype=5960&id=1201\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=60&xtype=5960&id=1200\', u\'http://www.hrbtax.gov.cn//web/mod/zwgk/more.php?mid=121&xtype=18121&p=zwgk&pNavId=1\', u\'http://www.hrbtax.gov.cn//web/consultation/question_detail.php?id=5811\', u\'http://www.hrbtax.gov.cn//web/mod/bszn/more.php?xtype=684&mid=80&p=bsfw&pNavId=2\', u\'http://www.hrbtax.gov.cn//web/consultation/question_detail.php?id=5813\', u\'http://www.hljtax.gov.cn/wwqtnew/nry/content.jsp?sort_id=548&xw_id=5046\', u\'http://www.hrbtax.gov.cn//web/consultation/question_detail.php?id=5815\', u\'http://www.hrbtax.gov.cn//web/consultation/question_detail.php?id=5814\', u\'http://www.hrbtax.gov.cn//web/mod/ballot/show.php?mid=108&xtype=1108&id=6\', u\'http://www.hrbtax.gov.cn//web/mod/ballot/show.php?mid=108&xtype=1108&id=7\', u\'http://www.hrbtax.gov.cn//web/mod/ballot/show.php?mid=108&xtype=1108&id=5\', u\'http://www.hrbtax.gov.cn//web/fppt/ptfp.php?m=1&p=bsfw&pNavId=2\', u\'http://www.hrbtax.gov.cn//web/mod/zxwj/list.php?mid=33&xtype=33&p=zwgk&pNavId=1\', u\'http://www.hrbtax.gov.cn//web/station/index.php?id=10&p=zwgk&pNavId=1\', u\'http://www.hrbtax.gov.cn//web/mod/bszn/more.php?xtype=687&mid=83&p=bsfw&pNavId=2\', u\'http://www.hrbtax.gov.cn//web/mod/bszn/more.php?xtype=683&mid=79&p=zwgk&pNavId=2\', u\'http://www.hrbtax.gov.cn//web/mod/ballot/show.php?mid=108&xtype=1108&id=9\', u\'http://www.hrbtax.gov.cn//web/station/index.php?id=6&p=zwgk&pNavId=1\', u\'http://www.hrbtax.gov.cn//web/mod/bszn/more.php?xtype=6810&mid=86&p=bsfw&pNavId=2\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=61&xtype=5961&id=105\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/show.php?mid=61&xtype=5961&id=9\', u\'http://www.hrbtax.gov.cn//web/mod/zwgk/more.php?mid=120&xtype=18120&p=zwgk&mymemuid=1&mysubmemuid=18\', u\'http://www.hrbtax.gov.cn//web/mod/dsdt/more.php?mid=39&xtype=3839\', u\'http://www.hrbtax.gov.cn//web/mod/project/list.php?p=zwgk&pNavId=1\', u\'http://www.hrbtax.gov.cn//web/mod/ssxc/more.php?mid=61&xtype=5961\', u\'http://www.hrbtax.gov.cn//web/mod/zwgk/more.php?mid=75&xtype=186\', u\'http://www.hrbtax.gov.cn//web/site/indexsite.php?p=zwgk&pNavId=1\', u\'http://www.hrbtax.gov.cn//web/mod/szjs/more.php?xtype=198199&mid=199&p=ssxc&pNavId=118\', u\'http://www.hrbtax.gov.cn//web/mod/szjs/index.php?mid=198&p=ssxc&pNavId=118\', u\'http://www.hrbtax.gov.cn//web/mod/zwgk/more.php?mid=120&xtype=18120&p=zwgk&pNavId=1\', u\'http://www.hrbtax.gov.cn/web/mod/zcfg/more.php?xtype=4849&mid=49&p=zwgk&pNavId=1&pNavId=1\', u\'http://www.hrbtax.gov.cn//web/mod/dialog/object.php?obJectID=c738db44e786149e88cb074a9654da48\', u\'http://www.hrbtax.gov.cn//web/mod/wsbs/more.php?mid=55&xtype=5255&p=bsfw&pNavId=2\', u\'http://www.hrbtax.gov.cn//web/mod/dialog/object.php?obJectID=431d2b2459ac6b138fc068873eec9c5d\', u\'http://www.hrbtax.gov.cn//web/site/?', '[\'61.158.105.180\', \'61.158.105.84\', \'218.9.29.201\', \'210.76.63.185\']', '[]', '[\'[-]21/tcp closed\', \'[-]22/tcp closed\', \'[-]23/tcp closed\', \'[-]25/tcp closed\', \'[-]53/tcp closed\', \'[+]80/tcp open[+] HTTP/1.1 400 Bad Request\\r\\nContent-Type: text/html\\r\\nDate: Sat, 25 Jun 2016 14:48:01 GMT\\r\\nConnection: \', \'[-]389/tcp closed\', \'[-]8080/tcp closed\', \'[-]1433/tcp closed\', \'[-]2375/tcp closed\', \'[-]3306/tcp closed\', \'[-]3389/tcp closed\', \'[-]6379/tcp closed\', \'[-]11211/tcp closed\', \'[-]27017/tcp closed\']', '[u\'http://hrbtax.gov.cn\', u\'http://mail.hrbtax.gov.cn\', u\'http://wap.hrbtax.gov.cn\', u\'http://www.hrbtax.gov.cn\', u\'http://new.hrbtax.gov.cn\']');
INSERT INTO `target_baseinfo` VALUES ('9f5fb7d3fef55d77e8685b047a01650f', 'http://www.kfq.gov.cn/', '[u\'http://www.hzwzcx.com/wzcx.html?em=bdsswz1\']', '[]', '[u\'http://www.kfq.gov.cn/app\']', '[\'[-]21/tcp closed\', \'[-]22/tcp closed\', \'[-]23/tcp closed\', \'[-]25/tcp closed\', \'[-]53/tcp closed\', \'[+]80/tcp open[+] <html>\\n<head><title>501 Method not implemented</title></head>\\n<body>\\n<h1>501 Method not implemented<\', \'[-]389/tcp closed\', \'[-]8080/tcp closed\', \'[-]1433/tcp closed\', \'[-]2375/tcp closed\', \'[-]3306/tcp closed\', \'[-]3389/tcp closed\', \'[-]6379/tcp closed\', \'[-]11211/tcp closed\', \'[-]27017/tcp closed\']', '[u\'http://www.kfq.gov.cn\', u\'http://kfq.gov.cn\']');
INSERT INTO `target_baseinfo` VALUES ('35c8193d1bbce40fd9e0412c5453054b', 'http://www.jxedz.gov.cn/', '[u\'http://www.jxedz.gov.cn/ index.php?id=243\', u\'http://www.jxedz.gov.cn//news.php?id=15453\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=5\', u\'http://www.jxedz.gov.cn//news.php?id=1550\', u\'http://www.jxedz.gov.cn//news.php?id=15455\', u\'http://www.jxedz.gov.cn//news.php?id=15489\', u\'http://www.jxedz.gov.cn//news.php?id=15488\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=4\', u\'http://www.jxedz.gov.cn//index.php?id=259\', u\'http://www.jxedz.gov.cn//news.php?id=15483\', u\'http://www.jxedz.gov.cn//news.php?id=15482\', u\'http://www.jxedz.gov.cn//news.php?id=15481\', u\'http://www.jxedz.gov.cn//news.php?id=15480\', u\'http://www.jxedz.gov.cn//news.php?id=15487\', u\'http://www.jxedz.gov.cn//news.php?id=15486\', u\'http://www.jxedz.gov.cn//news.php?id=15485\', u\'http://www.jxedz.gov.cn//news.php?id=15484\', u\'http://www.jxedz.gov.cn//news.php?id=15263\', u\'http://www.jxedz.gov.cn//news.php?id=14760\', u\'http://www.jxedz.gov.cn//news.php?id=15476\', u\'http://www.jxedz.gov.cn//news.php?id=15477\', u\'http://www.jxedz.gov.cn//news.php?id=15474\', u\'http://www.jxedz.gov.cn//news.php?id=15475\', u\'http://www.jxedz.gov.cn//news.php?id=15472\', u\'http://www.jxedz.gov.cn//news.php?id=15473\', u\'http://www.jxedz.gov.cn//news.php?id=15470\', u\'http://www.jxedz.gov.cn//news.php?id=15471\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=50\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=51\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=52\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=53\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=54\', u\'http://www.jxedz.gov.cn//news.php?id=15478\', u\'http://www.jxedz.gov.cn//news.php?id=15479\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=44\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=6\', u\'http://www.jxedz.gov.cn//news.php?id=14852\', u\'http://www.jxedz.gov.cn//news.php?classid=35\', u\'http://www.jxedz.gov.cn//news.php?id=14455\', u\'http://www.jxedz.gov.cn//news.php?id=15343\', u\'http://www.jxedz.gov.cn//news.php?id=14291\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=46\', u\'http://www.jxedz.gov.cn//news.php?id=14292\', u\'http://www.jxedz.gov.cn//index.php?id=1\', u\'http://www.jxedz.gov.cn//news.php?id=15465\', u\'http://www.jxedz.gov.cn//news.php?id=15464\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=36\', u\'http://www.jxedz.gov.cn//news.php?id=15461\', u\'http://www.jxedz.gov.cn//news.php?id=15460\', u\'http://www.jxedz.gov.cn//news.php?id=15463\', u\'http://www.jxedz.gov.cn//news.php?id=15502\', u\'http://www.jxedz.gov.cn//news.php?id=15503\', u\'http://www.jxedz.gov.cn//news.php?id=15500\', u\'http://www.jxedz.gov.cn//news.php?id=15501\', u\'http://www.jxedz.gov.cn//news.php?id=15504\', u\'http://www.jxedz.gov.cn//news.php?id=15505\', u\'http://www.jxedz.gov.cn//news.php?id=4022\', u\'http://www.jxedz.gov.cn//news.php?id=4020\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=3\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=48\', u\'http://www.jxedz.gov.cn//search.php?action=advanced&searchtype=\', u\'http://www.jxedz.gov.cn//index.php?id=166\', u\'http://www.jxedz.gov.cn//news.php?id=15458\', u\'http://www.jxedz.gov.cn//news.php?id=15459\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=8\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=9\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=57\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=56\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=55\', u\'http://www.jxedz.gov.cn//news.php?id=13660\', u\'http://www.jxedz.gov.cn//index.php?id=110\', u\'http://www.jxedz.gov.cn//news.php?id=15452\', u\'http://www.jxedz.gov.cn//index.php?id=112\', u\'http://www.jxedz.gov.cn//index.php?id=115\', u\'http://www.jxedz.gov.cn//index.php?id=114\', u\'http://www.jxedz.gov.cn//news.php?id=15456\', u\'http://www.jxedz.gov.cn//news.php?id=15457\', u\'http://www.jxedz.gov.cn//news.php?id=14227\', u\'http://www.jxedz.gov.cn//news.php?id=14186\', u\'http://www.jxedz.gov.cn//news.php?classid=6\', u\'http://www.jxedz.gov.cn//news.php?classid=109\', u\'http://www.jxedz.gov.cn//news.php?id=7641\', u\'http://www.jxedz.gov.cn//news.php?classid=8\', u\'http://www.jxedz.gov.cn//news.php?classid=9\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=26\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=23\', u\'http://www.jxedz.gov.cn//news.php?id=13872\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=28\', u\'http://www.jxedz.gov.cn//news.php?classid=45\', u\'http://www.jxedz.gov.cn//index.php?id=109\', u\'http://www.jxedz.gov.cn//news.php?id=15333\', u\'http://www.jxedz.gov.cn//news.php?id=15332\', u\'http://www.jxedz.gov.cn//news.php?id=15335\', u\'http://www.jxedz.gov.cn//news.php?id=11561\', u\'http://www.jxedz.gov.cn//news.php?id=15441\', u\'http://www.jxedz.gov.cn//news.php?id=15440\', u\'http://www.jxedz.gov.cn//news.php?id=3377\', u\'http://www.jxedz.gov.cn//news.php?id=3376\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=22\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=49\', u\'http://www.jxedz.gov.cn//news.php?id=3379\', u\'http://www.jxedz.gov.cn//news.php?id=3378\', u\'http://www.jxedz.gov.cn//news.php?classid=112\', u\'http://www.jxedz.gov.cn//news.php?id=3386\', u\'http://www.jxedz.gov.cn//news.php?classid=110\', u\'http://www.jxedz.gov.cn//news.php?classid=111\', u\'http://www.jxedz.gov.cn//news.php?id=3384\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=35\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=37\', u\'http://www.jxedz.gov.cn//news.php?id=3385\', u\'http://www.jxedz.gov.cn//news.php?id=14952\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=30\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=33\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=39\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=2&codeid=38\', u\'http://www.jxedz.gov.cn//news.php?id=14638\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=7\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=21\', u\'http://www.jxedz.gov.cn//news.php?id=15433\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=18\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=19\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=16\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=11\', u\'http://www.jxxzsp.gov.cn/Approve/pcfw/Find.aspx?in=1&codeid=13\', u\'http://www.jxedz.gov.cn//news.php?classid=44\', u\'http://www.jxedz.gov.cn//news.php?id=15229\', u\'http://www.jxedz.gov.cn/news.php?classid=126\', u\'http://www.jxedz.gov.cn/news.php?classid=129\', u\'http://www.jxedz.gov.cn/news.php?classid=128\', u\'http://www.jxedz.gov.cn//news.php?id=15389\', u\'http://www.jxedz.gov.cn//news.php?id=13809\', u\'http://www.jxedz.gov.cn//news.php?id=15256\', u\'http://www.jxedz.gov.cn//news.php?id=15429\', u\'http://www.jxedz.gov.cn//news.php?id=15428\', u\'http://www.jxedz.gov.cn//news.php?id=15425\', u\'http://www.jxedz.gov.cn//news.php?id=12389\', u\'http://www.jxedz.gov.cn//news.php?id=3387\', u\'http://www.jxedz.gov.cn//news.php?id=15399\', u\'http://www.jxedz.gov.cn//news.php?id=15398\', u\'http://www.jxedz.gov.cn//news.php?id=3382\', u\'http://www.jxedz.gov.cn//news.php?id=3383\', u\'http://www.jxedz.gov.cn//news.php?id=3380\', u\'http://www.jxedz.gov.cn//news.php?id=15390\', u\'http://www.jxedz.gov.cn//news.php?id=15397\', u\'http://www.jxedz.gov.cn//news.php?id=14072\', u\'http://www.jxedz.gov.cn//news.php?id=13884\', u\'http://www.jxedz.gov.cn//news.php?id=3986\', u\'http://www.jxedz.gov.cn//news.php?id=3987\', u\'http://www.jxedz.gov.cn//news.php?id=15494\', u\'http://www.jxedz.gov.cn//news.php?id=10251\', u\'http://www.jxedz.gov.cn//news.php?id=15496\', u\'http://www.jxedz.gov.cn//index.php?id=233\', u\'http://www.jxedz.gov.cn//news.php?id=15362\', u\'http://www.jxedz.gov.cn//news.php?id=15361\', u\'http://www.jxedz.gov.cn//ne', '[]', '[]', '[\'[-]21/tcp closed\', \'[-]22/tcp closed\', \'[-]23/tcp closed\', \'[-]25/tcp closed\', \'[-]53/tcp closed\', \'[+]80/tcp open[+] \', \'[-]389/tcp closed\', \'[-]8080/tcp closed\', \'[-]1433/tcp closed\', \'[-]2375/tcp closed\', \'[-]3306/tcp closed\', \'[-]3389/tcp closed\', \'[-]6379/tcp closed\', \'[-]11211/tcp closed\', \'[-]27017/tcp closed\']', '[u\'http://jxedz.gov.cn\', u\'http://www.jxedz.gov.cn\']');
