Submitted URL: https://t.co/X0ukaAEsUs
Effective URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Submission: On July 25 via api from CA

Summary

This website contacted 64 IPs in 11 countries across 49 domains to perform 249 HTTP transactions. The main IP is 35.173.160.135, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is threatpost.com.
TLS certificate: Issued by DigiCert SHA2 Secure Server CA on June 10th 2020. Valid for: a year.
This is the only time threatpost.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 104.244.42.5 13414 (TWITTER)
1 1 108.174.10.10 14413 (LINKEDIN)
1 2 2620:1ec:21::14 8068 (MICROSOFT...)
19 35.173.160.135 14618 (AMAZON-AES)
11 143.204.201.110 16509 (AMAZON-02)
5 2606:4700:e6:... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
8 2600:9000:205... 16509 (AMAZON-02)
12 2600:9000:214... 16509 (AMAZON-02)
1 1 2a04:fa87:fff... 2635 (AUTOMATTIC)
1 192.0.77.2 2635 (AUTOMATTIC)
3 13 2a00:1450:400... 15169 (GOOGLE)
20 194.146.38.23 41436 (CLOUDWEBM...)
7 172.217.16.130 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
5 99.86.0.120 16509 (AMAZON-02)
8 13 2606:2800:233... 15133 (EDGECAST)
1 107.21.45.77 14618 (AMAZON-AES)
1 134.209.129.254 14061 (DIGITALOC...)
4 37.252.172.37 29990 (ASN-APPNEX)
4 213.19.162.31 26667 (RUBICONPR...)
1 34.253.1.139 16509 (AMAZON-02)
5 92.122.254.129 16625 (AKAMAI-AS)
3 185.64.189.112 62713 (AS-PUBMATIC)
2 7 34.98.64.218 15169 (GOOGLE)
1 3 216.52.2.48 29791 (VOXEL-DOT...)
1 18.195.225.18 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 3 2a00:1450:400... 15169 (GOOGLE)
1 3 2620:116:800d... 16509 (AMAZON-02)
1 151.101.112.157 54113 (FASTLY)
1 2600:9000:205... 16509 (AMAZON-02)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
24 2a00:1450:400... 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
3 72.247.225.32 16625 (AKAMAI-AS)
2 2 185.94.180.126 35220 (SPOTX-AMS)
11 45.83.41.218 204548 (CLOUDWEBM...)
1 2 18.195.193.185 16509 (AMAZON-02)
1 1 88.99.243.111 24940 (HETZNER-AS)
3 2a00:1450:400... 15169 (GOOGLE)
1 104.244.42.131 13414 (TWITTER)
1 2a03:2880:f01... 32934 (FACEBOOK)
1 199.232.53.140 54113 (FASTLY)
4 52.29.183.32 16509 (AMAZON-02)
17 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 35.157.177.102 16509 (AMAZON-02)
2 185.86.139.29 201081 (SMARTADSE...)
2 2a00:1450:400... 15169 (GOOGLE)
5 2a00:1450:400... 15169 (GOOGLE)
2 92.122.253.36 16625 (AKAMAI-AS)
2 23.37.42.132 16625 (AKAMAI-AS)
2 3 52.19.114.209 16509 (AMAZON-02)
2 6 18.197.47.23 16509 (AMAZON-02)
1 1 172.217.23.98 15169 (GOOGLE)
1 3.126.56.137 16509 (AMAZON-02)
1 2a00:1288:110... 34010 (YAHOO-IRD)
2 2 151.101.14.49 54113 (FASTLY)
1 1 165.227.252.242 14061 (DIGITALOC...)
1 205.185.216.10 20446 (HIGHWINDS3)
1 2 52.28.32.108 16509 (AMAZON-02)
1 143.204.201.96 16509 (AMAZON-02)
1 37.157.4.28 198622 (ADFORM)
1 2a02:fa8:8806... 41041 (VCLK-EU-)
249 64
Apex Domain
Subdomains
Transfer
38 threatpost.com
threatpost.com
assets.threatpost.com
media.threatpost.com
826 KB
31 sekindo.com
live.sekindo.com
video.sekindo.com
495 KB
30 googlesyndication.com
176f23c8ee7cb75cdd281894c8d1d9e1.safeframe.googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
217 KB
23 advertising.com
adserver-us.adtech.advertising.com
ads.adaptv.advertising.com
pixel.advertising.com
11 KB
17 ampproject.org
cdn.ampproject.org
408 KB
13 google.com
www.google.com
1 KB
11 gstatic.com
www.gstatic.com
fonts.gstatic.com
encrypted-tbn2.gstatic.com
encrypted-tbn1.gstatic.com
encrypted-tbn3.gstatic.com
encrypted-tbn0.gstatic.com
451 KB
11 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
googleads.g.doubleclick.net
cm.g.doubleclick.net
112 KB
11 adlightning.com
tagan.adlightning.com
202 KB
8 rubiconproject.com
fastlane.rubiconproject.com
prebid-server.rubiconproject.com
eus.rubiconproject.com
9 KB
7 openx.net
teachingaids-d.openx.net
u.openx.net
eu-u.openx.net
1 KB
6 pubmatic.com
hbopenbid.pubmatic.com
ads.pubmatic.com
177 B
6 adnxs.com
ib.adnxs.com
acdn.adnxs.com
3 KB
5 amazon-adsystem.com
c.amazon-adsystem.com
59 KB
5 admetricspro.com
qd.admetricspro.com
183 KB
4 googleapis.com
fonts.googleapis.com
3 KB
3 adsrvr.org
match.adsrvr.org
1 KB
3 quantserve.com
secure.quantserve.com
pixel.quantserve.com
9 KB
3 google-analytics.com
www.google-analytics.com
18 KB
3 3lift.com
tlx.3lift.com
eb2.3lift.com
619 B
3 lijit.com
ap.lijit.com
1 KB
3 casalemedia.com
as-sec.casalemedia.com
3 KB
2 everesttech.net
sync-tm.everesttech.net
480 B
2 yahoo.com
ups.analytics.yahoo.com
pr-bh.ybp.yahoo.com
2 KB
2 indexww.com
js-sec.indexww.com
2 smartadserver.com
prg.smartadserver.com
614 B
2 bidswitch.net
x.bidswitch.net
1015 B
2 spotxchange.com
sync.search.spotxchange.com
1 KB
2 servenobid.com
ads.servenobid.com
public.servenobid.com
462 B
2 serverbid.com
e.serverbid.com
sync.serverbid.com
1 KB
2 google.de
adservice.google.de
www.google.de
281 B
2 linkedin.com
www.linkedin.com
2 KB
2 t.co
t.co
732 B
1 dotomi.com
aol-match.dotomi.com
103 B
1 adform.net
c1.adform.net
187 B
1 digitaloceanspaces.com
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
1 reddit.com
www.reddit.com
1 KB
1 facebook.com
graph.facebook.com
519 B
1 twitter.com
analytics.twitter.com
653 B
1 loopme.me
csync.loopme.me
225 B
1 quantcount.com
rules.quantcount.com
354 B
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 googletagmanager.com
www.googletagmanager.com
43 KB
1 a-mo.net
prebid.a-mo.net
359 B
1 wp.com
i1.wp.com
65 B
1 gravatar.com
secure.gravatar.com
385 B
1 kasperskycontenthub.com
kasperskycontenthub.com
399 B
1 googletagservices.com
www.googletagservices.com
16 KB
1 lnkd.in
lnkd.in
524 B
249 49
Domain Requested by
24 tpc.googlesyndication.com tagan.adlightning.com
threatpost.com
cdn.ampproject.org
20 live.sekindo.com threatpost.com
live.sekindo.com
18 threatpost.com t.co
threatpost.com
17 cdn.ampproject.org threatpost.com
13 adserver-us.adtech.advertising.com 8 redirects threatpost.com
13 www.google.com 3 redirects threatpost.com
tagan.adlightning.com
12 media.threatpost.com threatpost.com
11 video.sekindo.com threatpost.com
11 tagan.adlightning.com threatpost.com
tagan.adlightning.com
8 assets.threatpost.com threatpost.com
7 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
threatpost.com
6 pixel.advertising.com 2 redirects threatpost.com
5 pagead2.googlesyndication.com securepubads.g.doubleclick.net
5 c.amazon-adsystem.com t.co
c.amazon-adsystem.com
live.sekindo.com
5 qd.admetricspro.com threatpost.com
4 ads.adaptv.advertising.com live.sekindo.com
4 fonts.googleapis.com live.sekindo.com
threatpost.com
4 fastlane.rubiconproject.com qd.admetricspro.com
4 ib.adnxs.com qd.admetricspro.com
live.sekindo.com
3 match.adsrvr.org 2 redirects
3 fonts.gstatic.com live.sekindo.com
threatpost.com
3 u.openx.net 2 redirects live.sekindo.com
3 ads.pubmatic.com live.sekindo.com
qd.admetricspro.com
3 www.google-analytics.com 1 redirects www.googletagmanager.com
threatpost.com
3 ap.lijit.com 1 redirects qd.admetricspro.com
3 teachingaids-d.openx.net qd.admetricspro.com
live.sekindo.com
3 hbopenbid.pubmatic.com qd.admetricspro.com
live.sekindo.com
3 as-sec.casalemedia.com qd.admetricspro.com
live.sekindo.com
2 eb2.3lift.com 1 redirects qd.admetricspro.com
2 sync-tm.everesttech.net 2 redirects
2 eus.rubiconproject.com live.sekindo.com
qd.admetricspro.com
2 acdn.adnxs.com live.sekindo.com
qd.admetricspro.com
2 js-sec.indexww.com live.sekindo.com
qd.admetricspro.com
2 googleads.g.doubleclick.net threatpost.com
2 prg.smartadserver.com live.sekindo.com
2 prebid-server.rubiconproject.com live.sekindo.com
2 encrypted-tbn3.gstatic.com threatpost.com
2 encrypted-tbn2.gstatic.com threatpost.com
2 x.bidswitch.net 1 redirects threatpost.com
2 sync.search.spotxchange.com 2 redirects
2 pixel.quantserve.com 1 redirects threatpost.com
2 www.gstatic.com www.google.com
2 www.linkedin.com 1 redirects threatpost.com
2 t.co threatpost.com
1 aol-match.dotomi.com
1 c1.adform.net
1 eu-u.openx.net qd.admetricspro.com
1 public.servenobid.com qd.admetricspro.com
1 serverbid-sync.nyc3.cdn.digitaloceanspaces.com qd.admetricspro.com
1 sync.serverbid.com 1 redirects
1 pr-bh.ybp.yahoo.com threatpost.com
1 ups.analytics.yahoo.com threatpost.com
1 cm.g.doubleclick.net 1 redirects
1 encrypted-tbn0.gstatic.com threatpost.com
1 encrypted-tbn1.gstatic.com threatpost.com
1 www.reddit.com threatpost.com
1 graph.facebook.com threatpost.com
1 analytics.twitter.com tagan.adlightning.com
1 csync.loopme.me 1 redirects
1 176f23c8ee7cb75cdd281894c8d1d9e1.safeframe.googlesyndication.com tagan.adlightning.com
1 www.google.de threatpost.com
1 stats.g.doubleclick.net 1 redirects
1 rules.quantcount.com secure.quantserve.com
1 static.ads-twitter.com www.googletagmanager.com
1 secure.quantserve.com www.googletagmanager.com
1 www.googletagmanager.com threatpost.com
1 tlx.3lift.com qd.admetricspro.com
1 ads.servenobid.com qd.admetricspro.com
1 e.serverbid.com qd.admetricspro.com
1 prebid.a-mo.net qd.admetricspro.com
1 adservice.google.de tagan.adlightning.com
1 i1.wp.com threatpost.com
1 secure.gravatar.com 1 redirects
1 kasperskycontenthub.com threatpost.com
1 www.googletagservices.com threatpost.com
1 lnkd.in 1 redirects
249 76
Subject Issuer Validity Valid
t.co
DigiCert SHA2 High Assurance Server CA
2020-03-05 -
2021-03-02
a year crt.sh
threatpost.com
DigiCert SHA2 Secure Server CA
2020-06-10 -
2021-06-15
a year crt.sh
*.adlightning.com
Amazon
2020-07-22 -
2021-08-22
a year crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-02-04 -
2020-10-09
8 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
assets.threatpost.com
Amazon
2020-03-04 -
2021-04-04
a year crt.sh
kasperskycontenthub.com
DigiCert SHA2 Secure Server CA
2020-06-01 -
2021-06-09
a year crt.sh
media.threatpost.com
Amazon
2020-03-04 -
2021-04-04
a year crt.sh
*.wp.com
Sectigo RSA Domain Validation Secure Server CA
2020-04-02 -
2022-07-05
2 years crt.sh
www.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
www.sekindo.com
Go Daddy Secure Certificate Authority - G2
2020-05-27 -
2022-06-18
2 years crt.sh
*.google.de
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
*.adtech.advertising.com
DigiCert SHA2 Secure Server CA
2020-04-16 -
2022-04-21
2 years crt.sh
*.a-mo.net
Amazon
2019-09-06 -
2020-10-06
a year crt.sh
e.serverbid.com
Let's Encrypt Authority X3
2020-06-22 -
2020-09-20
3 months crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2020-06-24 -
2021-02-17
8 months crt.sh
*.servenobid.com
Amazon
2020-03-12 -
2021-04-12
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2020-03-02 -
2021-04-01
a year crt.sh
*.pubmatic.com
Sectigo RSA Organization Validation Secure Server CA
2019-02-22 -
2021-02-21
2 years crt.sh
*.openx.net
GeoTrust RSA CA 2018
2020-06-18 -
2021-08-17
a year crt.sh
*.lijit.com
Go Daddy Secure Certificate Authority - G2
2020-03-11 -
2021-05-10
a year crt.sh
*.3lift.com
Amazon
2020-07-04 -
2021-08-05
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.gstatic.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2019-10-04 -
2020-10-07
a year crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2019-08-14 -
2020-08-18
a year crt.sh
www.google.de
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
upload.video.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.bidswitch.net
Sectigo RSA Domain Validation Secure Server CA
2020-04-23 -
2022-05-04
2 years crt.sh
*.twitter.com
DigiCert SHA2 High Assurance Server CA
2020-03-05 -
2021-03-02
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-07-21 -
2020-10-12
3 months crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2020-04-10 -
2020-10-10
6 months crt.sh
*.reddit.com
DigiCert SHA2 Secure Server CA
2020-04-06 -
2020-10-03
6 months crt.sh
*.v.ssp.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-03-01 -
2020-08-28
6 months crt.sh
misc-sni.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.smartadserver.com
DigiCert Global CA G2
2020-02-03 -
2022-02-03
2 years crt.sh
cdn.adnxs.com
GeoTrust RSA CA 2018
2020-01-02 -
2021-04-02
a year crt.sh
pixel.advertising.com
DigiCert SHA2 High Assurance Server CA
2020-03-11 -
2020-09-07
6 months crt.sh
ups.analytics.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-05-27 -
2020-11-23
6 months crt.sh
*.ybp.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-06-02 -
2020-11-29
6 months crt.sh
*.nyc3.cdn.digitaloceanspaces.com
DigiCert SHA2 Secure Server CA
2020-03-11 -
2021-04-14
a year crt.sh
track.adform.net
DigiCert SHA2 Secure Server CA
2019-09-16 -
2021-09-20
2 years crt.sh
*.dotomi.com
GlobalSign RSA OV SSL CA 2018
2019-06-19 -
2021-08-31
2 years crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh

This page contains 30 frames:

Primary Page: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Frame ID: 54FB750933C4FCE147F5427A9D6744AD
Requests: 104 HTTP requests in this frame

Frame: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595676846&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Frame ID: D2671E40F2A3EA30A123CB1329B5866B
Requests: 33 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Roboto&display=swap
Frame ID: EFA8AAC7A0D02F4724615DE8D39CF128
Requests: 5 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Roboto&display=swap
Frame ID: 3A7348308E2ABAD78CD1D7536A22B1BB
Requests: 17 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/user_sync.html?p=159196&userIdMacro=PM_UID&gdpr=1&gdpr_consent=&predirect=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D91%26advUuid%3DPM_UID%26gdpr%3D1%26gdpr_consent%3D
Frame ID: 1B35F44D674BA76C639CF93BF10B67BD
Requests: 1 HTTP requests in this frame

Frame: https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=94&advUuid=c0003dfe-ce6a-11ea-97c6-1f057aaa2106
Frame ID: 4DF50CD6D62BEB2C2069DA445AFB1DA2
Requests: 1 HTTP requests in this frame

Frame: https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=98&advUuid=82e70d1d-1088-40c6-9b01-1821a5a873d8
Frame ID: 1AE99F83DB133393AF2559606348ED02
Requests: 1 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&theme=standard&size=normal&cb=nwnixrtyri7m
Frame ID: 6ABD084D3F34A1AB952E5B6896396E96
Requests: 1 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Frame ID: 6FEC0E9F8C8B72CF1D5CDFF33E9ACBDF
Requests: 24 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&theme=light&size=normal&cb=albuj3e5k3wa
Frame ID: DB8532D535D7F2B25144870C1DDA8AB3
Requests: 1 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Frame ID: 3BA22202B12FA5BE0556FCB8A7ECFF6E
Requests: 18 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Frame ID: CA6B0EF540250452E1B1400BA194CA03
Requests: 21 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Frame ID: 418ACA3EA95F11CF65B83AA7BC9A12A6
Requests: 11 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/bframe?hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=3518k2l0mixj
Frame ID: 5F95F79CFC072CA51190DD3A115B46D0
Requests: 1 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/bframe?hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&cb=m9cyqdi5fo0u
Frame ID: 2E095DC55BF761A0DB30FD9894A5961D
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/210/runner.html
Frame ID: 01B456CA71BE405410538692BF21882F
Requests: 1 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/showad.js
Frame ID: CFCB51C69BE79245932D730E4309E372
Requests: 1 HTTP requests in this frame

Frame: https://js-sec.indexww.com/um/ixmatch.html
Frame ID: 200683E18C60CE307347391F1410B51F
Requests: 1 HTTP requests in this frame

Frame: https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Frame ID: C808F1AD7244122273CB69E80EA56AD8
Requests: 1 HTTP requests in this frame

Frame: https://u.openx.net/w/1.0/pd?gdpr=1&gdpr_consent=
Frame ID: 1F6BD64083012BBF2F1C542DCA3D9B0D
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?gdpr=1&gdpr_consent=
Frame ID: B06971B7AC5AE7397971655A80F325DB
Requests: 1 HTTP requests in this frame

Frame: https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Frame ID: 5EB52F6A4612D35A02A0BF63435DB1FF
Requests: 1 HTTP requests in this frame

Frame: https://eb2.3lift.com/sync?&ld=1
Frame ID: ECB8143FDA00E90444B2BC4350587038
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html
Frame ID: FA60D017D8901E3CDB0459FC1FD1E5F8
Requests: 1 HTTP requests in this frame

Frame: https://js-sec.indexww.com/um/ixmatch.html
Frame ID: 732CD90DD62878A413727A4501FE76EC
Requests: 1 HTTP requests in this frame

Frame: https://ap.lijit.com/beacon?informer=13394437&dnr=1
Frame ID: DD00F3ADE946946DF63EFA1A0B3C4994
Requests: 1 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/showad.js
Frame ID: 44166AA972E7AEE8EC468A64A1915502
Requests: 1 HTTP requests in this frame

Frame: https://acdn.adnxs.com/dmp/async_usersync.html
Frame ID: BB724D97B19726DBECB7B8DA6A8576C3
Requests: 1 HTTP requests in this frame

Frame: https://public.servenobid.com/sync.html
Frame ID: B7AAFE2C9454390E1E076874470BD150
Requests: 1 HTTP requests in this frame

Frame: https://eu-u.openx.net/w/1.0/pd?plm=6&ph=e1b1f5e1-3c2c-4287-9806-317cfbf3bd12&gdpr=1
Frame ID: F746234AD768070168B37573257D1362
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://t.co/X0ukaAEsUs Page URL
  2. https://lnkd.in/gvYmtmc HTTP 301
    https://www.linkedin.com/slink?code=gvYmtmc HTTP 301
    https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/ Page URL

Page Statistics

249
Requests

100 %
HTTPS

42 %
IPv6

49
Domains

76
Subdomains

64
IPs

11
Countries

3078 kB
Transfer

7361 kB
Size

4
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://t.co/X0ukaAEsUs Page URL
  2. https://lnkd.in/gvYmtmc HTTP 301
    https://www.linkedin.com/slink?code=gvYmtmc HTTP 301
    https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 14
  • https://secure.gravatar.com/avatar/fab896982b5c9974407bc14bd8b50b84?s=60&d=https%3A%2F%2Fkasperskycontenthub.com%2Fwp-content%2Fthemes%2Fkaspersky-root%2Fassets%2Fimages%2Favatar_default.jpg&r=g HTTP 302
  • https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
Request Chain 39
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=578243e7ce73529;misc=1595676845861; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=578243e7ce73529;misc=1595676845861 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1Abf620004-ce6a-11ea-8ab1-1201d05c7be8;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=578243e7ce73529;misc=1595676845861
Request Chain 40
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=580116e7f7363ee;misc=1595676845861; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=580116e7f7363ee;misc=1595676845861
Request Chain 41
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=595f400fb82a9c5;misc=1595676845862; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=595f400fb82a9c5;misc=1595676845862
Request Chain 42
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=60c5dacb3718188;misc=1595676845862; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=60c5dacb3718188;misc=1595676845862 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1Abf61d020-ce6a-11ea-ad7f-12d220623a1c;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=60c5dacb3718188;misc=1595676845862
Request Chain 43
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=6187ec6e3aedcf9;misc=1595676845862; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=6187ec6e3aedcf9;misc=1595676845862 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1Abf61d3f4-ce6a-11ea-9a39-12a93b07bf66;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=6187ec6e3aedcf9;misc=1595676845862
Request Chain 80
  • https://www.google-analytics.com/r/collect?v=1&_v=j83&aip=1&a=474978470&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&dr=https%3A%2F%2Ft.co%2FX0ukaAEsUs&ul=en-us&de=UTF-8&dt=Office%20365%20Users%20Targeted%20By%20%27Coronavirus%20Employee%20Training%27%20Phish%20%7C%20Threatpost&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=YEBAAEAB~&jid=578882700&gjid=575862329&cid=967429594.1595676846&tid=UA-35676203-21&_gid=1994450975.1595676846&_r=1&gtm=2wg7f0PM29HLF&z=1312501925 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-35676203-21&cid=967429594.1595676846&jid=578882700&_gid=1994450975.1595676846&gjid=575862329&_v=j83&z=1312501925 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=967429594.1595676846&jid=578882700&_v=j83&z=1312501925 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=967429594.1595676846&jid=578882700&_v=j83&z=1312501925&slf_rd=1&random=420067601
Request Chain 98
  • https://sync.search.spotxchange.com/partner?adv_id=8805&redir=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D94%26advUuid%3D%24SPOTX_USER_ID HTTP 302
  • https://sync.search.spotxchange.com/partner?adv_id=8805&redir=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D94%26advUuid%3D%24SPOTX_USER_ID&__user_check__=1&sync_id=c0003e37-ce6a-11ea-97c6-1f057aaa2106 HTTP 302
  • https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=94&advUuid=c0003dfe-ce6a-11ea-97c6-1f057aaa2106
Request Chain 99
  • https://u.openx.net/w/1.0/cm?id=476b50d3-5ccf-49a1-89b8-1ddf8ea18042&r=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D98%26advUuid%3D HTTP 302
  • https://u.openx.net/w/1.0/cm?cc=1&id=476b50d3-5ccf-49a1-89b8-1ddf8ea18042&r=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D98%26advUuid%3D HTTP 302
  • https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=98&advUuid=82e70d1d-1088-40c6-9b01-1821a5a873d8
Request Chain 111
  • https://x.bidswitch.net/sync?ssp=sekindo&user_id=5f1c18ae4215a&custom_data=5f1c18ae4215a&gdpr=1&gdpr_consent= HTTP 302
  • https://x.bidswitch.net/ul_cb/sync?ssp=sekindo&user_id=5f1c18ae4215a&custom_data=5f1c18ae4215a&gdpr=1&gdpr_consent=
Request Chain 112
  • https://csync.loopme.me/?redirect=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D93%26advUuid%3D%7Bdevice_id%7D HTTP 302
  • https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=93&advUuid=c7493b7b-fd91-4567-8b2f-2e7b5e69c349
Request Chain 198
  • https://www.google.com/pagead/drt/ui HTTP 302
  • https://googleads.g.doubleclick.net/pagead/drt/si
Request Chain 205
  • https://www.google.com/pagead/drt/ui HTTP 302
  • https://googleads.g.doubleclick.net/pagead/drt/si
Request Chain 221
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=adaptv&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=adaptv&ttd_tpi=1 HTTP 302
  • https://pixel.advertising.com/ups/55953/sync?uid=a0badc05-732d-4807-b6e0-140eb128b11e&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=a0badc05-732d-4807-b6e0-140eb128b11e
Request Chain 222
  • https://cm.g.doubleclick.net/pixel?google_nid=adaptv_dbm&google_cm&google_sc HTTP 302
  • https://pixel.advertising.com/ups/57304/sync?uid=CAESEHTNpny0rPjTtCVX13hP1Xk&google_cver=1 HTTP 302
  • https://pixel.advertising.com/ups/57304/sync?uid=CAESEHTNpny0rPjTtCVX13hP1Xk&google_cver=1&verify=true HTTP 302
  • https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESEHTNpny0rPjTtCVX13hP1Xk&google_cver=1&apid=UPc12390ff-ce6a-11ea-85f7-0657c924cf86
Request Chain 224
  • https://sync-tm.everesttech.net/upi/pid/m7y5t93k?gdpr=1&gdpr_consent=&redir=https%3A%2F%2Fpixel.advertising.com%2Fups%2F55986%2Fsync%3Fuid%3D%24%7BUSER_ID%7D%26_origin%3D0&gdpr=1&gdpr_consent= HTTP 302
  • https://sync-tm.everesttech.net/ct/upi/pid/m7y5t93k?gdpr=1&gdpr_consent=&redir=https%3A%2F%2Fpixel.advertising.com%2Fups%2F55986%2Fsync%3Fuid%3D%24%7BUSER_ID%7D%26_origin%3D0&gdpr=1&gdpr_consent=&_test=XxwYsQAAAFBs9gFU HTTP 302
  • https://pixel.advertising.com/ups/55986/sync?uid=XxwYsQAAAFBs9gFU&_origin=0&gdpr=1&gdpr_consent=&_test=XxwYsQAAAFBs9gFU
Request Chain 228
  • https://sync.serverbid.com/ss/2000891.html HTTP 302
  • https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Request Chain 229
  • https://eb2.3lift.com/sync HTTP 302
  • https://eb2.3lift.com/sync?&ld=1
Request Chain 232
  • https://ap.lijit.com/beacon?informer=13394437 HTTP 302
  • https://ap.lijit.com/beacon?informer=13394437&dnr=1
Request Chain 237
  • https://pixel.quantserve.com/pixel/p-NcBg8UA4xqUFp.gif?idmatch=0&gdpr=1&gdpr_consent= HTTP 302
  • https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=365qX9vwOQ3H-WoJ2at2CozwPlrH_2lejKkt5LYE

249 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
X0ukaAEsUs
t.co/
224 B
364 B
Document
General
Full URL
https://t.co/X0ukaAEsUs
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.5 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
f7404d5c824268c4ddb739fde626e3d11cc0721627b6e3688af1b99106eb9017
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Xss-Protection 0

Request headers

:method
GET
:authority
t.co
:scheme
https
:path
/X0ukaAEsUs
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
cache-control
private,max-age=300
content-encoding
gzip
content-length
174
content-type
text/html; charset=utf-8
date
Sat, 25 Jul 2020 11:34:03 GMT
expires
Sat, 25 Jul 2020 11:39:03 GMT
server
tsa_o
set-cookie
muc=46ceac49-8344-49eb-ab15-e9a79f188058; Max-Age=63072000; Expires=Mon, 25 Jul 2022 11:34:03 GMT; Domain=t.co; Secure; SameSite=None
strict-transport-security
max-age=0
vary
Origin
x-connection-hash
558f1bffca1e3d121b2813bd82891e5c
x-response-time
118
x-xss-protection
0
Primary Request /
threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Redirect Chain
  • https://lnkd.in/gvYmtmc
  • https://www.linkedin.com/slink?code=gvYmtmc
  • https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
78 KB
20 KB
Document
General
Full URL
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Requested by
Host: t.co
URL: https://t.co/X0ukaAEsUs
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
ad191c1c5b495429b245824e927c3ff55ac5fea53aad5d9a108bc3f0a580f4d7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
threatpost.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
document
Referer
https://t.co/X0ukaAEsUs
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://t.co/X0ukaAEsUs

Response headers

Server
nginx
Date
Sat, 25 Jul 2020 11:34:04 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
close
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Link
<https://threatpost.com/wp-json/>; rel="https://api.w.org/" <https://threatpost.com/?p=156899>; rel=shortlink
X-Frame-Options
SAMEORIGIN
X-Debug-Auth
off
X-Request-Host
threatpost.com
x-cache-hit
HIT
Content-Encoding
gzip

Redirect headers

status
301
cache-control
no-cache, no-store
pragma
no-cache
content-encoding
gzip
expires
Thu, 01 Jan 1970 00:00:00 GMT
location
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
vary
Accept-Encoding
set-cookie
bcookie="v=2&4d838724-1c2e-429b-8363-c6a8f19d8243"; domain=.linkedin.com; Path=/; Secure; Expires=Mon, 25-Jul-2022 23:11:36 GMT; SameSite=None bscookie="v=1&202007251134040590f1f5-f16d-43c9-8221-f48abdad03c2AQGeyz1kCn9bJGwUvM9Me2VkzxxMVDcx"; domain=.www.linkedin.com; Path=/; Secure; Expires=Mon, 25-Jul-2022 23:11:36 GMT; HttpOnly; SameSite=None lissc=1; domain=.linkedin.com; Path=/; Secure; Expires=Sun, 25-Jul-2021 11:34:04 GMT; SameSite=None lidc="b=VGST06:g=1851:u=1:i=1595676844:t=1595763244:s=AQEVkb9ZpVinOwMgTR3-5kqCwDzT9-2N"; Expires=Sun, 26 Jul 2020 11:34:04 GMT; domain=.linkedin.com; Path=/; SameSite=None; Secure
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
x-xss-protection
1; mode=block
content-security-policy
default-src *; connect-src 'self' https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob: https://accounts.google.com/gsi/status https://linkedin.sc.omtrdc.net/b/ss/ static.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com media.licdn.com media-exp1.licdn.com media-exp2.licdn.com media-exp3.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/insight.min.js platform.linkedin.com platform-akam.linkedin.com platform-ecst.linkedin.com platform-azur.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
x-frame-options
sameorigin
x-content-type-options
nosniff
strict-transport-security
max-age=2592000
x-li-fabric
prod-lva1
x-li-pop
afd-prod-lva1
x-li-proto
http/2
x-li-uuid
oYSFu6L7JBbgz5QLRysAAA==
x-msedge-ref
Ref A: 82945D8F3AC843358389B81BB1D5708A Ref B: FRAEDGE0820 Ref C: 2020-07-25T11:34:04Z
date
Sat, 25 Jul 2020 11:34:03 GMT
main.css
threatpost.com/wp-content/themes/threatpost-2018/assets/css/
253 KB
39 KB
Stylesheet
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592974
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
41f3222c29889fb48f5dca1d481858e5339a759655510c256ef4edf56c80f7f5

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:05 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Jul 2020 12:16:12 GMT
Server
nginx
ETag
W/"5f1ad10c-3f2b8"
Transfer-Encoding
chunked
Content-Type
text/css
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 11:34:05 GMT
op.js
tagan.adlightning.com/math-aids-threatpost/
33 KB
12 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/op.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.110 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
d933af0973508b716620c3a327cffb27b092058c43836d000f1472a28cadc026

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-amz-version-id
VoEFgIyKXtLEMn0Jn.EPO8QAciA7W__k
content-encoding
gzip
etag
"5e82040b13de879a8ac1d3f79edfd5d5"
age
1873
x-cache
Hit from cloudfront
status
200
content-length
12262
x-amz-meta-git_commit
cc9018f
last-modified
Fri, 24 Jul 2020 17:21:09 GMT
server
AmazonS3
date
Sat, 25 Jul 2020 11:02:53 GMT
content-type
application/javascript
via
1.1 2d1e1e8dc0f3eb7773ec9d89a7d50ce2.cloudfront.net (CloudFront)
cache-control
max-age=3600
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
x-amz-cf-id
lEr0FlUuRDjTCP7uGDtEZ1Dy22f0xVEllmJebFAs61g6FuXljNfEZQ==
ros-layout.js
qd.admetricspro.com/js/threatpost/
20 KB
3 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/ros-layout.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e6::ac40:c21a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cace34903480e5ed89780d9bb1705ef84720ca19a45996d80240c6a677599b09

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:05 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 24 Jul 2020 10:54:23 GMT
server
cloudflare
status
200
etag
W/"5126-5ab2dcbbc9b3c-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5b8591d9f9f305bb-FRA
cf-request-id
0427597c3f000005bb3206f200000001
expires
Sat, 25 Jul 2020 11:37:40 GMT
gpt.js
www.googletagservices.com/tag/js/
48 KB
16 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c5e5742593fb85b25251acdb96a2f0d31ee17b2eb8b6b8c737714ea1efc56a11
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"581 / 292 of 1000 / last-modified: 1595628830"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
16533
x-xss-protection
0
expires
Sat, 25 Jul 2020 11:34:05 GMT
cmp.js
qd.admetricspro.com/js/threatpost/
218 KB
61 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/cmp.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e6::ac40:c21a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
aaf45a172ec90c76bcecd61c68d998c2256fe9b1700371e80011d1161c5ab629

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:05 GMT
content-encoding
br
cf-cache-status
HIT
age
542
status
200
cf-request-id
0427597c3f000005bb32070200000001
last-modified
Fri, 27 Sep 2019 21:07:46 GMT
server
cloudflare
etag
W/"367ba-5938f47194c80-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5b8591d9f9f705bb-FRA
expires
Sat, 25 Jul 2020 11:27:26 GMT
targeting.js
qd.admetricspro.com/js/threatpost/
275 B
555 B
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/targeting.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e6::ac40:c21a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6cdc57f82f4b0d09e5b4e584ca4736cd3871f20563d4ce25120b057d8ffb4eb2

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:05 GMT
content-encoding
br
cf-cache-status
HIT
age
541
status
200
cf-request-id
0427597c3f000005bb32071200000001
last-modified
Sat, 08 Feb 2020 20:49:18 GMT
server
cloudflare
etag
W/"113-59e16a3cfb471-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5b8591d9f9f905bb-FRA
expires
Sat, 25 Jul 2020 11:27:26 GMT
prebid.js
qd.admetricspro.com/js/threatpost/
384 KB
108 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/prebid.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e6::ac40:c21a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ed1bd9b5fc31e624bb0b3ca2c510546c8a1bb6b41923e06768a735c75a9c704c

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:05 GMT
content-encoding
br
cf-cache-status
HIT
age
541
status
200
cf-request-id
0427597c3f000005bb32072200000001
last-modified
Wed, 22 Jul 2020 04:38:40 GMT
server
cloudflare
etag
W/"601dd-5ab005060aaae-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5b8591d9f9fb05bb-FRA
expires
Sat, 25 Jul 2020 11:27:26 GMT
engine.js
qd.admetricspro.com/js/threatpost/
14 KB
10 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/engine.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e6::ac40:c21a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
8d68191f5a8b81e2ce16e71760665eeed8a03cfc82303a04008700e5fe21d347

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:05 GMT
content-encoding
br
cf-cache-status
HIT
age
542
status
200
cf-request-id
0427597c3f000005bb32073200000001
last-modified
Fri, 17 Jul 2020 16:50:44 GMT
server
cloudflare
etag
W/"38f2-5aaa5f54002ae-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5b8591d9f9fd05bb-FRA
expires
Sat, 25 Jul 2020 11:27:15 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
89 KB
18 KB
Stylesheet
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=d5a1318b
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:1c00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
15e9840f31982980328598c38e5c60434072901f2c902713ef9c4d4900e05307
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:05 GMT
content-encoding
gzip
x-amz-cf-pop
FRA6-C1
x-cache
Miss from cloudfront
status
200
content-length
18049
x-cache-hit
HIT
last-modified
Fri, 24 Jul 2020 12:16:12 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 e0bc02299b03254b2a35b8c930f005c6.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
AxRRn6_z2scZ8bnsda3mRhcGzfK0ytzlRr0n8OxAOyfnrayLwD15Sg==
expires
Sat, 25 Jul 2020 16:35:44 GMT
jquery.js
threatpost.com/wp-includes/js/jquery/
95 KB
37 KB
Script
General
Full URL
https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:05 GMT
Content-Encoding
gzip
Last-Modified
Wed, 10 Jun 2020 22:05:38 GMT
Server
nginx
ETag
W/"5ee15932-17a69"
Transfer-Encoding
chunked
Content-Type
application/x-javascript
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 11:34:05 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
177 KB
55 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/kaspersky-cookies-notification/scripts/alert_text.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert.js,wp-content/plugins/honeypot-comments/public/assets/js/public.js,wp-content/plugins/kspr_twitter_pullquote/js/kaspersky-twitter-pullquote.js,wp-content/themes/threatpost-2018/assets/js/main.js,wp-content/themes/threatpost-2018/assets/js/loadmore.js,wp-content/plugins/kaspersky-social-sharing/assets/js/social-share.js&ver=d5a1318b
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:1c00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
b0209d39595432d762f6ba2a81dc0bffa6a6e1ed9021ba24ffa06c3c7e4bcb02
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:05 GMT
content-encoding
gzip
x-amz-cf-pop
FRA6-C1
x-cache
Miss from cloudfront
status
200
content-length
56256
x-cache-hit
HIT
last-modified
Fri, 24 Jul 2020 12:16:11 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 e0bc02299b03254b2a35b8c930f005c6.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
ZQPSKWR3VFIgW8X2NKc0wZnHOzrTLt-u-U59g1hFEG_jq7SBl9qGaQ==
expires
Sat, 25 Jul 2020 16:35:49 GMT
/
kasperskycontenthub.com/
0
399 B
Script
General
Full URL
https://kasperskycontenthub.com/?dm=ed1f9e435dc885292eab65620c51f3fb&action=load&blogid=103&siteid=1&t=1353520384&back=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:05 GMT
X-Content-Type-Options
nosniff
Server
nginx
X-Frame-Options
SAMEORIGIN
Connection
close
Content-Type
application/javascript
x-cache-hit
MISS
Transfer-Encoding
chunked
X-Debug-Auth
off
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Request-Host
kasperskycontenthub.com
X-XSS-Protection
1; mode=block
new-normal-phishing-scam.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/06/25085723/
132 KB
133 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/06/25085723/new-normal-phishing-scam.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:e400:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f3a5ad8f1154a9cc3879f0e4aa7509b274340d166b1480e297d5d8acc6df12c1

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 25 Jun 2020 13:09:53 GMT
via
1.1 79503619d600dbc1c9e04a650d3d7f3f.cloudfront.net (CloudFront), 1.1 89cb19c6f2c9ed0983294d3b12e80e43.cloudfront.net (CloudFront)
last-modified
Thu, 25 Jun 2020 12:57:25 GMT
server
AmazonS3
age
2586253
etag
"c218118fb64ffe75aadcb6c847da15ba"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA53-C1
accept-ranges
bytes
content-length
135464
x-amz-cf-id
zW3FTMY-Ef54b-XV1chnt_tbd74UjAkvWD_8QsRYTPGCyryzlasseQ==
expires
Fri, 25 Jun 2021 12:57:23 GMT
avatar_default.jpg
i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/
Redirect Chain
  • https://secure.gravatar.com/avatar/fab896982b5c9974407bc14bd8b50b84?s=60&d=https%3A%2F%2Fkasperskycontenthub.com%2Fwp-content%2Fthemes%2Fkaspersky-root%2Fassets%2Fimages%2Favatar_default.jpg&r=g
  • https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
65 B
65 B
Image
General
Full URL
https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.2 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
3a90c56bbc2ea3fae7e089cc529bc02869c5035ee31c3111d829b9ae974cf42d

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
404
x-nc
EXPIRED fra 4
date
Sat, 25 Jul 2020 11:34:06 GMT
server
nginx
content-type
text/html; charset=utf-8

Redirect headers

x-nc
HIT fra 3
date
Sat, 25 Jul 2020 11:34:05 GMT
last-modified
Wed, 11 Jan 1984 08:00:00 GMT
server
nginx
status
302
content-type
text/html; charset=utf-8
location
https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
cache-control
max-age=300
link
<https://www.gravatar.com/avatar/fab896982b5c9974407bc14bd8b50b84?s=60&d=https%3A%2F%2Fkasperskycontenthub.com%2Fwp-content%2Fthemes%2Fkaspersky-root%2Fassets%2Fimages%2Favatar_default.jpg&r=g>; rel="canonical"
content-length
0
expires
Sat, 25 Jul 2020 11:39:05 GMT
subscribe2.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/
8 KB
9 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/subscribe2.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:e400:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
aa64fa30a3263fa3105736228a6feaaa4f7d32d8ef96b12e56f6fb95511b66a7

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 15 Feb 2020 06:22:32 GMT
via
1.1 7ce1191b390045e05b9cc74f7514b77b.cloudfront.net (CloudFront), 1.1 89cb19c6f2c9ed0983294d3b12e80e43.cloudfront.net (CloudFront)
last-modified
Tue, 19 Feb 2019 20:14:58 GMT
server
AmazonS3
age
13929094
etag
"5ba45563f793f39ef6baf02645651654"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA6-C1, FRA53-C1
accept-ranges
bytes
content-length
8281
x-amz-cf-id
POEEfuvSgzAzOw630p--YxdlVnQ5xAfrwzdFOX7xj8udmp26LJ0vdA==
expires
Wed, 19 Feb 2020 20:14:57 GMT
unnamed-300x126.png
media.threatpost.com/wp-content/uploads/sites/103/2020/06/25090132/
25 KB
25 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/06/25090132/unnamed-300x126.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:e400:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
9ea0032753917c317f05190764fa9b873dfc18548d6901c780bc3114ebb88f5b

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 25 Jun 2020 13:10:31 GMT
via
1.1 882f747f39885162595630c95dd0012d.cloudfront.net (CloudFront), 1.1 89cb19c6f2c9ed0983294d3b12e80e43.cloudfront.net (CloudFront)
last-modified
Thu, 25 Jun 2020 13:01:34 GMT
server
AmazonS3
age
2586215
etag
"96c9311fa4e4bfb8d542db06be59f03e"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C2, FRA53-C1
accept-ranges
bytes
content-length
25636
x-amz-cf-id
iQlEir4_S3lS66iS-_WYu4tu2tjGDTg13brffD5odpivZQIHOT2Zng==
expires
Fri, 25 Jun 2021 13:01:32 GMT
coronavirus-phishing-300x149.png
media.threatpost.com/wp-content/uploads/sites/103/2020/06/25083831/
23 KB
24 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/06/25083831/coronavirus-phishing-300x149.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:e400:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4bb83c93e820a6b9fc3444613e14c6430190b2cf7831f424409bedd880bf46a1

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 20 Jul 2020 13:08:46 GMT
via
1.1 07318a09275049862b4535d73a930b7d.cloudfront.net (CloudFront), 1.1 89cb19c6f2c9ed0983294d3b12e80e43.cloudfront.net (CloudFront)
last-modified
Thu, 25 Jun 2020 12:38:32 GMT
server
AmazonS3
age
426320
etag
"9cacb8efcff5fc267313c0bd279e909c"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA53-C1
accept-ranges
bytes
content-length
23845
x-amz-cf-id
w8CsrOE09M1YhodfTmEwcyy8Kh8WMu4c9AiFZtGILhSbhT3dl4op9g==
expires
Fri, 25 Jun 2021 12:38:31 GMT
Blurry-Photo-540x270.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/07/24085230/
17 KB
18 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/07/24085230/Blurry-Photo-540x270.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:e400:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
7a7ceb7b48750a554d38ea389263a0957c4e68c8396d44a560d2f4fdf0abdee7

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 24 Jul 2020 12:54:49 GMT
via
1.1 73f3a23156999272233949c078c30859.cloudfront.net (CloudFront), 1.1 89cb19c6f2c9ed0983294d3b12e80e43.cloudfront.net (CloudFront)
last-modified
Fri, 24 Jul 2020 12:52:46 GMT
server
AmazonS3
age
81557
etag
"ceeae7bcb79c6a290f2437278353d51d"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1, FRA53-C1
accept-ranges
bytes
content-length
17546
x-amz-cf-id
jvYyLa8t048B1eU1UVskv9bwWQo5JIJ9GoUoat4QIi3zj2ug7Kz-BQ==
expires
Sat, 24 Jul 2021 12:52:43 GMT
Malware-Generic-540x270.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/03/11092825/
42 KB
42 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/03/11092825/Malware-Generic-540x270.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:e400:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
799bc904c343ab04dbb361ac369a74d045cda6488fd06f0f475ee41effe7ee40

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 23 Jun 2020 07:52:42 GMT
via
1.1 0176a7920fd558900dd5f893f79acb9e.cloudfront.net (CloudFront), 1.1 89cb19c6f2c9ed0983294d3b12e80e43.cloudfront.net (CloudFront)
last-modified
Wed, 11 Mar 2020 13:28:29 GMT
server
AmazonS3
age
2778084
etag
"4645a22426cc22cb37cb9bbf018608ee"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA53-C1
accept-ranges
bytes
content-length
42907
x-amz-cf-id
7UMKM0z5p31RhxcQFDpjxYC0Z0QDGioZ0KS1tyZfXgEZcPLUCtv2Lg==
expires
Thu, 11 Mar 2021 13:28:28 GMT
COVID_virus_global_video-540x270.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/07/23115346/
52 KB
52 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/07/23115346/COVID_virus_global_video-540x270.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:e400:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
509deaa4ad0d1ebde8f64eea80032043b2297ce86e428c92af2cbc547040339f

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 15:58:41 GMT
via
1.1 b541956a3e11a8d6bd72d74e925ca434.cloudfront.net (CloudFront), 1.1 89cb19c6f2c9ed0983294d3b12e80e43.cloudfront.net (CloudFront)
last-modified
Thu, 23 Jul 2020 15:53:51 GMT
server
AmazonS3
age
156925
etag
"fe65728e39dfa728abda729e0c93627e"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA53-C1
accept-ranges
bytes
content-length
52970
x-amz-cf-id
q22db5vsWE1Qku9olp240b7GtbKe_nNlHVjdm0B75nZo5Iw_Y1k1Mw==
expires
Fri, 23 Jul 2021 15:53:50 GMT
api.js
www.google.com/recaptcha/
674 B
574 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?hl=en
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
fa3d7a81033aa528fcb9e450d51011de199b00b03693595d186eb78191653fd4
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
cross-origin-resource-policy
cross-origin
content-security-policy
frame-ancestors 'self'
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
446
x-xss-protection
1; mode=block
expires
Sat, 25 Jul 2020 11:34:05 GMT
data-leak-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/10/21145020/
2 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/10/21145020/data-leak-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:e400:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
7517792de8d4a1319afd85d8c3dcffe799ba5545129a650182e6c4b055302852

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 16 Jul 2020 20:27:10 GMT
via
1.1 216b2e0a8a27f8fca1b540a1c4ea6922.cloudfront.net (CloudFront), 1.1 89cb19c6f2c9ed0983294d3b12e80e43.cloudfront.net (CloudFront)
last-modified
Mon, 21 Oct 2019 18:50:23 GMT
server
AmazonS3
age
745617
etag
"12bb1aa91531788d81a1791bcbb631f9"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C2, FRA53-C1
accept-ranges
bytes
content-length
2106
x-amz-cf-id
ZWfKuXdzaw3CHUZiXg6ngTFodNTebmBWoL_MPZcdId7xx7y2foovrw==
expires
Tue, 20 Oct 2020 18:50:20 GMT
work-from-home-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/03/13163335/
2 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/03/13163335/work-from-home-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:e400:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3435531b595fb1b2b529346e1df8c979a1fd727f56ea8c0d792316035440cac5

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 10 Jun 2020 20:00:09 GMT
via
1.1 b454a0b154ae18408006bc2a9abd88ec.cloudfront.net (CloudFront), 1.1 89cb19c6f2c9ed0983294d3b12e80e43.cloudfront.net (CloudFront)
last-modified
Fri, 13 Mar 2020 20:33:52 GMT
server
AmazonS3
age
3857637
etag
"fd4942a0704785b24b44d177f4a57d86"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA53-C1
accept-ranges
bytes
content-length
2098
x-amz-cf-id
6Gjj1WKsdxXJT0ck94_t2Kwrpg0cxQdpJS5Asim4LsZlciMYrdFCnw==
expires
Sat, 13 Mar 2021 20:33:49 GMT
36c3-fake-emails-featured-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/01/31170549/
2 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/01/31170549/36c3-fake-emails-featured-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:e400:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1f152c8879492dd153cf7a47ad195151e20491e60985d86f9ef7a7ddc85062f6

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 04 Jun 2020 17:25:36 GMT
via
1.1 5755f825ee6ab59b8a6349608c249e4e.cloudfront.net (CloudFront), 1.1 89cb19c6f2c9ed0983294d3b12e80e43.cloudfront.net (CloudFront)
last-modified
Fri, 31 Jan 2020 22:05:52 GMT
server
AmazonS3
age
4385312
etag
"62a0a00cafda215547f47f6b6f52bdce"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA53-C1
accept-ranges
bytes
content-length
1665
x-amz-cf-id
MLMDcp3bo4N5PlpuY8M7fO10xUvBsTrKqWC4wRmslEmTVsX0TftrLg==
expires
Sat, 30 Jan 2021 22:05:49 GMT
ai-safety-featured-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2018/06/08121133/
2 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2018/06/08121133/ai-safety-featured-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:e400:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5d363c974cd81869ce3fd8d76a06f12b273be51cb358a9a85c21d157eedde824

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 21 May 2020 19:01:41 GMT
via
1.1 e3666efb6956ba7f03c75c3401b8c79e.cloudfront.net (CloudFront), 1.1 89cb19c6f2c9ed0983294d3b12e80e43.cloudfront.net (CloudFront)
last-modified
Tue, 03 Jul 2018 02:40:26 GMT
server
AmazonS3
age
5589146
etag
"29cb0a26bc7f2d80110ca80691f44ecd"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA53-C1
accept-ranges
bytes
content-length
2089
x-amz-cf-id
ycXZc2SiP2fJjz5u2JTjRdWeH4xDUpzaVDT7syM0uIeqRPNV7FMthQ==
expires
Wed, 03 Jul 2019 02:40:23 GMT
microsoft-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/01/22095352/
2 KB
3 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/01/22095352/microsoft-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:e400:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
bcaa21df70fd10c5a594ac5996411eb517750a210903adaa56dc097d5936dc9e

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 19 May 2020 20:38:28 GMT
via
1.1 8b5bc0831e6dab612582614c3009efa7.cloudfront.net (CloudFront), 1.1 89cb19c6f2c9ed0983294d3b12e80e43.cloudfront.net (CloudFront)
last-modified
Wed, 22 Jan 2020 14:53:54 GMT
server
AmazonS3
age
5756139
etag
"872d8d15e18da7498f683a1a4b3d2477"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1, FRA53-C1
accept-ranges
bytes
content-length
2145
x-amz-cf-id
EhaCVEwaANNtl5_GPKHfW-GftNoE1Yssaw4i8WOrCYq4FlfcNbsneg==
expires
Thu, 21 Jan 2021 14:53:52 GMT
liveView.php
live.sekindo.com/live/
28 KB
8 KB
Script
General
Full URL
https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
87b57b7c79b715d492b3cf38b5213286b18d8b73fe4cdb0acdfbcdc87ed1e146

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:05 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/javascript; charset=utf-8
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
2 KB
1 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/jquery.json.min.js&ver=d5a1318b
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:1c00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
172314ff74044b918766ed4763279b5e8798622087c0a2930f59c9d44662213d
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:06 GMT
content-encoding
gzip
x-amz-cf-pop
FRA6-C1
x-cache
Miss from cloudfront
status
200
content-length
926
x-cache-hit
HIT
last-modified
Fri, 24 Jul 2020 12:16:11 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 e0bc02299b03254b2a35b8c930f005c6.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
I9S10KKPsVikT4eNbWCzWD_Q6LxCjaVCKE7VEr0ZlJaJMn9AGEtXYg==
expires
Sat, 25 Jul 2020 16:35:44 GMT
gravityforms.min.js
threatpost.com/wp-content/plugins/gravityforms/js/
34 KB
12 KB
Script
General
Full URL
https://threatpost.com/wp-content/plugins/gravityforms/js/gravityforms.min.js?ver=2.4.17.15
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
3097d0444becd9d089b52b7074072f19201525de874d0775012572fb375b7838

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Jul 2020 12:16:11 GMT
Server
nginx
ETag
W/"5f1ad10b-88c2"
Transfer-Encoding
chunked
Content-Type
application/x-javascript
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 11:34:06 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
7 KB
3 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/conditional_logic.min.js&ver=d5a1318b
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:1c00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
f75166e3f70100b65a6ce1d4128bc15286e92b19a546fa7709f739e9bcfe52c6
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:06 GMT
content-encoding
gzip
x-amz-cf-pop
FRA6-C1
x-cache
Miss from cloudfront
status
200
content-length
2685
x-cache-hit
HIT
last-modified
Fri, 24 Jul 2020 12:16:08 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 e0bc02299b03254b2a35b8c930f005c6.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
7rxfq-Hxmgu1C0ewdT2jkyu5xg8gK_7zS06cCEvbo56lFoqsvG4NgA==
expires
Sat, 25 Jul 2020 16:35:41 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
5 KB
2 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/placeholders.jquery.min.js&ver=d5a1318b
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:1c00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
d62a7b7ec5313469ebff5c006b9068dc44d6d1c122cf787ffa29a10113b34060
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:06 GMT
content-encoding
gzip
x-amz-cf-pop
FRA6-C1
x-cache
Miss from cloudfront
status
200
content-length
1747
x-cache-hit
HIT
last-modified
Fri, 24 Jul 2020 12:16:09 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 e0bc02299b03254b2a35b8c930f005c6.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
gGyPw8hLoREYDfPGyvGV0hboynOlua7jjq77wTf9fY5cfipb_SeZ0Q==
expires
Sat, 25 Jul 2020 16:35:49 GMT
api.js
www.google.com/recaptcha/
676 B
521 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?hl=en&render=explicit&ver=5.4.2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
0e669f69d0d5871e548dbb229e3bebf12dec178b21276546a23785618dd74ab3
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
cross-origin-resource-policy
cross-origin
content-security-policy
frame-ancestors 'self'
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
447
x-xss-protection
1; mode=block
expires
Sat, 25 Jul 2020 11:34:05 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
2 KB
1 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/js/wp-embed.min.js,wp-content/plugins/akismet/_inc/form.js&ver=d5a1318b
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:1c00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
21e46fe44c6929876f5a413c843ae516c0ddfd1aad3e8e33446b7bc0a6781b08
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:06 GMT
content-encoding
gzip
x-amz-cf-pop
FRA6-C1
x-cache
Miss from cloudfront
status
200
content-length
973
x-cache-hit
HIT
last-modified
Wed, 10 Jun 2020 22:05:38 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 e0bc02299b03254b2a35b8c930f005c6.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
_tMkWmQceLANzjWltOVON-Aq4wDgIEYb7XU0Fqh3vsw4zFIXsON8iQ==
expires
Sat, 25 Jul 2020 16:35:47 GMT
b-cc9018f-2cba83b0.js
tagan.adlightning.com/math-aids-threatpost/
58 KB
20 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-cc9018f-2cba83b0.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.110 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
92814e48e334fb45bb8d9d0d2a6e68a1e601fd7ce63d25c10969cfd57bf4b1e8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 07 Jul 2020 18:05:52 GMT
content-encoding
gzip
age
1531694
x-cache
Hit from cloudfront
status
200
content-length
19746
x-amz-meta-git_commit
cc9018f
last-modified
Tue, 07 Jul 2020 17:59:39 GMT
server
AmazonS3
etag
"21fe90f3aceeb46480a69949d763c756"
x-amz-version-id
KDx1ypMRqiob.YrLSDtIdsXad7Sl2JS5
via
1.1 2d1e1e8dc0f3eb7773ec9d89a7d50ce2.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
9v8Xdv42qC9OYroKE6LNnlWv6QHt6N7jom3EtyDjci-p9xbs7SckGQ==
bl-cc9018f-8cdfc568.js
tagan.adlightning.com/math-aids-threatpost/
62 KB
18 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.110 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1f3d486ddbb9dda160529fdf0d8a6f4c1e77024078294664fb0456e9b33ba648

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 24 Jul 2020 17:22:10 GMT
content-encoding
gzip
age
65516
x-cache
Hit from cloudfront
status
200
content-length
18264
x-amz-meta-git_commit
cc9018f
last-modified
Fri, 24 Jul 2020 17:20:50 GMT
server
AmazonS3
etag
"35c351702648e8545a61bf940b50fb5c"
x-amz-version-id
YqdsBXP6TUW_8NLIciYdX4aAa4RYWjap
via
1.1 2d1e1e8dc0f3eb7773ec9d89a7d50ce2.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
jPESuW6wM34gvtRWnbhuLH_sm3uG-FlosIzI0qqvsXaxhOKVcq-XXw==
pubads_impl_2020072001.js
securepubads.g.doubleclick.net/gpt/
253 KB
89 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
31e539be75870ad6cec377525eb196ea9fbc423ea53d68c03b2c94b96701bc47
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Sat, 25 Jul 2020 11:34:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 20 Jul 2020 13:10:24 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
91349
x-xss-protection
0
expires
Sat, 25 Jul 2020 11:34:05 GMT
integrator.sync.js
adservice.google.de/adsid/
113 B
175 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.sync.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ea03bfd7fdda1eac185ebc3e8e74b33065b04c8e0adc48cbbd4136748dbd2742
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:34:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
108
x-xss-protection
0
apstag.js
c.amazon-adsystem.com/aax2/
102 KB
26 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: t.co
URL: https://t.co/X0ukaAEsUs
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.0.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Server /
Resource Hash
7301462cb27dcb0cf467822211f6cdd478be091ed9d776b29f426ce78c4a414f

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:21:25 GMT
content-encoding
gzip
server
Server
age
761
etag
b586b236f6b3db3c4ca9410451195336
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=900
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
Yz4rQudyUr-7DJT_eN5SnzKEh2IRcgaFy9zLQ8qlonk9Gx58b7CkGA==
via
1.1 d5fb859c39a16d7f218b4c7fb1528ad6.cloudfront.net (CloudFront)
ADTECH;apid=1Abf620004-ce6a-11ea-8ab1-1201d05c7be8;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=578243e7ce73529;misc=1595676845861
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=578243e7ce73529;misc=1595676845861;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=578243e7ce73529;misc=1595676845861
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1Abf620004-ce6a-11ea-8ab1-1201d05c7be8;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=578243e7ce73529;misc=15...
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1Abf620004-ce6a-11ea-8ab1-1201d05c7be8;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=578243e7ce73529;misc=1595676845861
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
53a0c7e02ca720db2c3570fa9a67e87c7df3dbc4f22cd4a37d43d06842848bf4

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
1225
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1Abf620004-ce6a-11ea-8ab1-1201d05c7be8;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=578243e7ce73529;misc=1595676845861
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=580116e7f7363ee;misc=1595676845861
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=580116e7f7363ee;misc=1595676845861;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=580116e7f7363ee;misc=1595676845861
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=580116e7f7363ee;misc=1595676845861
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
3e1c21847d9d7904cc0102a4f14fb4d5f4f0db0b7f6f245b85bb46d0ab140cb8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
1225
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=580116e7f7363ee;misc=1595676845861
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=595f400fb82a9c5;misc=1595676845862
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=595f400fb82a9c5;misc=1595676845862;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=595f400fb82a9c5;misc=1595676845862
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=595f400fb82a9c5;misc=1595676845862
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
528c7333a1b55bc7f12e361eda2b3af4f4368ffeabf6113b7cceb352a6eee117

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
1225
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=595f400fb82a9c5;misc=1595676845862
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Abf61d020-ce6a-11ea-ad7f-12d220623a1c;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=60c5dacb3718188;misc=1595676845862
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=60c5dacb3718188;misc=1595676845862;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=60c5dacb3718188;misc=1595676845862
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1Abf61d020-ce6a-11ea-ad7f-12d220623a1c;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=60c5dacb3718188;misc=15...
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1Abf61d020-ce6a-11ea-ad7f-12d220623a1c;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=60c5dacb3718188;misc=1595676845862
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
3766e1b675a288c7b4fba77c4b2094668fda6e28f286bfa499a5f7b107a878f2

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
1224
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1Abf61d020-ce6a-11ea-ad7f-12d220623a1c;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=60c5dacb3718188;misc=1595676845862
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Abf61d3f4-ce6a-11ea-9a39-12a93b07bf66;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=6187ec6e3aedcf9;misc=1595676845862
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=6187ec6e3aedcf9;misc=1595676845862;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=6187ec6e3aedcf9;misc=1595676845862
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1Abf61d3f4-ce6a-11ea-9a39-12a93b07bf66;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=6187ec6e3aedcf9;misc=15...
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1Abf61d3f4-ce6a-11ea-9a39-12a93b07bf66;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=6187ec6e3aedcf9;misc=1595676845862
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
303b420dce6fbc9718111fae303f2f33ff3e44fc99f7b57097dae88d6041cc20

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
1224
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1Abf61d3f4-ce6a-11ea-9a39-12a93b07bf66;cfp=1;rndc=1595676845;v=2;cmd=bid;cors=yes;alias=6187ec6e3aedcf9;misc=1595676845862
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
c
prebid.a-mo.net/a/
46 B
359 B
XHR
General
Full URL
https://prebid.a-mo.net/a/c
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
107.21.45.77 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
Cowboy /
Resource Hash
b772aa5eae66bd6950ad98e921ff28e7c4183bc5e04e5f4c591eaf608ab994fd

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

date
Sat, 25 Jul 2020 11:34:06 GMT
server
Cowboy
status
200
vary
origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://threatpost.com
cache-control
max-age=0, private, must-revalidate
access-control-allow-credentials
true
content-length
46
v2
e.serverbid.com/api/
711 B
984 B
XHR
General
Full URL
https://e.serverbid.com/api/v2
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
134.209.129.254 North Bergen, United States, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
/
Resource Hash
f4b064d961dd5c30917481f9cf22f400d352737e7dac10d70e574877eef1e8ea

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

status
200
date
Sat, 25 Jul 2020 11:34:05 GMT
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
content-length
711
vary
Origin
content-type
application/json
prebid
ib.adnxs.com/ut/v3/
19 B
710 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.172.37 , Ascension Island, ASN29990 (ASN-APPNEX, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
0c09c070833c786cb25be38bc30992b30bad578f817dbc9e34beacd8b8ea44c5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:05 GMT
X-Proxy-Origin
194.99.105.99; 194.99.105.99; 691.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.176:80
AN-X-Request-Uuid
81586bd0-6bbb-44b3-9b17-f8e767e5540b
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
19
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
263 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=2&alt_size_ids=55%2C57&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&tk_flint=pbjs_lite_v3.26.0&x_source.tid=6db0db52-8985-4b43-8ebc-ef319376be6f&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.5821828652395566
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
213.19.162.31 , United Kingdom, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
nginx/1.16.0 /
Resource Hash
bb5cc9f6ba1f74ca76f9f97f7b8c2ff72c4dae5f1af6fe50a470178142512f36

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:05 GMT
Server
nginx/1.16.0
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Keep-Alive
timeout=5
Content-Length
263
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
241 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=15&alt_size_ids=16&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&tk_flint=pbjs_lite_v3.26.0&x_source.tid=ec82f94d-3f09-4970-b825-41f7b43f606b&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.7628026984794003
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
213.19.162.31 , United Kingdom, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
nginx/1.16.0 /
Resource Hash
fdb12e71ae01ed9e602ce4d489f079c771bb44ff9ffaf8266b15872b014a4a85

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:06 GMT
Server
nginx/1.16.0
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Keep-Alive
timeout=5
Content-Length
241
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
3 KB
3 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509506&size_id=15&alt_size_ids=10&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&tk_flint=pbjs_lite_v3.26.0&x_source.tid=0d743167-2e20-4ddd-9a46-a2d26d27da56&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.42234042022083007
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
213.19.162.31 , United Kingdom, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
nginx/1.16.0 /
Resource Hash
a94ea9d22fcf527832e83f60ded4a01a6d82c815ea041796458b8e74b9d0b6a7

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Server
nginx/1.16.0
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Keep-Alive
timeout=5
Content-Length
1511
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
261 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=15&alt_size_ids=10&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&tk_flint=pbjs_lite_v3.26.0&x_source.tid=0d743167-2e20-4ddd-9a46-a2d26d27da56&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.6192986005108025
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
213.19.162.31 , United Kingdom, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
nginx/1.16.0 /
Resource Hash
87404d413680c13ac041f8aad492d5e595f451634c25cd1b06121bc36b5a570a

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:06 GMT
Server
nginx/1.16.0
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Keep-Alive
timeout=5
Content-Length
261
Expires
Wed, 17 Sep 1975 21:32:10 GMT
adreq
ads.servenobid.com/
220 B
462 B
XHR
General
Full URL
https://ads.servenobid.com/adreq?cb=64
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.253.1.139 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
9b6f978227e696adf7590eda7f1584127e3556fba5c823c8844a6fea4ca8f9ae

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

date
Sat, 25 Jul 2020 11:34:06 GMT
content-encoding
gzip
amp-access-control-allow-source-origin
*
status
200
vary
accept-encoding
content-type
application/json
access-control-allow-origin
https://threatpost.com
access-control-expose-headers
AMP-Access-Control-Allow-Source-Origin
access-control-allow-credentials
true
cygnus
as-sec.casalemedia.com/
25 B
988 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=438654&v=7.2&r=%7B%22id%22%3A%22282f42de711d1cb%22%2C%22imp%22%3A%5B%7B%22id%22%3A%22298cdfc2a195472%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438654%22%2C%22sid%22%3A%22728x90%22%7D%2C%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%2230531997e109b5b%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438649%22%2C%22sid%22%3A%22300x250%22%7D%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%2231b5abdcd4dbccc%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438650%22%2C%22sid%22%3A%22300x250%22%7D%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%22298cdfc2a195472%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438654%22%2C%22sid%22%3A%22970x250%22%7D%2C%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%22298cdfc2a195472%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438654%22%2C%22sid%22%3A%22970x90%22%7D%2C%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%2230531997e109b5b%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438649%22%2C%22sid%22%3A%22336x280%22%7D%2C%22banner%22%3A%7B%22w%22%3A336%2C%22h%22%3A280%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%2231b5abdcd4dbccc%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438650%22%2C%22sid%22%3A%22300x600%22%7D%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%7D%5D%2C%22site%22%3A%7B%22ref%22%3A%22https%3A%2F%2Ft.co%2FX0ukaAEsUs%22%2C%22page%22%3A%22https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F%22%7D%2C%22ext%22%3A%7B%22source%22%3A%22prebid%22%7D%2C%22source%22%3A%7B%22ext%22%3A%7B%22schain%22%3A%7B%22ver%22%3A%221.0%22%2C%22complete%22%3A1%2C%22nodes%22%3A%5B%7B%22asi%22%3A%22admetricspro.com%22%2C%22sid%22%3A%221005%22%2C%22hp%22%3A1%7D%5D%7D%7D%7D%7D&ac=j&sd=1
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.254.129 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache /
Resource Hash
ae3d4975078d7a40020a200d7718d419c9ffb5a3c25f55756613b614456b31d6

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
45
Expires
Sat, 25 Jul 2020 11:34:06 GMT
prebid
ib.adnxs.com/ut/v3/
19 B
709 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.172.37 , Ascension Island, ASN29990 (ASN-APPNEX, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
0c09c070833c786cb25be38bc30992b30bad578f817dbc9e34beacd8b8ea44c5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:06 GMT
X-Proxy-Origin
194.99.105.99; 194.99.105.99; 691.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.49:80
AN-X-Request-Uuid
16aa18e9-3f32-4b5c-9ef3-34377e1a172e
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
19
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
translator
hbopenbid.pubmatic.com/
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Sat, 25 Jul 2020 11:34:06 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
arj
teachingaids-d.openx.net/w/1.0/
173 B
379 B
XHR
General
Full URL
https://teachingaids-d.openx.net/w/1.0/arj?ju=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&ch=UTF-8&res=1600x1200x24&ifr=false&tz=-120&tws=1600x1200&be=1&bc=hb_pb_3.0.2&dddid=6db0db52-8985-4b43-8ebc-ef319376be6f%2C6db0db52-8985-4b43-8ebc-ef319376be6f%2Cec82f94d-3f09-4970-b825-41f7b43f606b%2C0d743167-2e20-4ddd-9a46-a2d26d27da56%2C0d743167-2e20-4ddd-9a46-a2d26d27da56&nocache=1595676845890&pubcid=aff8ef30-5d8c-4f56-bb65-5f576a8387c1&schain=1.0%2C1!admetricspro.com%2C1005%2C1%2C%2C%2C&aus=728x90%2C970x250%2C970x90%7C728x90%2C970x250%2C970x90%7C300x250%2C336x280%7C300x250%2C300x600%7C300x250%2C300x600&divIds=div-gpt-ad-6794670-2%2Cdiv-gpt-ad-6794670-2%2Cdiv-gpt-ad-6794670-3%2Cdiv-gpt-ad-6794670-5%2Cdiv-gpt-ad-6794670-5&auid=540932704%2C540932709%2C540932713%2C540932715%2C540932720
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.98.64.218 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
OXGW/16.190.0 /
Resource Hash
bb1e0c589269a01e8050ef6921fb81758898c659fe4ce6ecfccccb0bf9ed17f2

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
content-encoding
gzip
server
OXGW/16.190.0
status
200
vary
Accept, Accept-Encoding
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
165
via
1.1 google
expires
Mon, 26 Jul 1997 05:00:00 GMT
bid
ap.lijit.com/rtb/
47 B
723 B
XHR
General
Full URL
https://ap.lijit.com/rtb/bid?src=prebid_prebid_3.26.0
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
216.52.2.48 , United States, ASN29791 (VOXEL-DOT-NET, US),
Reverse DNS
Software
nginx /
Resource Hash
a9f6682f28fd85ad34794d5129c6cec0a72a45ba6e144596dc348ea6bec4f8b3

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Server
nginx
Vary
Accept-Encoding, User-Agent
Access-Control-Allow-Methods
GET, POST, DELETE, PUT
Content-Type
application/json
Access-Control-Allow-Origin
https://threatpost.com
Access-Control-Allow-Credentials
true
X-Sovrn-Pod
ad_ap5ams1
Access-Control-Allow-Headers
X-Requested-With, Content-Type
Content-Length
65
auction
tlx.3lift.com/header/
19 B
310 B
XHR
General
Full URL
https://tlx.3lift.com/header/auction?lib=prebid&v=3.26.0&referrer=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&tmax=1200
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.195.225.18 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
0535c3bb3a17e4ac0fb7d29214d2181275662129dc2bdd2a89c35934e9fc5ba5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
x-auction-status
12, 12, 12
status
200
content-type
application/json; charset=utf-8
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
19
x-xss-protection
0
expires
Thu, 15 Oct 1992 20:10:00 GMT
gtm.js
www.googletagmanager.com/
128 KB
43 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
814c9e25fc26b3d979206c4ed5dc4193144f7f58b33af8d67c35b4f1394aa1b3
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:06 GMT
content-encoding
br
vary
Accept-Encoding
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
43541
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 09:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Sat, 25 Jul 2020 11:34:06 GMT
icons.svg
threatpost.com/wp-content/themes/threatpost-2018//assets/sprite/
13 KB
5 KB
Other
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018//assets/sprite/icons.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
01864580e1f385dc4512aed0de4b324cc1a04812709e7020e857612fc0ce9f4c

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Jul 2020 12:16:12 GMT
Server
nginx
ETag
W/"5f1ad10c-3496"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 11:34:06 GMT
icons.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/
13 KB
5 KB
Other
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/icons.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
01864580e1f385dc4512aed0de4b324cc1a04812709e7020e857612fc0ce9f4c

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Jul 2020 12:16:11 GMT
Server
nginx
ETag
W/"5f1ad10b-3496"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 11:34:06 GMT
recaptcha__en.js
www.gstatic.com/recaptcha/releases/r8WWNwsCvXtk22_oRSVCCZx9/
330 KB
130 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/r8WWNwsCvXtk22_oRSVCCZx9/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?hl=en
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
61394e856497a7705a004cb627296445fe074d1f78b10ab81071915059b5a926
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 20 Jul 2020 16:39:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 20 Jul 2020 04:04:52 GMT
server
sffe
age
413686
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
133183
x-xss-protection
0
expires
Tue, 20 Jul 2021 16:39:20 GMT
logo.png
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
19 KB
19 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/logo.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
39af7c1116fb967a330e8770f775e6b5ee871add01ed45c98a1634911cebfb0a

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592974
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:06 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:11 GMT
Server
nginx
ETag
"5f1ad10b-4a32"
Content-Type
image/png
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
18994
Expires
Sat, 01 Aug 2020 11:34:06 GMT
museosans-300-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-300-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
45ddc09b0ad6ab916bd9a0282070b161045e186fc025303f4aa1aa821fc45ac7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592974
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:06 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:13 GMT
Server
nginx
ETag
"5f1ad10d-51b8"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20920
Expires
Sun, 25 Jul 2021 11:34:06 GMT
mail-plane-light.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
828 B
722 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/mail-plane-light.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
5a7ed822968963e31d88424c96387ad9f4fd4f4b5a5b581a33f65e3784d162cf

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592974
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Jul 2020 12:16:12 GMT
Server
nginx
ETag
W/"5f1ad10c-33c"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 11:34:06 GMT
twitter-blue.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
868 B
847 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/twitter-blue.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
420508fc523520f35de5c851905543294123d7676b5a5668744691f2abe9e730

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592974
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Jul 2020 12:16:11 GMT
Server
nginx
ETag
W/"5f1ad10b-364"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 11:34:06 GMT
museosans-700-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-700-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
ae00ae9c862bc8b8923efd1d9a18befa912678a869d4dd01179a59ed3de731be

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592974
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:06 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:13 GMT
Server
nginx
ETag
"5f1ad10d-51a4"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20900
Expires
Sun, 25 Jul 2021 11:34:06 GMT
museosans-100-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-100-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
06fc565587b8b700936a1677218cb269a6cc31ca5f701eb45461e86a3d54d5c7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592974
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:06 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:12 GMT
Server
nginx
ETag
"5f1ad10c-50c8"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20680
Expires
Sun, 25 Jul 2021 11:34:06 GMT
museosans-500-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-500-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
2de77164bb9924542e1dea4ee4a0ff27d40b51a3d7939dac7db11a95045c9b7d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592974
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:06 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:12 GMT
Server
nginx
ETag
"5f1ad10c-5194"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20884
Expires
Sun, 25 Jul 2021 11:34:06 GMT
museosans-700italic-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
15 KB
16 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-700italic-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
859faa9b9ed0990288b2f393a102b1fe2668ac79088b113b6f0beaee521221eb

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592974
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:06 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:13 GMT
Server
nginx
ETag
"5f1ad10d-3dcc"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
15820
Expires
Sun, 25 Jul 2021 11:34:06 GMT
analytics.js
www.google-analytics.com/
45 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
fd361b57998c76f86335afa28b8a62527d88a8200fb5c428d6f0fff73383e955
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 04 Jun 2020 23:38:14 GMT
server
Golfe2
age
3624
date
Sat, 25 Jul 2020 10:33:42 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18469
expires
Sat, 25 Jul 2020 12:33:42 GMT
quant.js
secure.quantserve.com/
22 KB
8 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:116:800d:21:36a9:ecb:e518:b308 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
8130c2c72afad9d94581ef93aaa00524093103c47c71fce52f606d5ff693c3ce
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:06 GMT
content-encoding
gzip
last-modified
Sat, 25-Jul-2020 11:34:06 GMT
etag
M0-2a172724
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
private, no-transform, max-age=604800
strict-transport-security
max-age=86400
content-length
8060
expires
Sat, 01 Aug 2020 11:34:06 GMT
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:06 GMT
content-encoding
gzip
age
50528
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-hhn4036-HHN
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1595676846.349719,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes
liveView.php
live.sekindo.com/live/ Frame D267
2 KB
1 KB
Script
General
Full URL
https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595676846&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
784c76087f06576583ff0e6b822637e0bac5460c6659db61b9f2cca8d68ebf2c

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:05 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/javascript; charset=utf-8
bid
c.amazon-adsystem.com/e/dtb/
23 B
369 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=600&u=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&pr=https%3A%2F%2Ft.co%2FX0ukaAEsUs&pid=Hi4uiBBWhtUZj&cb=0&ws=1600x1200&v=7.52.00&t=1200&slots=%5B%7B%22sd%22%3A%220%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%2C%22970x90%22%5D%2C%22sn%22%3A%22%2F21707124336%2FThreatPost-970x250-ATF%22%7D%2C%7B%22sd%22%3A%221%22%2C%22s%22%3A%5B%22300x250%22%2C%22336x280%22%5D%2C%22sn%22%3A%22%2F21707124336%2FThreatPost-300x250-ATF%22%7D%2C%7B%22sd%22%3A%222%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%2C%22sn%22%3A%22%2F21707124336%2FThreatPost-300x600-ATF%22%7D%2C%7B%22sd%22%3A%223%22%2C%22s%22%3A%5B%222x2%22%5D%2C%22sn%22%3A%22%2F21707124336%2FThreatPost-2x2-Skin%22%7D%5D&pubid=cb8cfc89-e83e-44aa-a3a2-ff78eda781ef&gdprl=%7B%22status%22%3A%22no-cmp%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.0.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Server /
Resource Hash
745a085b52b8371ec6705413fca70a28c6d8bff0db480e6b124bd08c54e95ef8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:06 GMT
via
1.1 d5fb859c39a16d7f218b4c7fb1528ad6.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
FRA6-C1
status
200
vary
User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://threatpost.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
23
x-amz-cf-id
QL5G_tApUB7UCeivSbxCJLqGo98uC67C_RaYrIdhrWLYQ3qNx74Agw==
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.0.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 05:54:51 GMT
content-encoding
gzip
vary
Accept-Encoding,Origin
age
20356
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Tue, 23 Jun 2020 10:10:39 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
nPbvyPY1thQPMAt1wOhzw94nnbsehPPZ-GhQv3hVb6fkF38nNn11RA==
mail-plane-large-dark.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
812 B
722 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/mail-plane-large-dark.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
a9d2b2df99c1a115d5394c70a898d8801092208dc582f8bd6fb01b35c30d6b22

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592974
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:07 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Jul 2020 12:16:13 GMT
Server
nginx
ETag
W/"5f1ad10d-32c"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 11:34:07 GMT
logo-white.png
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
10 KB
10 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/logo-white.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
e4058d4ee9da1ceaddfa91ddb63650ba67285f1bbfee487d9dfe648bced669a0

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592974
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:07 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:11 GMT
Server
nginx
ETag
"5f1ad10b-260a"
Content-Type
image/png
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
9738
Expires
Sat, 01 Aug 2020 11:34:07 GMT
museosans-300italic-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
23 KB
23 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-300italic-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
f8a2b5b62eb722c3379b30cf0cc58d3176ee6be48036d6ad2aa838d2029c4189

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592974
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:06 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:12 GMT
Server
nginx
ETag
"5f1ad10c-5bac"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
23468
Expires
Sun, 25 Jul 2021 11:34:06 GMT
rules-p-_7kVx0t9Jqj90.js
rules.quantcount.com/
3 B
354 B
Script
General
Full URL
https://rules.quantcount.com/rules-p-_7kVx0t9Jqj90.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:8800:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:30:23 GMT
via
1.1 e0bc02299b03254b2a35b8c930f005c6.cloudfront.net (CloudFront)
last-modified
Fri, 03 Mar 2017 23:52:35 GMT
server
AmazonS3
age
223
etag
"8a80554c91d9fca8acb82f023de02f11"
x-cache
Error from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=300
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-length
3
x-amz-cf-id
ReFLI3JICkM-K6Gg1yofwMX1EnVj5waKjjz3JyzFu0ie8xNa4hZ9PA==
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j83&aip=1&a=474978470&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-35676203-21&cid=967429594.1595676846&jid=578882700&_gid=1994450975.1595676846&gjid=575862329&_v=j83&z=1312501925
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=967429594.1595676846&jid=578882700&_v=j83&z=1312501925
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=967429594.1595676846&jid=578882700&_v=j83&z=1312501925&slf_rd=1&random=420067601
42 B
106 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=967429594.1595676846&jid=578882700&_v=j83&z=1312501925&slf_rd=1&random=420067601
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=967429594.1595676846&jid=578882700&_v=j83&z=1312501925&slf_rd=1&random=420067601
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
119 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j83&aip=1&a=474978470&t=event&ni=0&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&dr=https%3A%2F%2Ft.co%2FX0ukaAEsUs&ul=en-us&de=UTF-8&dt=Office%20365%20Users%20Targeted%20By%20%27Coronavirus%20Employee%20Training%27%20Phish%20%7C%20Threatpost&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=VISIBILITY&ea=elementVisibility%20%2F%20%5BHeader%5D%20%2F%20Social%20Networks%20View&_u=YEDAAEAB~&jid=&gjid=&cid=967429594.1595676846&tid=UA-35676203-21&_gid=1994450975.1595676846&gtm=2wg7f0PM29HLF&z=2138898825
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jul 2020 23:36:17 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
302269
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
iab_consent_sdk.v1.0.js
live.sekindo.com/content/ClientDetections/ Frame D267
19 KB
6 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/iab_consent_sdk.v1.0.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595676846&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
a3336e3373c170b40764f5a62d121335bec4243b0034e561937194dfe2e413fd

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Last-Modified
Wed, 12 Feb 2020 15:01:36 GMT
Server
nginx
ETag
W/"5e441350-4be0"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Sun, 25 Jul 2021 11:34:06 GMT
DetectGDPR2.v1.1.js
live.sekindo.com/content/ClientDetections/ Frame D267
9 KB
3 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/DetectGDPR2.v1.1.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595676846&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
0cf25abe73b03e246c0a820c825a1f433e36949c2cf456ce889d86e8dd9ec427

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:05 GMT
Content-Encoding
gzip
Last-Modified
Wed, 08 Jul 2020 16:36:53 GMT
Server
nginx
ETag
W/"5f05f625-225b"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Sun, 25 Jul 2021 11:34:05 GMT
DetectGDPR.v1.1.js
live.sekindo.com/content/ClientDetections/ Frame D267
8 KB
3 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/DetectGDPR.v1.1.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595676846&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
f40e3d5b91387e92272b6d46fc83ce21041f130a29316d7216d3a1793d46c4f3

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Last-Modified
Wed, 08 Jul 2020 16:36:52 GMT
Server
nginx
ETag
W/"5f05f624-1ec4"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Sun, 25 Jul 2021 11:34:06 GMT
hls.0.12.4_1.min.js
live.sekindo.com/content/video/hls/ Frame D267
247 KB
85 KB
Script
General
Full URL
https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595676846&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
7d0492c66125b1c2bdc419641e41542857e7d90e323d355ee0b8bb268da121fb

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:05 GMT
Content-Encoding
gzip
Last-Modified
Mon, 06 Jan 2020 15:31:55 GMT
Server
nginx
ETag
W/"5e1352eb-3dcb9"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Sun, 25 Jul 2021 11:34:05 GMT
prebidVid.3.19.0_9.min.js
live.sekindo.com/content/prebid/ Frame D267
296 KB
108 KB
Script
General
Full URL
https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595676846&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
7860ef37e85676dcb81a99d7e5d6453bdacdf9d35aa45517a9ba9ea25bbd4c85

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jul 2020 14:28:49 GMT
Server
nginx
ETag
W/"5f106421-4a003"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Sun, 25 Jul 2021 11:34:06 GMT
liveVideo.php
live.sekindo.com/live/ Frame D267
431 KB
121 KB
Script
General
Full URL
https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c18ae4215a&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.1589&geoLong=21.0005&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595676846&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
1436049deb035fa6eebc2101acf969f57981e0222c60014a4f2883d8ab704fb7

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Server
nginx
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
adsct
t.co/i/
43 B
368 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=ntt0j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.5 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:06 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
111
pragma
no-cache
last-modified
Sat, 25 Jul 2020 11:34:06 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=0
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
558f1bffca1e3d121b2813bd82891e5c
x-transaction
002e173d00783500
expires
Tue, 31 Mar 1981 05:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
169 KB
22 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=963566003084320&correlator=2262907124516162&output=ldjh&impl=fifs&adsid=NT&eid=21066748%2C21066532&vrg=2020072001&tfua=0&tfcd=0&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200725&iu_parts=21707124336%2CThreatPost-970x250-ATF%2CThreatPost-300x250-ATF%2CThreatPost-300x600-ATF%2CThreatPost-2x2-Skin&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3%2C%2F0%2F4&prev_iu_szs=728x90%7C970x250%7C970x90%2C300x250%7C336x280%2C300x250%7C300x600%2C2x2&prev_scp=amznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%26hb_adid_rubicon%3D6353f9991f517d7%26hb_bidder_rubicon%3Drubicon%26dyn_bids%3D0.01%26hb_adid%3D6353f9991f517d7%26hb_bidder%3Drubicon%7Camznbid%3D2%26amznp%3D2&eri=1&cust_params=urlhost%3Dhttps%253A%252F%252Fthreatpost.com%252F%26urlpath%3D%252Foffice-365-users-targeted-by-coronavirus-employee-training-phish%252F156899%252F%26urlquery%3Dgoogfc%26contentid%3D156899%26category%3Dmalware-2%26contenttags%3Dblack-lives-matter%252Ccoronavirus%252Ccovid-19%252Ccyber-attacks-0%252Cemail%252Cemployees%252Clockdown%252Cmalware%252Cphishing%252Cspam%252Cthreat-actors%252Ctraining%252Ctrickbot&cookie_enabled=1&bc=31&abxe=1&lmt=1595676846&dt=1595676846485&dlt=1595676845084&idt=683&frm=20&biw=1600&bih=1200&oid=3&adxs=436%2C1082%2C1082%2C0&adys=10%2C257%2C1543%2C0&adks=1015519800%2C654286612%2C375389812%2C3385906655&ucis=1%7C2%7C3%7C4&ifi=1&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&ref=https%3A%2F%2Ft.co%2FX0ukaAEsUs&dssz=42&icsg=176173059&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=728x90%7C300x250%7C300x250%7C1600x2&msz=728x90%7C300x250%7C300x250%7C1600x2&ga_vid=967429594.1595676846&ga_sid=1595676846&ga_hid=474978470&fws=0%2C0%2C0%2C0&ohw=0%2C0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
c3a6c9c6f98bf00c5095dcf432ea98ea00819116d9e434f85a1ba78c8991a539
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:06 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
22506
x-xss-protection
0
google-lineitem-id
-1,-1,-1,5283645110
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-1,-1,-1,138301519116
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://threatpost.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
176f23c8ee7cb75cdd281894c8d1d9e1.safeframe.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://176f23c8ee7cb75cdd281894c8d1d9e1.safeframe.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

apstag.js
c.amazon-adsystem.com/aax2/ Frame D267
102 KB
26 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c18ae4215a&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.1589&geoLong=21.0005&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.0.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Server /
Resource Hash
7301462cb27dcb0cf467822211f6cdd478be091ed9d776b29f426ce78c4a414f

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:21:25 GMT
content-encoding
gzip
server
Server
age
761
etag
b586b236f6b3db3c4ca9410451195336
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=900
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
VBYZ3TK1EZTYBkr1IrHVQ3WVWAYF_jpx7ANHQbKWyIKVXhG76sfdhw==
via
1.1 d5fb859c39a16d7f218b4c7fb1528ad6.cloudfront.net (CloudFront)
pixel;r=2049082439;source=gtm;rf=0;a=p-_7kVx0t9Jqj90;url=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F;ref=https%3A%2F%2Ft.co%2FX0ukaAE...
pixel.quantserve.com/
35 B
371 B
Image
General
Full URL
https://pixel.quantserve.com/pixel;r=2049082439;source=gtm;rf=0;a=p-_7kVx0t9Jqj90;url=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F;ref=https%3A%2F%2Ft.co%2FX0ukaAEsUs;fpan=1;fpa=P0-216556221-1595676846680;ns=0;ce=1;qjs=1;qv=35f667c6-20200713111428;cm=;gdpr=0;d=threatpost.com;je=0;sr=1600x1200x24;enc=n;dst=1;et=1595676846680;tzo=-120;ogl=image.https%3A%2F%2Fmedia%252Ethreatpost%252Ecom%2Fwp-content%2Fuploads%2Fsites%2F103%2F2020%2F06%2F25083724%2Fblack%2Ctype.article%2Ctitle.Office%20365%20Users%20Targeted%20By%20'Coronavirus%20Employee%20Training'%20Phish%2Cdescription.Threat%20actors%20shift%20focus%20from%20COVID-19%20to%20employee%20coronavirus%20training%20and%20cur%2Curl.https%3A%2F%2Fthreatpost%252Ecom%2Foffice-365-users-targeted-by-coronavirus-employee-trainin
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:116:800d:21:36a9:ecb:e518:b308 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:06 GMT
strict-transport-security
max-age=86400
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
status
200
cache-control
private, no-cache, no-store, proxy-revalidate
content-type
image/gif
content-length
35
expires
Fri, 04 Aug 1978 12:00:00 GMT
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/ Frame D267
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.0.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 05:54:51 GMT
content-encoding
gzip
vary
Accept-Encoding,Origin
age
20356
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Tue, 23 Jun 2020 10:10:39 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
ab4oPq0IJFSvGseMdTQD0blbx4JiIMTSOrZICZc6uiu6lWCwPVsb5Q==
css
fonts.googleapis.com/ Frame EFA8
2 KB
669 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto&display=swap
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c18ae4215a&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.1589&geoLong=21.0005&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
00d4fbacbadc6ecbd73be323ec77febf3d856ce00dc5334d06462a315c7da8e7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 10:02:49 GMT
server
ESF
date
Sat, 25 Jul 2020 11:34:06 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 25 Jul 2020 11:34:06 GMT
css
fonts.googleapis.com/ Frame 3A73
2 KB
646 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto&display=swap
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c18ae4215a&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.1589&geoLong=21.0005&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
00d4fbacbadc6ecbd73be323ec77febf3d856ce00dc5334d06462a315c7da8e7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 10:26:50 GMT
server
ESF
date
Sat, 25 Jul 2020 11:34:06 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 25 Jul 2020 11:34:06 GMT
user_sync.html
ads.pubmatic.com/AdServer/js/ Frame 1B35
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/user_sync.html?p=159196&userIdMacro=PM_UID&gdpr=1&gdpr_consent=&predirect=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D91%26advUuid%3DPM_UID%26gdpr%3D1%26gdpr_consent%3D
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c18ae4215a&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.1589&geoLong=21.0005&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.32 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Last-Modified
Tue, 14 Apr 2020 10:28:34 GMT
ETag
"1300708-2eae-5a33da96f833f"
Server
Apache/2.2.15 (CentOS)
Accept-Ranges
bytes
Content-Encoding
gzip
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
4169
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=21352
Expires
Sat, 25 Jul 2020 17:29:58 GMT
Date
Sat, 25 Jul 2020 11:34:06 GMT
Connection
keep-alive
Vary
Accept-Encoding
liveCS.php
live.sekindo.com/live/ Frame 4DF5
Redirect Chain
  • https://sync.search.spotxchange.com/partner?adv_id=8805&redir=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D94%26advUuid%3D%24SPOTX_USER_ID
  • https://sync.search.spotxchange.com/partner?adv_id=8805&redir=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D94%26advUuid%3D%24SPOTX_USER_ID&__user_chec...
  • https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=94&advUuid=c0003dfe-ce6a-11ea-97c6-1f057aaa2106
0
0
Document
General
Full URL
https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=94&advUuid=c0003dfe-ce6a-11ea-97c6-1f057aaa2106
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c18ae4215a&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.1589&geoLong=21.0005&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash

Request headers

Host
live.sekindo.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Server
nginx
Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Type
text/html; charset=utf-8
Transfer-Encoding
chunked
X-Powered-By
PHP/7.3.20
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Cache-Control
no-store
Pragma
no-cache
Age
0
Content-Encoding
gzip

Redirect headers

Server
nginx
Date
Sat, 25 Jul 2020 11:34:07 GMT
Content-Type
text/plain
Content-Length
0
Connection
keep-alive
Set-Cookie
audience=c0003dfe-ce6a-11ea-97c6-1f057aaa2106; expires=Sun, 25-Jul-2021 12:40:47 GMT; path=/; domain=.spotxchange.com; SameSite=none; Secure
Location
https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=94&advUuid=c0003dfe-ce6a-11ea-97c6-1f057aaa2106
X-fe
99
Access-Control-Allow-Methods
GET, POST, OPTIONS
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Cache-Control
no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0
liveCS.php
live.sekindo.com/live/ Frame 1AE9
Redirect Chain
  • https://u.openx.net/w/1.0/cm?id=476b50d3-5ccf-49a1-89b8-1ddf8ea18042&r=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D98%26advUuid%3D
  • https://u.openx.net/w/1.0/cm?cc=1&id=476b50d3-5ccf-49a1-89b8-1ddf8ea18042&r=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D98%26advUuid%3D
  • https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=98&advUuid=82e70d1d-1088-40c6-9b01-1821a5a873d8
0
0
Document
General
Full URL
https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=98&advUuid=82e70d1d-1088-40c6-9b01-1821a5a873d8
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c18ae4215a&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.1589&geoLong=21.0005&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash

Request headers

Host
live.sekindo.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Server
nginx
Date
Sat, 25 Jul 2020 11:34:07 GMT
Content-Type
text/html; charset=utf-8
Transfer-Encoding
chunked
X-Powered-By
PHP/7.3.20
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Cache-Control
no-store
Pragma
no-cache
Age
0
Content-Encoding
gzip

Redirect headers

status
302
vary
Accept, Accept-Encoding
set-cookie
i=a6eed4f4-f549-47c2-85b2-46ea2dc70330|1595676846; Version=1; Expires=Sun, 25-Jul-2021 11:34:07 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.190.0
p3p
CP="CUR ADM OUR NOR STA NID"
location
https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=98&advUuid=82e70d1d-1088-40c6-9b01-1821a5a873d8
date
Sat, 25 Jul 2020 11:34:07 GMT
content-type
text/html
content-length
0
content-encoding
gzip
via
1.1 google
alt-svc
clear
placeHolder.png
live.sekindo.com/content/video/splayer/assets/
23 KB
24 KB
Image
General
Full URL
https://live.sekindo.com/content/video/splayer/assets/placeHolder.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
76102878c1198de858725194952ba1c6b35bdee0f870cc6a124e93d17385e64e

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:06 GMT
Last-Modified
Sun, 11 Jun 2017 08:04:06 GMT
Server
nginx
ETag
"593cf976-5dbf"
Content-Type
image/png
Cache-Control
no-cache, private
Accept-Ranges
bytes
Content-Length
23999
Expires
Sat, 25 Jul 2020 11:34:05 GMT
vid5d5bb0d47c725224559183.jpg
video.sekindo.com/uploads/cn1/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 3A73
8 KB
8 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn1/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.jpg?cbuster=1570431012
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.83.41.218 Frankfurt am Main, Germany, ASN204548 (CLOUDWEBMANAGE-IL-FR, GB),
Reverse DNS
Software
Tengine /
Resource Hash
39acff21a7526c57aecfab519ae6bc57b24611d05058c34fe7a1c6391a456339
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:04 GMT
Last-Modified
Tue, 20 Aug 2019 08:42:11 GMT
Server
Tengine
ETag
"5d5bb263-1f36"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
7990
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e7c813b434a0248969272.jpg
video.sekindo.com/uploads/cn11/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 3A73
7 KB
8 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn11/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e7c813b434a0248969272.jpg?cbuster=1585217855
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.83.41.218 Frankfurt am Main, Germany, ASN204548 (CLOUDWEBMANAGE-IL-FR, GB),
Reverse DNS
Software
Tengine /
Resource Hash
e8a8c38a4d34ff1b394ec479ab194b2e0659c402f027fb04b9eb90881d3b23f3
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:04 GMT
Last-Modified
Thu, 26 Mar 2020 10:18:15 GMT
Server
Tengine
ETag
"5e7c8167-1d8c"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
7564
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e8ddb51d9b95030068777.jpg
video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 3A73
11 KB
12 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e8ddb51d9b95030068777.jpg?cbuster=1586355029
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.83.41.218 Frankfurt am Main, Germany, ASN204548 (CLOUDWEBMANAGE-IL-FR, GB),
Reverse DNS
Software
Tengine /
Resource Hash
92d0171289868d45a2099f1e0507824921169d4e8048aaecdf52802adae3c939
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:04 GMT
Last-Modified
Wed, 08 Apr 2020 14:12:22 GMT
Server
Tengine
ETag
"5e8ddbc6-2d3a"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
11578
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e8ddb4deacf8289516989.jpg
video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 3A73
21 KB
21 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e8ddb4deacf8289516989.jpg?cbuster=1586355025
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.83.41.218 Frankfurt am Main, Germany, ASN204548 (CLOUDWEBMANAGE-IL-FR, GB),
Reverse DNS
Software
Tengine /
Resource Hash
fd920468078f9ce3bd928870d328f15f530bd07ef49098cc310acee65e9e9284
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:04 GMT
Last-Modified
Wed, 08 Apr 2020 14:12:15 GMT
Server
Tengine
ETag
"5e8ddbbf-52a0"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
21152
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e86d7b9d2c91800058387.jpg
video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 3A73
13 KB
13 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e86d7b9d2c91800058387.jpg?cbuster=1585895359
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.83.41.218 Frankfurt am Main, Germany, ASN204548 (CLOUDWEBMANAGE-IL-FR, GB),
Reverse DNS
Software
Tengine /
Resource Hash
f1a73d1be169d95a5d478b3a6751e42b1f5c2c0a6e5486c709b90241004376c9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:04 GMT
Last-Modified
Fri, 03 Apr 2020 06:30:14 GMT
Server
Tengine
ETag
"5e86d7f6-331c"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
13084
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e82652053bc0719376164.jpg
video.sekindo.com/uploads/cn11/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 3A73
5 KB
5 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn11/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e82652053bc0719376164.jpg?cbuster=1585603877
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.83.41.218 Frankfurt am Main, Germany, ASN204548 (CLOUDWEBMANAGE-IL-FR, GB),
Reverse DNS
Software
Tengine /
Resource Hash
4e10c320e69dbec70da9b25b702c4d54d655d0b0ff3034e5deca574a18215f4a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:04 GMT
Last-Modified
Mon, 30 Mar 2020 23:02:22 GMT
Server
Tengine
ETag
"5e827a7e-136d"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
4973
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e86d7b36a41a121341580.jpg
video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 3A73
21 KB
21 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e86d7b36a41a121341580.jpg?cbuster=1585895352
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.83.41.218 Frankfurt am Main, Germany, ASN204548 (CLOUDWEBMANAGE-IL-FR, GB),
Reverse DNS
Software
Tengine /
Resource Hash
fd920468078f9ce3bd928870d328f15f530bd07ef49098cc310acee65e9e9284
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:04 GMT
Last-Modified
Fri, 03 Apr 2020 06:30:08 GMT
Server
Tengine
ETag
"5e86d7f0-52a0"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
21152
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e7c8135a40b2024482084.jpg
video.sekindo.com/uploads/cn11/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 3A73
12 KB
13 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn11/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e7c8135a40b2024482084.jpg?cbuster=1585217851
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.83.41.218 Frankfurt am Main, Germany, ASN204548 (CLOUDWEBMANAGE-IL-FR, GB),
Reverse DNS
Software
Tengine /
Resource Hash
e4be5b94ae5d44559ee0e809b87774c6f6e3df1c523e6ab24e31977e965e76a8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:04 GMT
Last-Modified
Thu, 26 Mar 2020 10:18:09 GMT
Server
Tengine
ETag
"5e7c8161-31c4"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
12740
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5dfbdccdd42f1591065679.jpg
video.sekindo.com/uploads/cn9/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 3A73
4 KB
5 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn9/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5dfbdccdd42f1591065679.jpg?cbuster=1576787159
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.83.41.218 Frankfurt am Main, Germany, ASN204548 (CLOUDWEBMANAGE-IL-FR, GB),
Reverse DNS
Software
Tengine /
Resource Hash
d2a953a03ff9038e93d2a3b6b85a73eb2d6fdd185b2f4472ba592b802867078b
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:04 GMT
Last-Modified
Thu, 19 Dec 2019 20:26:26 GMT
Server
Tengine
ETag
"5dfbdcf2-11a2"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
4514
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5db0ab9eb009c482959510.jpg
video.sekindo.com/uploads/cn9/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 3A73
12 KB
13 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn9/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5db0ab9eb009c482959510.jpg?cbuster=1571859369
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.83.41.218 Frankfurt am Main, Germany, ASN204548 (CLOUDWEBMANAGE-IL-FR, GB),
Reverse DNS
Software
Tengine /
Resource Hash
e0ebb40eaa4376fa3a837ac43f2b6ada7c35d3703b01c06a7a6b9c5184589e23
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:04 GMT
Last-Modified
Wed, 23 Oct 2019 19:37:06 GMT
Server
Tengine
ETag
"5db0abe2-3156"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
12630
Expires
Thu, 31 Dec 2037 23:55:55 GMT
sync
x.bidswitch.net/ul_cb/ Frame D267
Redirect Chain
  • https://x.bidswitch.net/sync?ssp=sekindo&user_id=5f1c18ae4215a&custom_data=5f1c18ae4215a&gdpr=1&gdpr_consent=
  • https://x.bidswitch.net/ul_cb/sync?ssp=sekindo&user_id=5f1c18ae4215a&custom_data=5f1c18ae4215a&gdpr=1&gdpr_consent=
43 B
412 B
Image
General
Full URL
https://x.bidswitch.net/ul_cb/sync?ssp=sekindo&user_id=5f1c18ae4215a&custom_data=5f1c18ae4215a&gdpr=1&gdpr_consent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.195.193.185 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
date
Sat, 25 Jul 2020 11:34:06 GMT
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
content-length
43
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"

Redirect headers

status
302
date
Sat, 25 Jul 2020 11:34:06 GMT
cache-control
no-cache, no-store, must-revalidate
content-length
0
location
https://x.bidswitch.net/ul_cb/sync?ssp=sekindo&user_id=5f1c18ae4215a&custom_data=5f1c18ae4215a&gdpr=1&gdpr_consent=
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
liveCS.php
live.sekindo.com/live/ Frame D267
Redirect Chain
  • https://csync.loopme.me/?redirect=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D93%26advUuid%3D%7Bdevice_id%7D
  • https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=93&advUuid=c7493b7b-fd91-4567-8b2f-2e7b5e69c349
0
347 B
Image
General
Full URL
https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=93&advUuid=c7493b7b-fd91-4567-8b2f-2e7b5e69c349
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Cache-Control
no-store
Content-Type
text/html; charset=utf-8

Redirect headers

status
302
date
Sat, 25 Jul 2020 11:34:06 GMT
content-length
0
location
https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=93&advUuid=c7493b7b-fd91-4567-8b2f-2e7b5e69c349
vid5d5bb0d47c725224559183.jpg
video.sekindo.com/uploads/cn1/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame EFA8
8 KB
8 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn1/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.jpg?cbuster=1570431012
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.83.41.218 Frankfurt am Main, Germany, ASN204548 (CLOUDWEBMANAGE-IL-FR, GB),
Reverse DNS
Software
Tengine /
Resource Hash
39acff21a7526c57aecfab519ae6bc57b24611d05058c34fe7a1c6391a456339
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://amli.sekindo.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:04 GMT
Last-Modified
Tue, 20 Aug 2019 08:42:11 GMT
Server
Tengine
ETag
"5d5bb263-1f36"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
7990
Expires
Thu, 31 Dec 2037 23:55:55 GMT
truncated
/ Frame EFA8
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame EFA8
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
liveView.php
live.sekindo.com/live/ Frame D267
80 KB
4 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=1&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn1%2Fvideo%2Fusers%2Fconverted%2F28530%2Fvideo_5d5baf9fe4c32389620327%2Fvid5d5bb0d47c725224559183.mp4&vid_content_id=483586&vid_content_desc=Apple%27s+new+phone+to+be+called+iPhone+XC%3F&vid_content_title=Apple%27s+new+phone+to+be+called+iPhone+XC%3F&vid_content_duration=40&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&x=320&y=180&fpl=0&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&isApp=0&geoLati=52.1589&geoLong=21.0005&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c18ae4215a&cbuster=1595676846828&gdpr=1&gdprConsent=&isWePassGdpr=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c18ae4215a&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.1589&geoLong=21.0005&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
c3ffadf47cea39f06486eab736fa76b6e7be7529a113d59e6f19be66056584bf

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
3312
liveView.php
live.sekindo.com/live/ Frame D267
30 KB
2 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=0&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn1%2Fvideo%2Fusers%2Fconverted%2F28530%2Fvideo_5d5baf9fe4c32389620327%2Fvid5d5bb0d47c725224559183.mp4&vid_content_id=483586&vid_content_desc=Apple%27s+new+phone+to+be+called+iPhone+XC%3F&vid_content_title=Apple%27s+new+phone+to+be+called+iPhone+XC%3F&vid_content_duration=40&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&x=320&y=180&fpl=0&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&isApp=0&geoLati=52.1589&geoLong=21.0005&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c18ae4215a&cbuster=1595676846829&gdpr=1&gdprConsent=&isWePassGdpr=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c18ae4215a&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.1589&geoLong=21.0005&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
2b531eb0f5708d05800e33c05451b6fc8e9accb190395706510aa8f190800bef

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:06 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
1984
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/ Frame EFA8
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31347D7B7331323334383830387D7B433232387D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c18ae4215a&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.1589&geoLong=21.0005&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto&display=swap
Origin
https://threatpost.com

Response headers

date
Fri, 12 Jun 2020 20:41:36 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:50 GMT
server
sffe
age
3682350
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
11016
x-xss-protection
0
expires
Sat, 12 Jun 2021 20:41:36 GMT
recaptcha__en.js
www.gstatic.com/recaptcha/releases/r8WWNwsCvXtk22_oRSVCCZx9/
330 KB
130 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/r8WWNwsCvXtk22_oRSVCCZx9/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?hl=en&render=explicit&ver=5.4.2
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
61394e856497a7705a004cb627296445fe074d1f78b10ab81071915059b5a926
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 20 Jul 2020 16:39:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 20 Jul 2020 04:04:52 GMT
server
sffe
age
413686
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
133183
x-xss-protection
0
expires
Tue, 20 Jul 2021 16:39:20 GMT
flipboard.svg
assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/img/
236 B
564 B
Image
General
Full URL
https://assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/img/flipboard.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:1c00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
506d565f94cecbb486394c545a96e8459217f8d045496b511e8c815142abfc70

Request headers

Referer
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=d5a1318b
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
public
date
Sat, 25 Jul 2020 11:34:07 GMT
content-encoding
gzip
last-modified
Fri, 24 Jul 2020 12:16:11 GMT
server
nginx
x-amz-cf-pop
FRA6-C1
etag
W/"5f1ad10b-ec"
x-cache
Miss from cloudfront
content-type
image/svg+xml
status
200
cache-control
max-age=604800, public
x-amz-cf-id
TEoKhzpoIIeGfKzOLvMBdXe5q1cMMJfHhtE4Vj_h-I7YFj0dTuYqCg==
via
1.1 e0bc02299b03254b2a35b8c930f005c6.cloudfront.net (CloudFront)
expires
Sat, 01 Aug 2020 11:34:07 GMT
fontawesome-webfont.woff2
assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/fonts/
75 KB
76 KB
Font
General
Full URL
https://assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/fonts/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:1c00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=d5a1318b
Origin
https://threatpost.com

Response headers

date
Sat, 25 Jul 2020 11:34:07 GMT
via
1.1 04599a8a3c6eb66f23e5ae02d1ec4cf2.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA6-C1
x-cache
Miss from cloudfront
status
200
content-length
77160
pragma
public
last-modified
Fri, 24 Jul 2020 12:16:11 GMT
server
nginx
etag
"5f1ad10b-12d68"
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000, public
accept-ranges
bytes
x-amz-cf-id
CfhnJoyAw8de0Akx2v1ec2R9AWKur_hTMmejQJqD0Qs9ke2dFMCJCg==
expires
Sun, 25 Jul 2021 11:34:07 GMT
photo-newsletter.jpg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
83 KB
83 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/photo-newsletter.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
940e0c3385928422aae38e1a74f1d84b462d8ce1a056c686fde505a0bf3162bb

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 11:34:07 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:14 GMT
Server
nginx
ETag
"5f1ad10e-14c88"
Content-Type
image/jpeg
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
85128
Expires
Sat, 01 Aug 2020 11:34:07 GMT
adsct
analytics.twitter.com/i/
31 B
653 B
Script
General
Full URL
https://analytics.twitter.com/i/adsct?p_id=Twitter&p_user_id=0&txn_id=ntt0j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.131 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
57
x-xss-protection
0
x-response-time
116
pragma
no-cache
last-modified
Sat, 25 Jul 2020 11:34:07 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
application/javascript;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
8f3f0895f13705d73c02adc3fe9fae51
x-transaction
00945c650053764b
expires
Tue, 31 Mar 1981 05:00:00 GMT
anchor
www.google.com/recaptcha/api2/ Frame 6ABD
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&theme=standard&size=normal&cb=nwnixrtyri7m
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-Np6NW9IB/LJchRg666QqgQ' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&theme=standard&size=normal&cb=nwnixrtyri7m
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 25 Jul 2020 11:34:07 GMT
content-security-policy
script-src 'report-sample' 'nonce-Np6NW9IB/LJchRg666QqgQ' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
10500
server
GSE
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
/
graph.facebook.com/
110 B
519 B
XHR
General
Full URL
https://graph.facebook.com/?id=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:800e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
232411ca9ae89a21d83595cee9813359600154cf7db9f5770b1e22f53b7b9995
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload
etag
"cda67678ddd451cce7c30edd06822a4ee89eacb1"
status
200
x-fb-rev
1002419868
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
110
pragma
no-cache
x-fb-debug
XBxVIiWQ1Rwqz1uRVLYK7lAINhCj11TBqDhVcg/OxkR88JmjnVpKCExA06H6EykUdV9iO8ySi7tdOS5y+Jdp0Q==
x-fb-trace-id
E/V3s2MXOB5
date
Sat, 25 Jul 2020 11:34:07 GMT
content-type
application/json
access-control-allow-origin
*
x-fb-request-id
AHpxsHFNxL48dm5te2AI_Ln
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v3.0
expires
Sat, 01 Jan 2000 00:00:00 GMT
share
www.linkedin.com/countserv/count/
0
0
Script
General
Full URL
https://www.linkedin.com/countserv/count/share?url=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&format=jsonp&callback=jQuery112406837654818196459_1595676845906&_=1595676845907
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:21::14 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

info.json
www.reddit.com/api/
102 B
1 KB
XHR
General
Full URL
https://www.reddit.com/api/info.json?url=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.53.140 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
snooserv /
Resource Hash
f4f2c0a4763f01ee2b13b4f8189e6fd5f32bd704d71fed8d0f11883de9724198
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:07 GMT
via
1.1 varnish
x-content-type-options
nosniff
x-cache
MISS
status
200
content-length
102
x-xss-protection
1; mode=block
x-served-by
cache-man4121-MAN
x-moose
majestic
expires
-1
server
snooserv
x-timer
S1595676847.223625,VS0,VE129
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
X-Moose
cache-control
private, s-maxage=0, max-age=0, must-revalidate, no-store, max-age=0, must-revalidate
x-ua-compatible
IE=edge
accept-ranges
bytes
x-cache-hits
0
bl-cc9018f-8cdfc568.js
tagan.adlightning.com/math-aids-threatpost/ Frame 6FEC
62 KB
18 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.110 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1f3d486ddbb9dda160529fdf0d8a6f4c1e77024078294664fb0456e9b33ba648

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 24 Jul 2020 17:22:10 GMT
content-encoding
gzip
age
65518
x-cache
Hit from cloudfront
status
200
content-length
18264
x-amz-meta-git_commit
cc9018f
last-modified
Fri, 24 Jul 2020 17:20:50 GMT
server
AmazonS3
etag
"35c351702648e8545a61bf940b50fb5c"
x-amz-version-id
YqdsBXP6TUW_8NLIciYdX4aAa4RYWjap
via
1.1 2d1e1e8dc0f3eb7773ec9d89a7d50ce2.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
BPCqLe6M2i1iI4DCBLM3aW4vibtRAHOq66TL1Met3zlCf9NeEp-dTA==
b-cc9018f-2cba83b0.js
tagan.adlightning.com/math-aids-threatpost/ Frame 6FEC
58 KB
20 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-cc9018f-2cba83b0.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.110 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
92814e48e334fb45bb8d9d0d2a6e68a1e601fd7ce63d25c10969cfd57bf4b1e8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 07 Jul 2020 18:05:52 GMT
content-encoding
gzip
age
1531696
x-cache
Hit from cloudfront
status
200
content-length
19746
x-amz-meta-git_commit
cc9018f
last-modified
Tue, 07 Jul 2020 17:59:39 GMT
server
AmazonS3
etag
"21fe90f3aceeb46480a69949d763c756"
x-amz-version-id
KDx1ypMRqiob.YrLSDtIdsXad7Sl2JS5
via
1.1 2d1e1e8dc0f3eb7773ec9d89a7d50ce2.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
XQCnfbiA8ljmtO99Wg14cRdxV1-ArXYZ2CERIPVMMatSR3pWp0krrQ==
anchor
www.google.com/recaptcha/api2/ Frame DB85
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&theme=light&size=normal&cb=albuj3e5k3wa
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-ywrX0T6Gi58r2KXb3goY/w' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/anchor?ar=1&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&theme=light&size=normal&cb=albuj3e5k3wa
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 25 Jul 2020 11:34:07 GMT
content-security-policy
script-src 'report-sample' 'nonce-ywrX0T6Gi58r2KXb3goY/w' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
10360
server
GSE
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
bl-cc9018f-8cdfc568.js
tagan.adlightning.com/math-aids-threatpost/ Frame 3BA2
62 KB
18 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.110 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1f3d486ddbb9dda160529fdf0d8a6f4c1e77024078294664fb0456e9b33ba648

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 24 Jul 2020 17:22:10 GMT
content-encoding
gzip
age
65518
x-cache
Hit from cloudfront
status
200
content-length
18264
x-amz-meta-git_commit
cc9018f
last-modified
Fri, 24 Jul 2020 17:20:50 GMT
server
AmazonS3
etag
"35c351702648e8545a61bf940b50fb5c"
x-amz-version-id
YqdsBXP6TUW_8NLIciYdX4aAa4RYWjap
via
1.1 2d1e1e8dc0f3eb7773ec9d89a7d50ce2.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
bS8fwttfssgVZ_4xthOqIU2zHuPcUrd4uQ56scRC-59xUceWUgyenQ==
b-cc9018f-2cba83b0.js
tagan.adlightning.com/math-aids-threatpost/ Frame 3BA2
58 KB
20 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-cc9018f-2cba83b0.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.110 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
92814e48e334fb45bb8d9d0d2a6e68a1e601fd7ce63d25c10969cfd57bf4b1e8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 07 Jul 2020 18:05:52 GMT
content-encoding
gzip
age
1531696
x-cache
Hit from cloudfront
status
200
content-length
19746
x-amz-meta-git_commit
cc9018f
last-modified
Tue, 07 Jul 2020 17:59:39 GMT
server
AmazonS3
etag
"21fe90f3aceeb46480a69949d763c756"
x-amz-version-id
KDx1ypMRqiob.YrLSDtIdsXad7Sl2JS5
via
1.1 2d1e1e8dc0f3eb7773ec9d89a7d50ce2.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
LgA1egcN-dfm7ZeFfG8KkgrwRy00myWfXN_FdZDmEsQuxtWo1bLjmw==
bl-cc9018f-8cdfc568.js
tagan.adlightning.com/math-aids-threatpost/ Frame CA6B
62 KB
18 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.110 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1f3d486ddbb9dda160529fdf0d8a6f4c1e77024078294664fb0456e9b33ba648

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 24 Jul 2020 17:22:10 GMT
content-encoding
gzip
age
65518
x-cache
Hit from cloudfront
status
200
content-length
18264
x-amz-meta-git_commit
cc9018f
last-modified
Fri, 24 Jul 2020 17:20:50 GMT
server
AmazonS3
etag
"35c351702648e8545a61bf940b50fb5c"
x-amz-version-id
YqdsBXP6TUW_8NLIciYdX4aAa4RYWjap
via
1.1 2d1e1e8dc0f3eb7773ec9d89a7d50ce2.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
C6LdoXFmgBA7a1wRjFk20zmzH2q0EFO6WiwPSe2afKx-1i2g-6v4zg==
b-cc9018f-2cba83b0.js
tagan.adlightning.com/math-aids-threatpost/ Frame CA6B
58 KB
20 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-cc9018f-2cba83b0.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.110 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
92814e48e334fb45bb8d9d0d2a6e68a1e601fd7ce63d25c10969cfd57bf4b1e8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 07 Jul 2020 18:05:52 GMT
content-encoding
gzip
age
1531696
x-cache
Hit from cloudfront
status
200
content-length
19746
x-amz-meta-git_commit
cc9018f
last-modified
Tue, 07 Jul 2020 17:59:39 GMT
server
AmazonS3
etag
"21fe90f3aceeb46480a69949d763c756"
x-amz-version-id
KDx1ypMRqiob.YrLSDtIdsXad7Sl2JS5
via
1.1 2d1e1e8dc0f3eb7773ec9d89a7d50ce2.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
WL8Fdp82J8wfK8Vjgl9TDMGIjI-AVzYynNMk0O6cG36q5b4QRtBTzA==
bl-cc9018f-8cdfc568.js
tagan.adlightning.com/math-aids-threatpost/ Frame 418A
62 KB
18 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.110 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1f3d486ddbb9dda160529fdf0d8a6f4c1e77024078294664fb0456e9b33ba648

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 24 Jul 2020 17:22:10 GMT
content-encoding
gzip
age
65518
x-cache
Hit from cloudfront
status
200
content-length
18264
x-amz-meta-git_commit
cc9018f
last-modified
Fri, 24 Jul 2020 17:20:50 GMT
server
AmazonS3
etag
"35c351702648e8545a61bf940b50fb5c"
x-amz-version-id
YqdsBXP6TUW_8NLIciYdX4aAa4RYWjap
via
1.1 2d1e1e8dc0f3eb7773ec9d89a7d50ce2.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
lpz8zp-MAU_3d8oBGpkvDwTr4sKWnVrrQ8nJ25xqhQ2ddl3KEbUqfw==
b-cc9018f-2cba83b0.js
tagan.adlightning.com/math-aids-threatpost/ Frame 418A
58 KB
20 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-cc9018f-2cba83b0.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.110 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
92814e48e334fb45bb8d9d0d2a6e68a1e601fd7ce63d25c10969cfd57bf4b1e8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 07 Jul 2020 18:05:52 GMT
content-encoding
gzip
age
1531696
x-cache
Hit from cloudfront
status
200
content-length
19746
x-amz-meta-git_commit
cc9018f
last-modified
Tue, 07 Jul 2020 17:59:39 GMT
server
AmazonS3
etag
"21fe90f3aceeb46480a69949d763c756"
x-amz-version-id
KDx1ypMRqiob.YrLSDtIdsXad7Sl2JS5
via
1.1 2d1e1e8dc0f3eb7773ec9d89a7d50ce2.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
TYYlcnb2stoon9Lr4KaEAOC9yfymdrxQtTlRMG0MST89EaZiyCYsIA==
translator
hbopenbid.pubmatic.com/ Frame D267
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Sat, 25 Jul 2020 11:34:07 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
cygnus
as-sec.casalemedia.com/ Frame D267
24 B
987 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=435871&v=8.1&r={%22id%22:%2230c0cc2b1739c3%22,%22imp%22:[{%22id%22:%224ea8e335f2abc4%22,%22ext%22:{%22siteID%22:%22435871%22,%22sid%22:%22320x180%22},%22bidfloor%22:1.8,%22bidfloorcur%22:%22USD%22,%22video%22:{%22mimes%22:[%22video/mp4%22,%22application/javascript%22],%22minduration%22:1,%22maxduration%22:200,%22api%22:[1,2],%22protocols%22:[1,2,3,4,5,6],%22linearity%22:1,%22startdelay%22:0,%22skip%22:1,%22w%22:320,%22h%22:180,%22placement%22:1}},{%22id%22:%225312ef1af58e67%22,%22ext%22:{%22siteID%22:%22435870%22,%22sid%22:%22320x180%22},%22bidfloor%22:1.8,%22bidfloorcur%22:%22USD%22,%22video%22:{%22mimes%22:[%22video/mp4%22,%22application/javascript%22],%22minduration%22:1,%22maxduration%22:200,%22api%22:[1,2],%22protocols%22:[1,2,3,4,5,6],%22linearity%22:1,%22startdelay%22:0,%22skip%22:1,%22w%22:320,%22h%22:180,%22placement%22:1}}],%22site%22:{%22ref%22:%22https://t.co/X0ukaAEsUs%22,%22page%22:%22https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F%22},%22ext%22:{%22source%22:%22prebid%22},%22source%22:{%22ext%22:{%22schain%22:{%22ver%22:%221.0%22,%22complete%22:1,%22nodes%22:[{%22asi%22:%22admetricspro.com%22,%22sid%22:%221005%22,%22hp%22:1}]}}},%22regs%22:{%22ext%22:{%22gdpr%22:1}},%22user%22:{%22ext%22:{%22consent%22:%22%22}}}&ac=j&sd=1&nf=1
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.254.129 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache /
Resource Hash
17d73b81a017a2d6ed6092102d4b6fbda0a5ece710ecb138b6b0d5ce91027429

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:07 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
44
Expires
Sat, 25 Jul 2020 11:34:07 GMT
openrtb
ads.adaptv.advertising.com/rtb/ Frame D267
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=TeachingAidsLLC
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.29.183.32 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

access-control-allow-origin
https://threatpost.com
access-control-allow-credentials
true
server
adaptv/1.0
Connection
keep-alive
content-length
0
content-type
application/json
avjp
teachingaids-d.openx.net/v/1.0/ Frame D267
92 B
286 B
XHR
General
Full URL
https://teachingaids-d.openx.net/v/1.0/avjp?ju=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&ch=UTF-8&res=1600x1200x24&ifr=true&tz=-120&tws=1600x1200&be=1&bc=hb_pb_3.0.2&dddid=75fc87e2-b168-486e-9a13-37ae0cf200a1&nocache=1595676847316&gdpr_consent=&gdpr=1&schain=1.0,1!admetricspro.com,1005,1,,,&skip=1&auid=540882778&vwd=320&vht=180
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.98.64.218 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
OXGW/16.190.0 /
Resource Hash
004e5faf0bf890f61697daeede9f21826affd1137fb2cb58eaf4719937a04a14

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:07 GMT
via
1.1 google
server
OXGW/16.190.0
status
200
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
92
expires
Mon, 26 Jul 1997 05:00:00 GMT
prebid
ib.adnxs.com/ut/v3/ Frame D267
19 B
709 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.172.37 , Ascension Island, ASN29990 (ASN-APPNEX, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
0c09c070833c786cb25be38bc30992b30bad578f817dbc9e34beacd8b8ea44c5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:07 GMT
X-Proxy-Origin
194.99.105.99; 194.99.105.99; 691.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.41:80
AN-X-Request-Uuid
12289aa6-bc3e-4b8b-b0b2-ce78cbf88624
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
19
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
liveView.php
live.sekindo.com/live/ Frame 3A73
43 B
463 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=6&serverTime=1595676846&s=58057&sta=12381421&x=320&y=180&msta=12348808&vid_vastType=3&vid_viewabilityState=1&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20content_VE%20%2F%201%20%2F%20default&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&csuuid=5f1c18ae4215a&rvn=${VP_RVN_MACRO}&attemptMultiplier=10&contentFileId=0&mediaPlayListId=0&playerVer=3.0.0&cbuster=1595676847304&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=&uid=SekindoSPlayer5f1c18ae74135&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&floatStatus=true
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
42b976597a2d977d0e300f6d06bc903db389e5c112d33c1c8c249690a522d9f2

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:07 GMT
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000
Content-Disposition
inline; filename="pixel.gif"
Content-Type
image/gif
Expires
Thu, 31 Dec 2037 23:55:55 GMT
amp4ads-v0.js
cdn.ampproject.org/rtv/022007102309000/ Frame 6FEC
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
527c0aa1ec26beecd1002628cea81de60b2929f88e62227091e79ced4da786d1
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404606
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57322
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:41 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"c20cd3cc466503b1"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:41 GMT
amp-ad-exit-0.1.js
cdn.ampproject.org/rtv/022007102309000/v0/ Frame 6FEC
16 KB
6 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/v0/amp-ad-exit-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c37a95b0e695cc2780bf005cba745b7b2ca2215765981eba876c61116a667a51
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404605
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5907
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:42 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"86843ca20da1a159"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:42 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/022007102309000/v0/ Frame 6FEC
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/v0/amp-analytics-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404606
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:41 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:41 GMT
amp-fit-text-0.1.js
cdn.ampproject.org/rtv/022007102309000/v0/ Frame 6FEC
4 KB
2 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/v0/amp-fit-text-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0ed2a44dca895d6c3965597e27ffdd09e0c29c8b9838dc85f29c6fa1deb9c8b2
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404605
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1786
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:42 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"641cef4d262e64f8"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:42 GMT
amp-form-0.1.js
cdn.ampproject.org/rtv/022007102309000/v0/ Frame 6FEC
48 KB
15 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/v0/amp-form-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9b418161b0e10186a59983122d30a87aca45be8909d6df20f5a3085ce0c529da
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404605
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
14999
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:42 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"3ca767f11aa3e2dd"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:42 GMT
css
fonts.googleapis.com/ Frame 6FEC
5 KB
761 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto:400,500&lang=en
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
c4a7b4babd8d76af2ddc0840bda733cd5a0b409895bb74d5302ff1155c9b32bc
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 10:42:12 GMT
server
ESF
date
Sat, 25 Jul 2020 11:34:07 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 25 Jul 2020 11:34:07 GMT
css
fonts.googleapis.com/ Frame 6FEC
5 KB
738 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto:400,500&text=
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
c4a7b4babd8d76af2ddc0840bda733cd5a0b409895bb74d5302ff1155c9b32bc
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 11:33:37 GMT
server
ESF
date
Sat, 25 Jul 2020 11:34:07 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 25 Jul 2020 11:34:07 GMT
downsize_200k_v1
tpc.googlesyndication.com/simgad/16544685568791275352/ Frame 6FEC
54 KB
54 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/16544685568791275352/downsize_200k_v1?sqp=4sqPyQSWAUKTAQgAEhQNzczMPhUAAABAHQAAAAAlAAAAABgAIgoNAACAPxUAAIA_Kk8IWhABHQAAtEIgASgBMAY4A0CAwtcvSABQAFgAYFpwAngAgAEAiAEAkAEAnQEAAIA_oAEAqAEAsAGAreIEuAH___________8BxQEtsp0-MhoI2gMQ-AEYASABLQAAAD8w2gM4-AFFAACAPw&rs=AOga4qkQ4v8ZVoAVI49wYksPVn11S8Uvuw
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
394443eb7414ff615291425ece28bc1e0b8a1df1ac6a3dcc24d12409bd17d5c8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 05:34:19 GMT
x-content-type-options
nosniff
last-modified
Mon, 30 Mar 2020 14:25:48 GMT
server
sffe
age
194388
status
200
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
55179
x-xss-protection
0
expires
Fri, 23 Jul 2021 05:34:19 GMT
downsize_200k_v1
tpc.googlesyndication.com/simgad/18194052688089202331/ Frame 6FEC
7 KB
7 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/18194052688089202331/downsize_200k_v1?sqp=4sqPyQR5QncIABIUDc3MzD4VAAAAQB0AAAAAJQAAAAAYACIKDQAAgD8VAACAPypPCFoQAR0AALRCIAEoATAGOANAgMLXL0gAUABYAGBacAJ4AIABAIgBAJABAJ0BAACAP6ABAKgBALABgK3iBLgB____________AcUBLbKdPg&rs=AOga4qk0AoMoeolqCOcqy9HvIxa_VAO4kQ
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
22f0dbea93252284524cb1c94ef0b843f0dea8ecce8f48cd5653d839521dd844
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 16 Jul 2020 05:17:24 GMT
x-content-type-options
nosniff
last-modified
Thu, 27 Jun 2019 10:43:41 GMT
server
sffe
age
800203
status
200
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7366
x-xss-protection
0
expires
Fri, 16 Jul 2021 05:17:24 GMT
adview
securepubads.g.doubleclick.net/pagead/ Frame 6FEC
0
0
Image
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CMbaWrhgcX4vjIpSh4gHRhY2ID4vNpqdeqLur_9oLv-EeEAEg0YfSIGDp5MmF2BqgAZH_vfoDyAEGqQLNRzx1X46zPuACAKgDAcgDCqoEsgJP0CaCBuv2yvbqlpJ4xbE7ucZCcURibUJNGfcH_t_gceAyOyug092N23XK6uIRtoml3OnusGzMun0vDZylfFMK_1e8bOgJt35qS6BXtZQ6S8w2q48ftqBmFnz5w_Xa_9FahP5jhRDjA2HaqKY_dYl5u42t-VseCQNbTSwHO_6KAGjsQ23tB_tKulyiCWukXV8jb5uluPU2c2pnHcyHGbaNaLf7QUO_1jMaJKXr6enyLMLVAVMP0IIAgnmtrtZ-8JNz7kEt2L0Ux-c8QvwRNGCnnZy7mxsuKPTV82HB7pDn4zlNx6akdGCvcMoH0fS9sKCEm-pj3lr-QbBj29zNrf06AXaRaC97J_KNCVbLT9Mzr3Guw1CPbNHz5NwbeK7S0u5MZD-LR_H6S2C5p_OwYToU7dLABMvU-9n0AuAEAZIFBAgEGAGSBQQIBRgEoAY3gAfXgMIFqAeOzhuoB9XJG6gHk9gbqAe6BqgH8NkbqAfy2RuoB6a-G6gH7NUb2AcB8gcEEMezCdIICQiA4YBQEAEYHfIIG2FkeC1zdWJzeW4tNzI2MzU3MzQ0NjgwNDA3OIAKA8gLAdgTDIgUBw&sigh=ppCDkzERQzs&template_id=492&tpd=AGWhJmskPpJkd8Gec4qRR5EzIMDR5hYcNgPOuEoWRMCAXxXP2w
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

l
www.google.com/ads/measurement/ Frame 6FEC
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaSenRo6qKBtP-IDsgk-O6qGMgVv98bPciyBJqB2ZyuLGGap4ciIEdyRCEk4KQetbYKsQbEA
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 6FEC
2 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:08:58 GMT
x-content-type-options
nosniff
server
cafe
age
1509
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Sun, 26 Jul 2020 11:08:58 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 6FEC
295 B
407 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 08:18:35 GMT
x-content-type-options
nosniff
server
cafe
age
11732
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Sun, 26 Jul 2020 08:18:35 GMT
truncated
/ Frame 6FEC
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
44e5b436a7d29b335723d002070ed507f29309b62ab09649e2deb719dba4743f

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/022007102309000/ Frame 3BA2
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
527c0aa1ec26beecd1002628cea81de60b2929f88e62227091e79ced4da786d1
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404606
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57322
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:41 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"c20cd3cc466503b1"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:41 GMT
amp-ad-exit-0.1.js
cdn.ampproject.org/rtv/022007102309000/v0/ Frame 3BA2
16 KB
6 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/v0/amp-ad-exit-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c37a95b0e695cc2780bf005cba745b7b2ca2215765981eba876c61116a667a51
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404605
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5907
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:42 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"86843ca20da1a159"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:42 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/022007102309000/v0/ Frame 3BA2
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/v0/amp-analytics-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404606
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:41 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:41 GMT
amp-fit-text-0.1.js
cdn.ampproject.org/rtv/022007102309000/v0/ Frame 3BA2
4 KB
2 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/v0/amp-fit-text-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0ed2a44dca895d6c3965597e27ffdd09e0c29c8b9838dc85f29c6fa1deb9c8b2
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404605
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1786
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:42 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"641cef4d262e64f8"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:42 GMT
amp-form-0.1.js
cdn.ampproject.org/rtv/022007102309000/v0/ Frame 3BA2
48 KB
15 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/v0/amp-form-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9b418161b0e10186a59983122d30a87aca45be8909d6df20f5a3085ce0c529da
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404605
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
14999
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:42 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"3ca767f11aa3e2dd"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:42 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 3BA2
2 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:08:58 GMT
x-content-type-options
nosniff
server
cafe
age
1509
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Sun, 26 Jul 2020 11:08:58 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 3BA2
295 B
361 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 08:18:35 GMT
x-content-type-options
nosniff
server
cafe
age
11732
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Sun, 26 Jul 2020 08:18:35 GMT
13197573464948758463
tpc.googlesyndication.com/simgad/ Frame 3BA2
30 KB
30 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/13197573464948758463?sqp=4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4&rs=AOga4qkH4xkT9A2TRJqMtpCrqTAHrAT0Bg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
cb8e4c9e6f5b0c4eb563a53c2e83f4d6b216099ed5e7244d5185544e6c9cc96b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 07:41:34 GMT
x-content-type-options
nosniff
last-modified
Thu, 23 Jul 2020 06:18:29 GMT
server
sffe
age
186753
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
31006
x-xss-protection
0
expires
Fri, 23 Jul 2021 07:41:34 GMT
l
www.google.com/ads/measurement/ Frame 3BA2
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaRXBW2I_cKfaVFX7oSYx2cyJkCxr0jYBv2MHjeMEEv2BwPdTvymMqr1mywX9-EDK_mF4K4W
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

adview
securepubads.g.doubleclick.net/pagead/ Frame 3BA2
0
0
Image
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CRWwQrhgcX4zjIpSh4gHRhY2ID7-Tyt9dwrbjuK4LFBABINGH0iBg6eTJhdgaoAHx-qDiA8gBAqkCh6-DSorBkT7gAgCoAwHIAwiqBLACT9DrwjiTLEKsvRXr2EoLHGyDZEBbxlx4gLc9oCsRkTGHyk3NfeKRZudm-THev2msHjmTcVotMZfUuTYRhngkxcW_46eLG70K4gyCO7Z9yqMjeAw9CtaDc070Bfh8ReLEd7ZeyJyPnvdc8AZalE9wOhZ2-l9FQizZ59vR96C4rCbN00vUIhNH8Hr8dKWxJDaxZemypCVr-w7OKao8WEQvqXyU_lVkLfoZLsG02sDyt4cVybmAT91Dh9qz9rQdhb9D7re2UFlVC6Mf0ZQ8yNmfVuWEJzrguVGawuIG73ydTOH4aC8h1BiecbQY98-LaPPoBCrLHnUDYQw57BAx8q0DFEa0vojykLUDAli6Hw_B3UmeHXwhtXkEdu9TmKUSipE3rktO4b4qZb4MRmYnSFmPu8AEgKjk24wD4AQBkgUECAQYAZIFBAgFGASgBgKAB_eE3x2oB47OG6gH1ckbqAeT2BuoB7oGqAfw2RuoB_LZG6gHpr4bqAfs1RvYBwHyBwQQ6tYH0ggJCIDhgFAQARgd8ggbYWR4LXN1YnN5bi03MjYzNTczNDQ2ODA0MDc4gAoDyAsB2BMN&sigh=orYm73yRzMY&tpd=AGWhJmu6O0MUAdjPCvuTcMmW14xLqDnNGkbBjl7QqdayXA4LVg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

truncated
/ Frame 3BA2
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8beed7fb9cf3b190307067f8ad9551d526e18f3e2f419ad3f678d8ce8de5417e

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
bframe
www.google.com/recaptcha/api2/ Frame 5F95
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/bframe?hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=3518k2l0mixj
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-PO1GzzEkjap0DZiHGZtYVA' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/bframe?hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=3518k2l0mixj
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 25 Jul 2020 11:34:07 GMT
content-security-policy
script-src 'report-sample' 'nonce-PO1GzzEkjap0DZiHGZtYVA' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
1177
server
GSE
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
amp4ads-v0.js
cdn.ampproject.org/rtv/022007102309000/ Frame CA6B
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
527c0aa1ec26beecd1002628cea81de60b2929f88e62227091e79ced4da786d1
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404606
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57322
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:41 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"c20cd3cc466503b1"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:41 GMT
amp-ad-exit-0.1.js
cdn.ampproject.org/rtv/022007102309000/v0/ Frame CA6B
16 KB
6 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/v0/amp-ad-exit-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c37a95b0e695cc2780bf005cba745b7b2ca2215765981eba876c61116a667a51
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404605
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5907
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:42 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"86843ca20da1a159"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:42 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/022007102309000/v0/ Frame CA6B
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/v0/amp-analytics-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404606
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:41 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:41 GMT
amp-fit-text-0.1.js
cdn.ampproject.org/rtv/022007102309000/v0/ Frame CA6B
4 KB
2 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/v0/amp-fit-text-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0ed2a44dca895d6c3965597e27ffdd09e0c29c8b9838dc85f29c6fa1deb9c8b2
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404605
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1786
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:42 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"641cef4d262e64f8"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:42 GMT
amp-form-0.1.js
cdn.ampproject.org/rtv/022007102309000/v0/ Frame CA6B
48 KB
15 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/022007102309000/v0/amp-form-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9b418161b0e10186a59983122d30a87aca45be8909d6df20f5a3085ce0c529da
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
404605
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
14999
x-xss-protection
0
server
sffe
date
Mon, 20 Jul 2020 19:10:42 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"3ca767f11aa3e2dd"
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 20 Jul 2021 19:10:42 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame CA6B
2 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:08:58 GMT
x-content-type-options
nosniff
server
cafe
age
1509
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Sun, 26 Jul 2020 11:08:58 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame CA6B
295 B
361 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 08:18:35 GMT
x-content-type-options
nosniff
server
cafe
age
11732
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Sun, 26 Jul 2020 08:18:35 GMT
l
www.google.com/ads/measurement/ Frame CA6B
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaRPXnfUnf488OrR1qdBkpTPJv03yIAjJYVreqC90ZqqCxkpjWoaXbTw2k-ST8L5_Xnkp8sY
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

adview
securepubads.g.doubleclick.net/pagead/ Frame CA6B
0
0
Image
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CfDdrrhgcX43jIpSh4gHRhY2ID5rina5eq7PbqacJv-mI-aMaEAEg0YfSIGDp5MmF2BqgAYbA1pkDyAEJqQLNRzx1X46zPuACAKgDAcgDCKoEvAJP0AsbM5P-JfCkaoe2KAGX15Xsnzu7FUmyxHlQ9eEEnzhWYfyGfmF32yAZe2xpo1pR9PLDtZvpsh30le2OGQb4YjxuLc2Ft1wmnGwB6SsMePx77IldBhT-kbfPvJgz3rKAR6HNtV1DwmPSlPiJYW6ljoldiMrUyeTol_X8C7EWcNf5ZlWABQGcH1Cp_VNfwh6PdzPDYQeUVlfXQLDa2m9jYf84lRHiLhFmsphZtaIyiKDHAh1Th68hKcEn5gA5PdJXQdZGeF2EbTzeTi6oIrtrKd1PxaeM_GL4TbY_TeassWsCNNxKVeE9H_UITlH_EaGfb4AQwFzQZRucJYWhuAh5-gkxFRKZ5U2AUXUuzYEVhSgqsNjhk8wORP9oaImnsnkhvLutniA6ujWR27m6pKNXjPymCPsWbWwyCtr4wASw4Zy94wHgBAGSBQQIBBgBkgUECAUYBJIFBAgFGBiSBQUIBRioAaAGLoAHj5SxJKgHjs4bqAeT2BuoB7oGqAfw2RuoB_LZG6gHpr4bqAfs1RvYBwDyBwQQ05wS0ggJCIDhgFAQARgd8ggbYWR4LXN1YnN5bi03MjYzNTczNDQ2ODA0MDc4gAoDyAsB2BMNiBQM&sigh=Wc8IInnEUrI&template_id=494&tpd=AGWhJmvO4QVukZIhGZxIGdOJk_8x2n_ts9ZOApJBKWontcl51w
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

truncated
/ Frame CA6B
210 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4bf7f224586df61f486a399a04423b33fc8320ab5c06509c5d1179501f6d8616

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
shopping
encrypted-tbn2.gstatic.com/ Frame CA6B
27 KB
27 KB
Image
General
Full URL
https://encrypted-tbn2.gstatic.com/shopping?q=tbn:ANd9GcTWitGI9MK9WBgyojbK9uDyKSd6vV71sO92cHqYhQh1g6aiKwE&usqp=CAI
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b5eb6732c02d8e9b633f5570c29d12ade6075587f75620ff73fcab17b136154a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 14 Jul 2020 14:39:06 GMT
x-content-type-options
nosniff
last-modified
Thu, 20 Feb 2020 20:15:06 GMT
server
sffe
age
939301
content-type
image/jpeg
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
27247
x-xss-protection
0
expires
Wed, 14 Jul 2021 14:39:06 GMT
shopping
encrypted-tbn1.gstatic.com/ Frame CA6B
28 KB
28 KB
Image
General
Full URL
https://encrypted-tbn1.gstatic.com/shopping?q=tbn:ANd9GcQYHqd1357Kj1fmCd-FuVLd6HUbF403hj_F-k8oU51rgAvwYIn0JQd7v_b5eg&usqp=CAI
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ce603a6f4cbf9a68231d8001a42ffe12859bf1aef6d44c87533f4b4e3bab441f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 09 Jun 2020 04:36:16 GMT
x-content-type-options
nosniff
last-modified
Thu, 27 Sep 2018 18:52:07 GMT
server
sffe
age
3999471
content-type
image/jpeg
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
28450
x-xss-protection
0
expires
Wed, 09 Jun 2021 04:36:16 GMT
shopping
encrypted-tbn3.gstatic.com/ Frame CA6B
14 KB
14 KB
Image
General
Full URL
https://encrypted-tbn3.gstatic.com/shopping?q=tbn:ANd9GcRkBwYy7evkSPyp8oF1BKYpHHN4iqjfZxsVEPEmpaPG0LcdT3HMuj90KHStxV8&usqp=CAI
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2a772f5f9b918bfac5c3f3c373474cbe04f034ee081df54cd98ff325f9e1ddf6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 16 Jul 2020 00:50:19 GMT
x-content-type-options
nosniff
last-modified
Mon, 02 Dec 2019 09:14:03 GMT
server
sffe
age
816228
content-type
image/jpeg
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
14716
x-xss-protection
0
expires
Fri, 16 Jul 2021 00:50:19 GMT
shopping
encrypted-tbn0.gstatic.com/ Frame CA6B
35 KB
35 KB
Image
General
Full URL
https://encrypted-tbn0.gstatic.com/shopping?q=tbn:ANd9GcQTRzhV42dFS-XuCoIAEcPHKmw974jHZOY5IajZPfnPF0ozJOrlFtdzXaGXnw&usqp=CAI
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
10c62f5c727a9ec911e0f50296baebaaa1fde55558d7dfd458464f5da1978eca
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 09 Jul 2020 00:43:08 GMT
x-content-type-options
nosniff
last-modified
Sat, 18 Jan 2020 10:58:10 GMT
server
sffe
age
1421459
content-type
image/jpeg
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35972
x-xss-protection
0
expires
Fri, 09 Jul 2021 00:43:08 GMT
shopping
encrypted-tbn2.gstatic.com/ Frame CA6B
16 KB
16 KB
Image
General
Full URL
https://encrypted-tbn2.gstatic.com/shopping?q=tbn:ANd9GcRtBb_hOEdKVSiG86y2fyfHiXRMNPMdbaJ3sZ5JGLEhRBrzIyeuNYEatMf-ZW8&usqp=CAI
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
96fe046b96fb066751aab1b28228a166d22e2958585bd5642f685380f8427a19
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 24 Jul 2020 14:51:25 GMT
x-content-type-options
nosniff
last-modified
Thu, 14 Feb 2019 15:38:29 GMT
server
sffe
age
74562
content-type
image/jpeg
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
16143
x-xss-protection
0
expires
Sat, 24 Jul 2021 14:51:25 GMT
shopping
encrypted-tbn3.gstatic.com/ Frame CA6B
37 KB
37 KB
Image
General
Full URL
https://encrypted-tbn3.gstatic.com/shopping?q=tbn:ANd9GcRrO0JI0-qzcdDsUctBhJkl7DWI-61gwtgim2N3PMdsc0pL7QvAYfgks4RluA&usqp=CAI
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1ec4be27bf14cbf1f602aa782c10f4f35b0cdf35db67d0c35fc953b150555b1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 17 Jul 2020 05:43:51 GMT
x-content-type-options
nosniff
last-modified
Wed, 22 Jan 2020 08:43:35 GMT
server
sffe
age
712216
content-type
image/jpeg
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37700
x-xss-protection
0
expires
Sat, 17 Jul 2021 05:43:51 GMT
8919146202064986518
tpc.googlesyndication.com/simgad/ Frame CA6B
4 KB
4 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/8919146202064986518
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
680994b6fbd467939a2943ba1644fd1dfeba2ab3c6e1d3e4186d2c4ad1a58732
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 22 Jul 2020 22:51:01 GMT
x-content-type-options
nosniff
age
218586
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
3651
x-xss-protection
0
last-modified
Tue, 28 Aug 2018 07:57:28 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 22 Jul 2021 22:51:01 GMT
amp4ads-v0.js
cdn.ampproject.org/rtv/012007102309000/ Frame 418A
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1d719a7b7ef17ad476a644a196c6130ed955f5ab06f7bac34632f44d4772bfe5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
7937
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57400
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:21:50 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"83969d63ffc70a02"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:21:50 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012007102309000/v0/ Frame 418A
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/v0/amp-analytics-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
7936
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:21:51 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:21:51 GMT
7464639028652035684
tpc.googlesyndication.com/simgad/ Frame 418A
330 B
455 B
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7464639028652035684
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f19e7ee6cdf20bd478c037707c447b7cd469051de4dadeac32a795efb463c2e2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 10 Jun 2020 14:30:09 GMT
x-content-type-options
nosniff
age
3877438
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
330
x-xss-protection
0
last-modified
Tue, 28 Jan 2020 23:02:00 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 10 Jun 2021 14:30:09 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 418A
0
64 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvvliueMJ6g9LxXkVXEChcupvnrTwXIUyKNQd7UtpjO-pl51-O-EtEn7MyTqCuE0tckhwS3ESJdsVEmZPWXaQsJYu2BHG-OL21DlLn003Q9wWOvWhCjTVSUa0S43yiTN3lqauY3B13JgZWTjm-3ZnYGbnip4nWMlOWd0SQccw5sJkEQhtZ5I68_Ja-YyaHnZFjn9LKPbpf0v8OFd_T0lEojSHLCKABimNwZRGjR3TIAD13ii23crb4LK72wtYwZLT2ONVn1fWwfWddnylVn2A&sai=AMfl-YShhsrxhngl8DI3QFS0Y05LM539p8YPyUj15YYqqs6CA7U--6pJTJFRhvC94ge4yZ42wpQ0xtLaakAIySDVNLey2PlLd60IviX0B1CqFl43_Bn3i850ax9sO_Jp7s4&sig=Cg0ArKJSzAprNaUdHVvcEAE&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:34:07 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
l
www.google.com/ads/measurement/ Frame 418A
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaQBM2KYfQ3jl23jx7d7cLE8hY0ReygHaf_TknThzyJAIb5nLsMdm5EnaYVXJX_RGc-iYRKO
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

truncated
/ Frame 418A
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
88b312d5e4bcb26718cbd16ea28d534dbaf2a38c39b40c7ca1a7045c2c09bd70

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
bframe
www.google.com/recaptcha/api2/ Frame 2E09
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/bframe?hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&cb=m9cyqdi5fo0u
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-5EiMVIujDVVk/5SUUOcj7Q' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/bframe?hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&cb=m9cyqdi5fo0u
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 25 Jul 2020 11:34:07 GMT
content-security-policy
script-src 'report-sample' 'nonce-5EiMVIujDVVk/5SUUOcj7Q' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
1175
server
GSE
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
openrtb
ads.adaptv.advertising.com/rtb/ Frame D267
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=PrimisTwoHB
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.29.183.32 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

access-control-allow-origin
https://threatpost.com
access-control-allow-credentials
true
server
adaptv/1.0
Connection
keep-alive
content-length
0
content-type
application/json
auction
prebid-server.rubiconproject.com/openrtb2/ Frame D267
173 B
380 B
XHR
General
Full URL
https://prebid-server.rubiconproject.com/openrtb2/auction
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.157.177.102 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
850ac6a77dd1c843a85c730ca1ff64365c31991498bdee6c5ada1e706f75498a

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:08 GMT
content-encoding
gzip
status
200
content-type
application/json
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
167
expires
0
v1
prg.smartadserver.com/prebid/ Frame D267
0
307 B
XHR
General
Full URL
https://prg.smartadserver.com/prebid/v1
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
185.86.139.29 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:07 GMT
p3p
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
access-control-allow-origin
https://threatpost.com
cache-control
no-cache,no-store
access-control-allow-credentials
true
content-type
application/json
content-length
0
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/ Frame 6FEC
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto:400,500&lang=en
Origin
https://threatpost.com

Response headers

date
Fri, 12 Jun 2020 20:41:36 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:50 GMT
server
sffe
age
3682351
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
11016
x-xss-protection
0
expires
Sat, 12 Jun 2021 20:41:36 GMT
KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v20/ Frame 6FEC
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ce897833ac6e362df7c91ac8223fe511c6defcf33964928a81004600a2dd4c2e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto:400,500&lang=en
Origin
https://threatpost.com

Response headers

date
Thu, 09 Jul 2020 02:32:55 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:48 GMT
server
sffe
age
1414872
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
11056
x-xss-protection
0
expires
Fri, 09 Jul 2021 02:32:55 GMT
si
googleads.g.doubleclick.net/pagead/drt/ Frame 6FEC
Redirect Chain
  • https://www.google.com/pagead/drt/ui
  • https://googleads.g.doubleclick.net/pagead/drt/si
0
0
Image
General
Full URL
https://googleads.g.doubleclick.net/pagead/drt/si
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Redirect headers

date
Sat, 25 Jul 2020 11:34:08 GMT
x-content-type-options
nosniff
server
safe
status
302
content-type
text/html; charset=UTF-8
location
https://googleads.g.doubleclick.net/pagead/drt/si
cache-control
private
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
246
x-xss-protection
0
downsize_200k_v1
tpc.googlesyndication.com/simgad/16544685568791275352/ Frame 6FEC
54 KB
54 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/16544685568791275352/downsize_200k_v1?sqp=4sqPyQSWAUKTAQgAEhQNzczMPhUAAABAHQAAAAAlAAAAABgAIgoNAACAPxUAAIA_Kk8IWhABHQAAtEIgASgBMAY4A0CAwtcvSABQAFgAYFpwAngAgAEAiAEAkAEAnQEAAIA_oAEAqAEAsAGAreIEuAH___________8BxQEtsp0-MhoI2gMQ-AEYASABLQAAAD8w2gM4-AFFAACAPw&rs=AOga4qkQ4v8ZVoAVI49wYksPVn11S8Uvuw
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
394443eb7414ff615291425ece28bc1e0b8a1df1ac6a3dcc24d12409bd17d5c8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 05:34:19 GMT
x-content-type-options
nosniff
last-modified
Mon, 30 Mar 2020 14:25:48 GMT
server
sffe
age
194389
status
200
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
55179
x-xss-protection
0
expires
Fri, 23 Jul 2021 05:34:19 GMT
downsize_200k_v1
tpc.googlesyndication.com/simgad/18194052688089202331/ Frame 6FEC
7 KB
7 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/18194052688089202331/downsize_200k_v1?sqp=4sqPyQR5QncIABIUDc3MzD4VAAAAQB0AAAAAJQAAAAAYACIKDQAAgD8VAACAPypPCFoQAR0AALRCIAEoATAGOANAgMLXL0gAUABYAGBacAJ4AIABAIgBAJABAJ0BAACAP6ABAKgBALABgK3iBLgB____________AcUBLbKdPg&rs=AOga4qk0AoMoeolqCOcqy9HvIxa_VAO4kQ
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
22f0dbea93252284524cb1c94ef0b843f0dea8ecce8f48cd5653d839521dd844
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 16 Jul 2020 05:17:24 GMT
x-content-type-options
nosniff
last-modified
Thu, 27 Jun 2019 10:43:41 GMT
server
sffe
age
800204
status
200
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7366
x-xss-protection
0
expires
Fri, 16 Jul 2021 05:17:24 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 6FEC
2 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:08:58 GMT
x-content-type-options
nosniff
server
cafe
age
1510
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Sun, 26 Jul 2020 11:08:58 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 6FEC
295 B
366 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 08:18:35 GMT
x-content-type-options
nosniff
server
cafe
age
11733
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Sun, 26 Jul 2020 08:18:35 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame CA6B
2 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:08:58 GMT
x-content-type-options
nosniff
server
cafe
age
1510
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Sun, 26 Jul 2020 11:08:58 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame CA6B
295 B
361 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 08:18:35 GMT
x-content-type-options
nosniff
server
cafe
age
11733
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Sun, 26 Jul 2020 08:18:35 GMT
si
googleads.g.doubleclick.net/pagead/drt/ Frame 3BA2
Redirect Chain
  • https://www.google.com/pagead/drt/ui
  • https://googleads.g.doubleclick.net/pagead/drt/si
0
0
Image
General
Full URL
https://googleads.g.doubleclick.net/pagead/drt/si
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Redirect headers

date
Sat, 25 Jul 2020 11:34:08 GMT
x-content-type-options
nosniff
server
safe
status
302
content-type
text/html; charset=UTF-8
location
https://googleads.g.doubleclick.net/pagead/drt/si
cache-control
private
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
246
x-xss-protection
0
13197573464948758463
tpc.googlesyndication.com/simgad/ Frame 3BA2
30 KB
30 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/13197573464948758463?sqp=4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4&rs=AOga4qkH4xkT9A2TRJqMtpCrqTAHrAT0Bg
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
cb8e4c9e6f5b0c4eb563a53c2e83f4d6b216099ed5e7244d5185544e6c9cc96b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 07:41:34 GMT
x-content-type-options
nosniff
last-modified
Thu, 23 Jul 2020 06:18:29 GMT
server
sffe
age
186754
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
31006
x-xss-protection
0
expires
Fri, 23 Jul 2021 07:41:34 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 3BA2
2 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:08:58 GMT
x-content-type-options
nosniff
server
cafe
age
1510
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Sun, 26 Jul 2020 11:08:58 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 3BA2
295 B
361 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 08:18:35 GMT
x-content-type-options
nosniff
server
cafe
age
11733
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Sun, 26 Jul 2020 08:18:35 GMT
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
6 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020072001&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
1277efa7b10594b888b5b28b138cc285eadddf1228b3128a164726a9a60cc1c9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:34:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
5643
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
6 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
08f50e9e70388c99977ca13b6af3a49f8f48c83e79230d51ea72a56c0735bd0c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1591403518460474"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5540
x-xss-protection
0
expires
Sat, 25 Jul 2020 11:34:08 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 418A
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuGOAYZa1w0kV3-DGg3WcdAeI2HfpQoMJZ5nZD4n3g05ds_2R9eeY549wEEqnBeBblxVteTBoDEhcYGBglEhbwsH2D9eOxx8WkKsaiywN_ZhyADwuT_lL2grr0H43D3cqe3TuWC2j3rv3_8MhCh_fjzCqy8cfWy3IyT_9bvkobct-D1nIcsP5bAz20vXD252pG37TnVNIOb-mwOyVPfz73Soedz4rxeIdeMlGVb6xCJLVI_rP3LWrAZwjbcJh0g0d8BS01sbg4pYbyyMQA1AL2q&sai=AMfl-YQj5srwG62lDyoXki2HTCBFETpHCzvCWItFv1xSKo-3iU6EJa9SN1jKBcQyghkSs4Y0FVr60h_UsQ-7qNT6OcxQM2XBQQcumy_7CgThmTkuEKfymZWIurCNyqNCLI8&sig=Cg0ArKJSzGx5WoPG3cXlEAE&adurl=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:34:08 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
7464639028652035684
tpc.googlesyndication.com/simgad/ Frame 418A
330 B
405 B
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7464639028652035684
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f19e7ee6cdf20bd478c037707c447b7cd469051de4dadeac32a795efb463c2e2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 10 Jun 2020 14:30:09 GMT
x-content-type-options
nosniff
age
3877439
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
330
x-xss-protection
0
last-modified
Tue, 28 Jan 2020 23:02:00 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 10 Jun 2021 14:30:09 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/210/ Frame 01B4
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/210/runner.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/210/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
4590
date
Sat, 25 Jul 2020 11:10:48 GMT
expires
Sun, 25 Jul 2021 11:10:48 GMT
last-modified
Wed, 26 Feb 2020 19:47:50 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1400
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
gen_204
pagead2.googlesyndication.com/pagead/
0
55 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=210&t=2&li=gpt_2020072001&jk=963566003084320&bg=!qKulq7NYsCZu3VyUkXACAAAARVIAAAAMCgBAcaRgksZD_hfkO59Qv9X2hu05TAcm0Np4g-WRIxfpMroTxiK1bRPoJWZQ38gLM5o2bNy7IViZXkzKXGx7C3aGDpkBhYQct2Qh_fQUgkDCg8OAWvGjgInFf8xuY0YTlCfSxyBjvxkUUTrp9P5_91KP3Zw-jbiSc0jixq8zolLj53oUB3XawwQfT53ulHB_pOnKLiqgtGem8K9dMJdHAc9nCpU7U1yeoXyCIOkgQhlM0NKpjiptn6ZomUPLBJbxf0FD04j5sS3Wce3wfNnCU2-SjGb3lQopAQJTKbR1s6XH5j4cvC6Egwp27IOvFfXb9rLyAOr58E2RKg1kVXOgOHi5XBNNT6SjGcYWNn50-8sDTynLrP6vRo6ijXzX6PKxJtVVPw8E9GudHn3cl9sEqdyRuWNQ40wmw-rYg1bOmTku1qQWGHkX_XLRxr5oLEWTPQ7JuGpY0CKPRUN4gkp8hFJyzDgbXpB45ozrr0LG9vP4ZuBkorgWINYpluyhpnErI69SpaM9DDM7FdCdMZO2nrgX7EQa0wW8Rr1A-fXihX0CEGN9wjAn8pb8pVIFV1F3KDF2aYLX-XVN0qQwE86DrV_YsCmX4n_fXf_Q
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:08 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
liveView.php
live.sekindo.com/live/ Frame 3A73
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=36&serverTime=1595676846&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20content_VE%20%2F%201%20%2F%20default&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&csuuid=5f1c18ae4215a&contentFileId=0&mediaPlayListId=0&cbuster=1595676848904&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=&uid=SekindoSPlayer5f1c18ae74135&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&floatStatus=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:08 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
showad.js
ads.pubmatic.com/AdServer/js/ Frame CFCB
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/showad.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.32 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
KTPCACOOKIE=YES; KCCH=YES; pi=159196:2
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Last-Modified
Tue, 14 Apr 2020 10:27:52 GMT
ETag
"13006b6-a4bb-5a33da6f1a023"
Server
Apache/2.2.15 (CentOS)
Accept-Ranges
bytes
Content-Encoding
gzip
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
15243
Content-Type
text/html; charset=UTF-8
Cache-Control
public, max-age=31103
Expires
Sat, 25 Jul 2020 20:12:31 GMT
Date
Sat, 25 Jul 2020 11:34:08 GMT
Connection
keep-alive
Vary
Accept-Encoding
ixmatch.html
js-sec.indexww.com/um/ Frame 2006
0
0
Document
General
Full URL
https://js-sec.indexww.com/um/ixmatch.html
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.254.129 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache /
Resource Hash

Request headers

Host
js-sec.indexww.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Server
Apache
Last-Modified
Mon, 19 Jun 2017 19:18:19 GMT
ETag
"74087b-112-55254ff6699bb"
Accept-Ranges
bytes
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Content-Type
text/html; charset=UTF-8
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
211
Date
Sat, 25 Jul 2020 11:34:08 GMT
Connection
keep-alive
async_usersync.html
acdn.adnxs.com/ib/static/usersync/v3/ Frame C808
0
0
Document
General
Full URL
https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.253.36 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
nginx/1.13.10 /
Resource Hash

Request headers

Host
acdn.adnxs.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Last-Modified
Fri, 20 May 2016 02:07:09 GMT
ETag
W/"573e714d-3e3"
Server
nginx/1.13.10
Content-Type
text/html
Vary
Accept-Encoding
Access-Control-Allow-Origin
*
Content-Encoding
gzip
Content-Length
506
Cache-Control
max-age=31536000
Expires
Sun, 25 Jul 2021 11:34:08 GMT
Date
Sat, 25 Jul 2020 11:34:08 GMT
Connection
keep-alive
pd
u.openx.net/w/1.0/ Frame 1F6B
0
0
Document
General
Full URL
https://u.openx.net/w/1.0/pd?gdpr=1&gdpr_consent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.98.64.218 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
OXGW/16.190.0 /
Resource Hash

Request headers

:method
GET
:authority
u.openx.net
:scheme
https
:path
/w/1.0/pd?gdpr=1&gdpr_consent=
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
i=a6eed4f4-f549-47c2-85b2-46ea2dc70330|1595676846
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
vary
Accept, Accept-Encoding
set-cookie
i=a6eed4f4-f549-47c2-85b2-46ea2dc70330|1595676846; Version=1; Expires=Sun, 25-Jul-2021 11:34:08 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None pd=v2|1595676848|gekin0vNiygu; Version=1; Expires=Sun, 09-Aug-2020 11:34:08 GMT; Max-Age=1296000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.190.0
p3p
CP="CUR ADM OUR NOR STA NID"
date
Sat, 25 Jul 2020 11:34:08 GMT
content-type
text/html
content-length
420
content-encoding
gzip
via
1.1 google
alt-svc
clear
usync.html
eus.rubiconproject.com/ Frame B069
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?gdpr=1&gdpr_consent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.37.42.132 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Wed, 22 Jul 2020 18:23:17 GMT
Content-Encoding
gzip
Content-Length
9299
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=27719
Expires
Sat, 25 Jul 2020 19:16:07 GMT
Date
Sat, 25 Jul 2020 11:34:08 GMT
Connection
keep-alive
Vary
Accept-Encoding
sync
pixel.advertising.com/ups/55953/ Frame D267
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=adaptv&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=adaptv&ttd_tpi=1
  • https://pixel.advertising.com/ups/55953/sync?uid=a0badc05-732d-4807-b6e0-140eb128b11e&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=a0badc05-732d-4807-b6e0-140eb128b11e
0
124 B
Image
General
Full URL
https://pixel.advertising.com/ups/55953/sync?uid=a0badc05-732d-4807-b6e0-140eb128b11e&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=a0badc05-732d-4807-b6e0-140eb128b11e
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.197.47.23 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
204
date
Sat, 25 Jul 2020 11:34:09 GMT
strict-transport-security
max-age=31536000
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:09 GMT
x-aspnet-version
4.0.30319
status
302
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
location
https://pixel.advertising.com/ups/55953/sync?uid=a0badc05-732d-4807-b6e0-140eb128b11e&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=a0badc05-732d-4807-b6e0-140eb128b11e
cache-control
private,no-cache, must-revalidate
content-type
text/html
content-length
369
sync
ups.analytics.yahoo.com/ups/57304/ Frame D267
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=adaptv_dbm&google_cm&google_sc
  • https://pixel.advertising.com/ups/57304/sync?uid=CAESEHTNpny0rPjTtCVX13hP1Xk&google_cver=1
  • https://pixel.advertising.com/ups/57304/sync?uid=CAESEHTNpny0rPjTtCVX13hP1Xk&google_cver=1&verify=true
  • https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESEHTNpny0rPjTtCVX13hP1Xk&google_cver=1&apid=UPc12390ff-ce6a-11ea-85f7-0657c924cf86
0
1 KB
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESEHTNpny0rPjTtCVX13hP1Xk&google_cver=1&apid=UPc12390ff-ce6a-11ea-85f7-0657c924cf86
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
3.126.56.137 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
ATS/7.1.2.113 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 11:34:09 GMT
Server
ATS/7.1.2.113
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Sat, 25 Jul 2020 11:34:09 GMT
location
https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESEHTNpny0rPjTtCVX13hP1Xk&google_cver=1&apid=UPc12390ff-ce6a-11ea-85f7-0657c924cf86
content-length
0
strict-transport-security
max-age=31536000
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
%7Bcombo_uid%7D
pr-bh.ybp.yahoo.com/sync/adaptv_ortb/ Frame D267
43 B
622 B
Image
General
Full URL
https://pr-bh.ybp.yahoo.com/sync/adaptv_ortb/%7Bcombo_uid%7D
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1288:110:c305::8000 , United Kingdom, ASN34010 (YAHOO-IRD, GB),
Reverse DNS
Software
ATS /
Resource Hash
48a33ca9f42b91902d57ad8ac52e1ce32b92c8c10c732f2dbb6fe960ebfd9438
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 11:34:08 GMT
referrer-policy
strict-origin-when-cross-origin
server
ATS
age
0
expect-ct
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
strict-transport-security
max-age=31536000
content-type
image/gif
status
200
x-xss-protection
1; mode=block
content-length
43
x-content-type-options
nosniff
expires
Thu, 01 Jan 1970 00:00:00 GMT
sync
pixel.advertising.com/ups/55986/ Frame D267
Redirect Chain
  • https://sync-tm.everesttech.net/upi/pid/m7y5t93k?gdpr=1&gdpr_consent=&redir=https%3A%2F%2Fpixel.advertising.com%2Fups%2F55986%2Fsync%3Fuid%3D%24%7BUSER_ID%7D%26_origin%3D0&gdpr=1&gdpr_consent=
  • https://sync-tm.everesttech.net/ct/upi/pid/m7y5t93k?gdpr=1&gdpr_consent=&redir=https%3A%2F%2Fpixel.advertising.com%2Fups%2F55986%2Fsync%3Fuid%3D%24%7BUSER_ID%7D%26_origin%3D0&gdpr=1&gdpr_consent=&_...
  • https://pixel.advertising.com/ups/55986/sync?uid=XxwYsQAAAFBs9gFU&_origin=0&gdpr=1&gdpr_consent=&_test=XxwYsQAAAFBs9gFU
0
124 B
Image
General
Full URL
https://pixel.advertising.com/ups/55986/sync?uid=XxwYsQAAAFBs9gFU&_origin=0&gdpr=1&gdpr_consent=&_test=XxwYsQAAAFBs9gFU
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.197.47.23 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
204
date
Sat, 25 Jul 2020 11:34:09 GMT
strict-transport-security
max-age=31536000
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:09 GMT
via
1.1 varnish
server
Varnish
x-timer
S1595676849.189924,VS0,VE0
x-served-by
cache-fra19122-FRA
status
302
x-cache
HIT
location
https://pixel.advertising.com/ups/55986/sync?uid=XxwYsQAAAFBs9gFU&_origin=0&gdpr=1&gdpr_consent=&_test=XxwYsQAAAFBs9gFU
cache-control
no-cache
accept-ranges
bytes
content-length
0
retry-after
0
x-cache-hits
0
activeview
pagead2.googlesyndication.com/pcs/ Frame 6FEC
42 B
107 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsu8GJyKTd6QG-y2brmOnlAK-9YihRak1hh0kgtyoeY2DXwFClN13HQx327aFjv-zNjP3CFITH29KbiYRek8ZXEhtvIwsFC9YWfhB4HSs52l4ZXuZglls8cftljRm5-bIT1poIBvWK15L3UcdpNJcdpl8Q&sai=AMfl-YT-rHfukSin9E6CImp4SaSoiQJuTEsDwcnWECHBmczYIetg5wwbybCR6h8beFvylEpNHTIgKqsi9ycyjZKnoUpstA1czh3FrYw0C3Jwcy6ar8A955fCgCOvyl5BZ9Q&sig=Cg0ArKJSzPFq6rfxcJwkEAE&cid=CAASPeRo_YP7VQBGmpdS74d7WL4bD6BAK2QJV54jdLc1B56s8YyPBQ_rxpzzn4-LdoomcyjAQwuj210713jmWI0&id=ampim&o=315,10&d=970,250&ss=1600,1200&bs=1600,1200&mcvt=1001&mtos=0,0,0,1001,1001&tos=0,0,0,1001,0&tfs=371&tls=1372&g=100&h=100&tt=1372&r=v&avms=ampa&adk=1015519800
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:09 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 3BA2
42 B
107 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsv4Cbmgb6aSIKsJ9l3u-ui5msi6uTbQd3tpGFHnZJXclEX_MFc4znk5sMQW329Jx_O_B6B5TZXUXeUfxAADuEx_m5A-YXgFsULMDdcTETKJjJerTsN6U5EaGZyUkw&sai=AMfl-YQ7rEB4bfakNYuKO4iWXDve6CUiNhumNPMDcMC9BBTxRVtzA3nqmYnG84aB3TSYhHqPK04Gq-7B8spHT44ozH1py0bQ3Fae2AzBcfwbOCX5Y-lrYrwymG_OXQwkpBc&sig=Cg0ArKJSzEgLWx5Kic-iEAE&cid=CAASPeRopp5dsz8AtAnWmQnfhjoi4VNSSCGNJYxoSv0ke98_uu_RV1dPFCs0k6qb8SyXj5o2lrY1PjgtVE22VU4&id=ampim&o=1064,417&d=336,280&ss=1600,1200&bs=1600,1200&mcvt=1001&mtos=0,0,1001,1001,1001&tos=0,0,1001,0,0&tfs=201&tls=1202&g=100&h=100&tt=1202&r=v&avms=ampa&adk=654286612
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:09 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 418A
42 B
107 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjss8SUSb378z9XhLK0mSXBpIzQY_epSpVC9e3IL0UUZ_c-13pOirR2z_vQKG39DCnrfJa5fZzypw6LjVlOYNNFz9AkFne0f4luLgJ0-7gY0&sig=Cg0ArKJSzHCbM9HxGjghEAE&id=ampim&o=0,0&d=2,2&ss=1600,1200&bs=1600,1200&mcvt=1000&mtos=0,0,1000,1000,1000&tos=0,0,1000,0,0&tfs=93&tls=1093&g=100&h=100&tt=1094&r=v&avms=ampa&adk=3385906655
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:09 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
2000891.html
serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/ Frame 5EB5
Redirect Chain
  • https://sync.serverbid.com/ss/2000891.html
  • https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
0
0
Document
General
Full URL
https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload

Request headers

Host
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Date
Sat, 25 Jul 2020 11:34:11 GMT
Connection
Keep-Alive
Cache-Control
max-age=33992
Content-Length
4947
Content-Type
text/html
Last-Modified
Wed, 20 Nov 2019 20:29:05 GMT
Accept-Ranges
bytes
ETag
"1b0ebac83fe30af80513039edbdf566f"
x-amz-request-id
tx00000000000003cbe775c-005f1b4bfb-35d9d00-nyc3a
Strict-Transport-Security
max-age=15552000; includeSubDomains; preload
Vary
Access-Control-Request-Headers,Access-Control-Request-Method,Origin
X-HW
1595676850.dop088.lo4.t,1595676851.cds065.lo4.shn,1595676851.dop088.lo4.t,1595676851.cds210.lo4.c

Redirect headers

status
302
content-length
0
location
https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
cache-control
no-cache
sync
eb2.3lift.com/ Frame ECB8
Redirect Chain
  • https://eb2.3lift.com/sync?
  • https://eb2.3lift.com/sync?&ld=1
0
0
Document
General
Full URL
https://eb2.3lift.com/sync?&ld=1
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.28.32.108 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash

Request headers

:method
GET
:authority
eb2.3lift.com
:scheme
https
:path
/sync?&ld=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
tluid=16043760439156506192
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
date
Sat, 25 Jul 2020 11:34:09 GMT
content-type
text/html; charset=utf-8
content-length
466
set-cookie
sync=CgoIgQIQhu2BrrguCgoIoQEQhu2BrrguCgoI4gEQhu2BrrguCgoI5gEQhu2BrrguCgoI1gEQhu2BrrguCgoIhwIQhu2BrrguCgkIOhCG7YGuuC4KCQgLEIbtga64LgoJCF8Qhu2BrrguCgkIHxCG7YGuuC4=; Max-Age=7776000; Expires=Fri, 23 Oct 2020 11:34:09 GMT; Path=/sync; Domain=.3lift.com; SameSite=None; Secure tluid=16043760439156506192; Max-Age=7776000; Expires=Fri, 23 Oct 2020 11:34:09 GMT; Path=/; Domain=.3lift.com; SameSite=None; Secure
content-encoding
gzip
p3p
policyref="http://cdn.3lift.com/w3c/p3p.xml", CP="NON DSP COR NID OUR DEL SAM OTR UNR COM NAV INT DEM CNT STA PRE LOC OTC"
cache-control
no-cache, no-store, must-revalidate

Redirect headers

status
302
date
Sat, 25 Jul 2020 11:34:09 GMT
content-length
0
set-cookie
tluid=16043760439156506192; Max-Age=7776000; Expires=Fri, 23 Oct 2020 11:34:09 GMT; Path=/; Domain=.3lift.com; SameSite=None; Secure
location
/sync?&ld=1
cache-control
no-cache, no-store, must-revalidate
p3p
policyref="http://cdn.3lift.com/w3c/p3p.xml", CP="NON DSP COR NID OUR DEL SAM OTR UNR COM NAV INT DEM CNT STA PRE LOC OTC"
usync.html
eus.rubiconproject.com/ Frame FA60
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.37.42.132 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Wed, 22 Jul 2020 18:23:17 GMT
Content-Encoding
gzip
Content-Length
9299
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=27718
Expires
Sat, 25 Jul 2020 19:16:07 GMT
Date
Sat, 25 Jul 2020 11:34:09 GMT
Connection
keep-alive
Vary
Accept-Encoding
ixmatch.html
js-sec.indexww.com/um/ Frame 732C
0
0
Document
General
Full URL
https://js-sec.indexww.com/um/ixmatch.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.254.129 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache /
Resource Hash

Request headers

Host
js-sec.indexww.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Server
Apache
Last-Modified
Mon, 19 Jun 2017 19:18:19 GMT
ETag
"74087b-112-55254ff6699bb"
Accept-Ranges
bytes
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Content-Type
text/html; charset=UTF-8
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
211
Date
Sat, 25 Jul 2020 11:34:09 GMT
Connection
keep-alive
Cookie set beacon
ap.lijit.com/ Frame DD00
Redirect Chain
  • https://ap.lijit.com/beacon?informer=13394437
  • https://ap.lijit.com/beacon?informer=13394437&dnr=1
0
0
Document
General
Full URL
https://ap.lijit.com/beacon?informer=13394437&dnr=1
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
216.52.2.48 , United States, ASN29791 (VOXEL-DOT-NET, US),
Reverse DNS
Software
nginx / raptor
Resource Hash

Request headers

Host
ap.lijit.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
ljt_reader=e2d4cc261f99de2e420b13f5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Server
nginx
Date
Sat, 25 Jul 2020 11:34:09 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Vary
Accept-Encoding
Expires
Fri, 20 Mar 2009 00:00:00 GMT
Set-Cookie
ljtrtbexp=eJxlkDsSgEAIQ%2B%2BytcXC8glezfHujjs2xPIBCYFruMDHKV4BhFkdQzZ6xtIXI3pbO66OKWQ2O1cVrcvPXyGxFfpT5K%2BCXgFtEcoMSgkjpkxgPSVQ8tP4fqZzbs5%2B0yI%2FI71VZ6d5b%2FfeDzWrV9A%3D;Path=/;Domain=.lijit.com;Expires=Sun, 25-Jul-2021 11:34:09 GMT;Max-Age=31536000;Secure;SameSite=None ljt_reader=e2d4cc261f99de2e420b13f5;Path=/;Domain=.lijit.com;Max-Age=31536000;Secure;SameSite=None
Cache-Control
private, no-cache, no-store, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
Pragma
no-cache
P3P
CP="CUR ADM OUR NOR STA NID"
X-Powered-By
raptor
Content-Encoding
gzip
X-Sovrn-Pod
ad_ap5ams1

Redirect headers

Server
nginx
Date
Sat, 25 Jul 2020 11:34:09 GMT
Content-Length
0
Set-Cookie
ljt_reader=e2d4cc261f99de2e420b13f5;Path=/;Domain=.lijit.com;Max-Age=31536000;Secure;SameSite=None
Expires
Fri, 20 Mar 2009 00:00:00 GMT
Cache-Control
private, no-cache, no-store, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
Pragma
no-cache
P3P
CP="CUR ADM OUR NOR STA NID"
Location
https://ap.lijit.com/beacon?informer=13394437&dnr=1
X-Powered-By
raptor
X-Sovrn-Pod
ad_ap5ams1
showad.js
ads.pubmatic.com/AdServer/js/ Frame 4416
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/showad.js
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.32 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
KTPCACOOKIE=YES; KCCH=YES; pi=159196:2
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Last-Modified
Tue, 14 Apr 2020 10:27:52 GMT
ETag
"13006b6-a4bb-5a33da6f1a023"
Server
Apache/2.2.15 (CentOS)
Accept-Ranges
bytes
Content-Encoding
gzip
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
15243
Content-Type
text/html; charset=UTF-8
Cache-Control
public, max-age=31102
Expires
Sat, 25 Jul 2020 20:12:31 GMT
Date
Sat, 25 Jul 2020 11:34:09 GMT
Connection
keep-alive
Vary
Accept-Encoding
async_usersync.html
acdn.adnxs.com/dmp/ Frame BB72
0
0
Document
General
Full URL
https://acdn.adnxs.com/dmp/async_usersync.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.253.36 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
nginx/1.13.10 /
Resource Hash

Request headers

Host
acdn.adnxs.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Last-Modified
Tue, 24 Mar 2020 15:52:19 GMT
ETag
"5e7a2cb3-cefd"
Server
nginx/1.13.10
Access-Control-Allow-Origin
*
Content-Type
text/html
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
17037
Cache-Control
max-age=86402
Expires
Sun, 26 Jul 2020 11:34:11 GMT
Date
Sat, 25 Jul 2020 11:34:09 GMT
Connection
keep-alive
sync.html
public.servenobid.com/ Frame B7AA
0
0
Document
General
Full URL
https://public.servenobid.com/sync.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
143.204.201.96 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
public.servenobid.com
:scheme
https
:path
/sync.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
content-type
text/html
last-modified
Thu, 23 Jul 2020 21:05:53 GMT
server
AmazonS3
content-encoding
gzip
date
Sat, 25 Jul 2020 09:46:45 GMT
cache-control
max-age=86400
vary
Accept-Encoding
x-cache
Hit from cloudfront
via
1.1 85dc19f43b2a0bd8840fdf8baf07d762.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA53-C1
x-amz-cf-id
sF8npiO0Ai5S1cQxil30bn2n2PWwImSirHzoSRuVo10HZRVdyOahPA==
age
6445
pd
eu-u.openx.net/w/1.0/ Frame F746
0
0
Document
General
Full URL
https://eu-u.openx.net/w/1.0/pd?plm=6&ph=e1b1f5e1-3c2c-4287-9806-317cfbf3bd12&gdpr=1
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.98.64.218 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
OXGW/16.190.0 /
Resource Hash

Request headers

:method
GET
:authority
eu-u.openx.net
:scheme
https
:path
/w/1.0/pd?plm=6&ph=e1b1f5e1-3c2c-4287-9806-317cfbf3bd12&gdpr=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
i=a6eed4f4-f549-47c2-85b2-46ea2dc70330|1595676846; pd=v2|1595676848|gekin0vNiygu
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
vary
Accept, Accept-Encoding
set-cookie
i=a6eed4f4-f549-47c2-85b2-46ea2dc70330|1595676846; Version=1; Expires=Sun, 25-Jul-2021 11:34:09 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None pd=v2|1595676848.1|kiiygevNgun0.mWgqsLommOns; Version=1; Expires=Sun, 09-Aug-2020 11:34:09 GMT; Max-Age=1296000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.190.0
p3p
CP="CUR ADM OUR NOR STA NID"
date
Sat, 25 Jul 2020 11:34:09 GMT
content-type
text/html
content-length
316
content-encoding
gzip
via
1.1 google
alt-svc
clear
sync
pixel.advertising.com/ups/55965/
Redirect Chain
  • https://pixel.quantserve.com/pixel/p-NcBg8UA4xqUFp.gif?idmatch=0&gdpr=1&gdpr_consent=
  • https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=365qX9vwOQ3H-WoJ2at2CozwPlrH_2lejKkt5LYE
0
124 B
Image
General
Full URL
https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=365qX9vwOQ3H-WoJ2at2CozwPlrH_2lejKkt5LYE
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.197.47.23 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
204
date
Sat, 25 Jul 2020 11:34:09 GMT
strict-transport-security
max-age=31536000
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:09 GMT
status
302
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
location
https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=365qX9vwOQ3H-WoJ2at2CozwPlrH_2lejKkt5LYE
cache-control
private, no-cache, no-store, proxy-revalidate
strict-transport-security
max-age=86400
content-length
0
expires
Fri, 04 Aug 1978 12:00:00 GMT
/
c1.adform.net/serving/cookie/match/
0
187 B
Image
General
Full URL
https://c1.adform.net/serving/cookie/match/?CC=1&party=15&gdpr=1&gdpr_consent=&curl=https%3A%2F%2Fpixel.advertising.com%2Fups%2F55944%2Fsync%3Fuid%3D%24UID%26_origin%3D0%26gdpr%3d1%26gdpr_consent%3d
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.157.4.28 , Denmark, ASN198622 (ADFORM, DK),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:09 GMT
server
nginx
status
403
strict-transport-security
max-age=31536000; includeSubDomains
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate, no-transform
content-length
0
expires
-1
current
aol-match.dotomi.com/match/bounce/
0
103 B
Image
General
Full URL
https://aol-match.dotomi.com/match/bounce/current?networkId=60&version=1&nuid=1Abf61d3f4-ce6a-11ea-9a39-12a93b07bf66&gdpr=1&gdpr_consent=&rurl=https%3A%2F%2Fpixel.advertising.com%2Fups%2F55853%2Fsync%3Fuid%3D%24UID%26_origin%3D0%26gdpr%3D1%26gdpr_consent%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:fa8:8806:12::1370 , Sweden, ASN41041 (VCLK-EU-, SE),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
204
pragma
no-cache
date
Sat, 25 Jul 2020 11:34:09 GMT
cache-control
no-cache, private, max-age=0, no-store
server
nginx
expires
0
sync
pixel.advertising.com/ups/56465/
0
124 B
Image
General
Full URL
https://pixel.advertising.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.197.47.23 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
204
date
Sat, 25 Jul 2020 11:34:09 GMT
strict-transport-security
max-age=31536000
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
generic
match.adsrvr.org/track/cmf/
70 B
264 B
Image
General
Full URL
https://match.adsrvr.org/track/cmf/generic?ttd_pid=aoladtech&gdpr=1&gdpr_consent=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.19.114.209 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
8d70b3e6badb6973663b398d297bb32eaedd08826a1af98d0a1cfce5324ffce0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:09 GMT
x-aspnet-version
4.0.30319
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
status
200
cache-control
private,no-cache, must-revalidate
content-type
image/gif
content-length
70
liveView.php
live.sekindo.com/live/ Frame 3A73
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1595676846&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20content_VE%20%2F%201%20%2F%20default&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&csuuid=5f1c18ae4215a&contentFileId=0&mediaPlayListId=0&dur=500&viewPct={%22w%22:100,%22h%22:100}&cbuster=1595676852069&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=&uid=SekindoSPlayer5f1c18ae74135&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&floatStatus=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:11 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
cygnus
as-sec.casalemedia.com/ Frame D267
25 B
1 KB
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=435870&v=8.1&r={%22id%22:%22232138596ade1c3%22,%22imp%22:[{%22id%22:%22241d97a5c1e89a%22,%22ext%22:{%22siteID%22:%22435870%22,%22sid%22:%22320x180%22},%22bidfloor%22:1.8,%22bidfloorcur%22:%22USD%22,%22video%22:{%22mimes%22:[%22video/mp4%22,%22application/javascript%22],%22minduration%22:1,%22maxduration%22:200,%22api%22:[1,2],%22protocols%22:[1,2,3,4,5,6],%22linearity%22:1,%22startdelay%22:0,%22skip%22:1,%22w%22:320,%22h%22:180,%22placement%22:1}}],%22site%22:{%22ref%22:%22https://t.co/X0ukaAEsUs%22,%22page%22:%22https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F%22},%22ext%22:{%22source%22:%22prebid%22},%22source%22:{%22ext%22:{%22schain%22:{%22ver%22:%221.0%22,%22complete%22:1,%22nodes%22:[{%22asi%22:%22admetricspro.com%22,%22sid%22:%221005%22,%22hp%22:1}]}}},%22regs%22:{%22ext%22:{%22gdpr%22:1}},%22user%22:{%22ext%22:{%22consent%22:%22%22}}}&ac=j&sd=1&nf=1
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.254.129 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache /
Resource Hash
9dc5631b2e179dc0e9a1f77faed23db779f5b56c50edd28487a53c2f6a1d90d2

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:15 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
45
Expires
Sat, 25 Jul 2020 11:34:15 GMT
openrtb
ads.adaptv.advertising.com/rtb/ Frame D267
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=TeachingAidsLLC
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.29.183.32 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

access-control-allow-origin
https://threatpost.com
access-control-allow-credentials
true
server
adaptv/1.0
Connection
keep-alive
content-length
0
content-type
application/json
translator
hbopenbid.pubmatic.com/ Frame D267
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Sat, 25 Jul 2020 11:34:15 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
prebid
ib.adnxs.com/ut/v3/ Frame D267
19 B
709 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.172.37 , Ascension Island, ASN29990 (ASN-APPNEX, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
0c09c070833c786cb25be38bc30992b30bad578f817dbc9e34beacd8b8ea44c5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:15 GMT
X-Proxy-Origin
194.99.105.99; 194.99.105.99; 691.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.173.89:80
AN-X-Request-Uuid
b877d812-7f30-4aad-90b9-b73c122c6743
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
19
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
avjp
teachingaids-d.openx.net/v/1.0/ Frame D267
92 B
283 B
XHR
General
Full URL
https://teachingaids-d.openx.net/v/1.0/avjp?ju=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&ch=UTF-8&res=1600x1200x24&ifr=true&tz=-120&tws=1600x1200&be=1&bc=hb_pb_3.0.2&dddid=0a17cc46-62b4-4c81-8706-36d00353ded1&nocache=1595676855275&gdpr_consent=&gdpr=1&schain=1.0,1!admetricspro.com,1005,1,,,&skip=1&auid=540882779&vwd=320&vht=180
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.98.64.218 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
OXGW/16.190.0 /
Resource Hash
004e5faf0bf890f61697daeede9f21826affd1137fb2cb58eaf4719937a04a14

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:15 GMT
via
1.1 google
server
OXGW/16.190.0
status
200
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
92
expires
Mon, 26 Jul 1997 05:00:00 GMT
liveView.php
live.sekindo.com/live/ Frame 3A73
43 B
463 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=6&serverTime=1595676846&s=58057&sta=12381375&x=320&y=180&msta=12348808&vid_vastType=3&vid_viewabilityState=1&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20content_VE%20%2F%201%20%2F%20default&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&csuuid=5f1c18ae4215a&rvn=${VP_RVN_MACRO}&attemptMultiplier=10&contentFileId=0&mediaPlayListId=0&playerVer=3.0.0&cbuster=1595676855267&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=&uid=SekindoSPlayer5f1c18ae74135&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&floatStatus=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
42b976597a2d977d0e300f6d06bc903db389e5c112d33c1c8c249690a522d9f2

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:14 GMT
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000
Content-Disposition
inline; filename="pixel.gif"
Content-Type
image/gif
Expires
Thu, 31 Dec 2037 23:55:55 GMT
v1
prg.smartadserver.com/prebid/ Frame D267
0
307 B
XHR
General
Full URL
https://prg.smartadserver.com/prebid/v1
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
185.86.139.29 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:16 GMT
p3p
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
access-control-allow-origin
https://threatpost.com
cache-control
no-cache,no-store
access-control-allow-credentials
true
content-type
application/json
content-length
0
openrtb
ads.adaptv.advertising.com/rtb/ Frame D267
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=PrimisTwoHB
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.29.183.32 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

access-control-allow-origin
https://threatpost.com
access-control-allow-credentials
true
server
adaptv/1.0
Connection
keep-alive
content-length
0
content-type
application/json
auction
prebid-server.rubiconproject.com/openrtb2/ Frame D267
173 B
380 B
XHR
General
Full URL
https://prebid-server.rubiconproject.com/openrtb2/auction
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.157.177.102 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
2f348e79f8518469bfad7433d9fdfd08ad643070d61d8b45593716374992093a

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 11:34:16 GMT
content-encoding
gzip
status
200
content-type
application/json
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
167
expires
0
liveView.php
live.sekindo.com/live/ Frame 3A73
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=25&serverTime=1595676846&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20content_VE%20%2F%201%20%2F%20default&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&csuuid=5f1c18ae4215a&contentFileId=0&mediaPlayListId=0&dur=1000&cbuster=1595676856803&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=&uid=SekindoSPlayer5f1c18ae74135&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&floatStatus=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:16 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
liveView.php
live.sekindo.com/live/ Frame 3A73
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1595676846&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20content_VE%20%2F%201%20%2F%20default&isApp=0&userIpAddr=194.99.105.99&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&csuuid=5f1c18ae4215a&contentFileId=0&mediaPlayListId=0&dur=500&viewPct={%22w%22:100,%22h%22:100}&cbuster=1595676857069&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=&uid=SekindoSPlayer5f1c18ae74135&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&floatStatus=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 11:34:16 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8

Verdicts & Comments Add Verdict or Comment

241 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

string| gAMP_urlhost string| gAMP_urlpath string| gAMP_urlquery string| gAMP_contentid string| gAMP_category string| gAMP_contenttags object| g8WHCa function| g8WHCb object| xop number| kPrebidTimeout number| kRefreshPollTime number| gRefreshCount number| gOXRefreshCount boolean| gRefreshDebug boolean| gPrebidDebug number| k60SecondRefreshInterval number| k90SecondRefreshInterval number| k120SecondRefreshInterval number| k180SecondRefreshInterval number| kDoNotRefresh number| kDefaultRefreshInterval object| gSChainNodes undefined| gGDPR_forceLocale boolean| gGDPR_silentNoConsent boolean| gGDPR_forceNoConsent string| gGDPR_logoURL string| gGDPR_privacyPolicyURL string| kAmazonPublisherID object| ad728x90ATF object| ad300x250ATF object| ad300x250ATF2 object| ad728x90ATFTAB object| ad300x250ATFTAB object| ad300x250ATF2TAB object| ad320x50ATF object| ad300x250ATFM object| ad300x250ATF2M object| ad2x2skin number| gBrowserWidth object| desktopAdUnits object| tabletAdUnits object| mobileAdUnits object| gAllSlotData number| gAllSlotCount object| OX_dfp_ads number| minWidth boolean| disableBids object| googletag object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleTokenSync number| google_srt function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter undefined| google_measure_js_timing object| __core-js_shared__ object| core undefined| __cmp function| pbjsChunk object| pbjs object| _pbjsGlobals string| nobidVersion object| nobid object| gRefreshSlots object| gRefreshIDs object| gRefreshTimes object| gRefreshIntervals object| gThisRefreshIDs object| gThisRefreshSlots boolean| gInitialLoad object| gPBJSTimeoutTimer object| gAmazonSlots object| gAmazonBids boolean| gAmazonBidsBack boolean| gOpenXBidsBack boolean| gPrebidBidsBack function| amp_getBidsForAllChannels function| amp_dumpTable function| amp_getBestBids function| amp_dumpBids function| amp_dumpWins function| customOxTargeting function| openXRefreshCallback function| sendAdserverRequest function| checkIfAllBidsBack function| amazonBidsBack function| pbjsBidsBack function| bidsTimeout function| sendBidRequests function| amp_refreshAllSlots function| amp_refreshSlots function| refreshAdSlots function| configureAdSlot function| getCookie object| apstag undefined| $ function| jQuery object| gdprDynamicStrings object| kss object| gdprStrings function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill object| dataLayer object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client object| Mur4pa function| Mur4pb function| xblocker object| kb72la function| kb72lb function| xblacklist object| google_tag_manager object| recaptcha object| google_tag_data string| GoogleAnalyticsObject function| ga object| _qevents function| twq object| viewPortSize object| debugIp object| debugId number| sekindoDisplayedPlacement function| constructsekindoParent932 boolean| apstagLOADED object| gf_global function| quantserve function| __qc object| ezt object| _qoptions object| gaplugins object| gaGlobal object| gaData object| twttr number| __google_ad_urls_id number| google_unique_id boolean| sekindoFlowingPlayerOn function| gformBindFormatPricingFields function| Currency function| gformCleanNumber function| gformGetDecimalSeparator function| gformIsNumber function| gformIsNumeric function| gformDeleteUploadedFile object| _gformPriceFields undefined| _anyProductSelected function| gformIsHidden function| gformCalculateTotalPrice function| gformGetShippingPrice function| gformGetFieldId function| gformCalculateProductPrice function| gformGetProductQuantity function| gformIsProductSelected function| gformGetBasePrice function| gformFormatMoney function| gformFormatPricingField function| gformToNumber function| gformGetPriceDifference function| gformGetOptionLabel function| gformGetProductIds function| gformGetPrice function| gformRoundPrice function| gformRegisterPriceField function| gformInitPriceFields function| gformShowPasswordStrength function| gformPasswordStrength function| gformToggleShowPassword function| gformToggleCheckboxes function| gformAddListItem function| gformDeleteListItem function| gformAdjustClasses function| gformToggleIcons function| gformAddRepeaterItem function| gformDeleteRepeaterItem function| gformResetRepeaterAttributes function| gformToggleRepeaterButtons function| gformMatchCard function| gformFindCardType function| gformToggleCreditCard function| gformInitChosenFields function| gformInitCurrencyFormatFields function| GFMergeTag function| GFCalc function| gformFormatNumber function| getMatchGroups function| gf_get_field_number_format object| gform undefined| __gf_keyup_timeout function| renderRecaptcha function| gformValidateFileSize function| gformInitSpinner function| gformAddSpinner function| gf_raw_input_change function| gf_get_input_id_by_html_id function| gf_get_form_id_by_html_id function| gf_get_ids_by_html_id function| gf_input_change function| gformExtractFieldId function| gformExtractInputIndex function| rgars function| rgar object| gfMultiFileUploader undefined| __gf_timeout_handle function| gf_apply_rules function| gf_check_field_rule function| gf_get_field_logic function| gf_apply_field_rule function| gf_get_field_action function| gf_is_match function| gf_is_match_checkable function| gf_is_match_default function| gf_format_number function| gf_try_convert_float function| gf_matches_operation function| gf_get_value function| gf_do_field_action function| gf_do_next_button_action function| gf_do_action function| gf_reset_to_default function| gf_is_hidden_pricing_input object| Placeholders object| ak_js object| commentForm undefined| replyRowContainer undefined| children object| wp object| jQuery112406837654818196459 object| gf_form_conditional_logic string| gf_number_format function| do_callback object| closure_lm_837391 function| jQuery112406837654818196459_1595676845906 object| ampInaboxPositionObserver object| ampInaboxFrameOverlayManager object| GoogleGcLKhOms object| google_image_requests

4 Cookies

Domain/Path Name / Value
.pubmatic.com/ Name: pi
Value: 159196:2
.ads.pubmatic.com/ Name: KCCH
Value: YES
.pubmatic.com/ Name: KTPCACOOKIE
Value: YES
.threatpost.com/ Name: __gads
Value: ID=0a0040264042fd1b-22a7bc809fb60075:T=1595676846:S=ALNI_Mbftd5iI9qkaIpIbVqclSQ5UPXYdQ

32 Console Messages

Source Level URL
Text
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 343)
Message:
gBrowserWidth =1600
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 368)
Message:
OpenX Slot defined for /21707124336/ThreatPost-970x250-ATF div-gpt-ad-6794670-2
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 368)
Message:
OpenX Slot defined for /21707124336/ThreatPost-300x250-ATF div-gpt-ad-6794670-3
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 368)
Message:
OpenX Slot defined for /21707124336/ThreatPost-300x600-ATF div-gpt-ad-6794670-5
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 368)
Message:
OpenX Slot defined for /21707124336/ThreatPost-2x2-Skin div-gpt-ad-6794670-1
console-api log URL: https://qd.admetricspro.com/js/threatpost/cmp.js(Line 3)
Message:
CMP: Locale=en-us gdpr= false
console-api log URL: https://qd.admetricspro.com/js/threatpost/cmp.js(Line 3)
Message:
GDPR is not applicable, skipping initialization of CMP
console-api warning URL: https://qd.admetricspro.com/js/threatpost/prebid.js(Line 3)
Message:
fun-hooks: referenced 'registerAdserver' but it was never created
console-api log (Line 3)
Message:
ENGINE: gSChainNodes found, prebid configured with 1 supply chain object(s)
console-api log (Line 3)
Message:
ENGINE: final pbjs config
console-api log (Line 3)
Message:
[object Object]
console-api log (Line 3)
Message:
Initial Ad Load
console-api log (Line 3)
Message:
sendBidRequests() gPBJSTimeoutTimer=null pbjs.adserverRequestSent=undefined
console-api log (Line 3)
Message:
Amazon bids returned, count=4
console-api log (Line 3)
Message:
[object Object],[object Object],[object Object],[object Object]
console-api log (Line 3)
Message:
pbjs bids returned
console-api log (Line 3)
Message:
gPBJSTimeoutTimer cleared
console-api log (Line 3)
Message:
sendAdserverRequest(): pbjsBidsBack
console-api log (Line 3)
Message:
sendAdserverRequest()
console-api log (Line 3)
Message:
pbjs.getAdserverTargeting: >> Amazon >> Prebid
console-api log (Line 3)
Message:
[object Object]
console-api log (Line 3)
Message:
pbjs.getBidResponses:
console-api log (Line 3)
Message:
[object Object]
console-api log (Line 3)
Message:
gThisRefreshSlots=
console-api log (Line 3)
Message:
[object Object],[object Object],[object Object],[object Object]
console-api log (Line 3)
Message:
sendAdserverRequest(): ---> Calling googletag.pubads().refresh()
console-api log (Line 3)
Message:
console.groupEnd
console-api info URL: https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
console-api info URL: https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
console-api info URL: https://cdn.ampproject.org/rtv/022007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
console-api info URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
console-api warning URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 21)
Message:
[amp-analytics/transport] Response unparseable or failed to send image request https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuGOAYZa1w0kV3-DGg3WcdAeI2HfpQoMJZ5nZD4n3g05ds_2R9eeY549wEEqnBeBblxVteTBoDEhcYGBglEhbwsH2D9eOxx8WkKsaiywN_ZhyADwuT_lL2grr0H43D3cqe3TuWC2j3rv3_8MhCh_fjzCqy8cfWy3IyT_9bvkobct-D1nIcsP5bAz20vXD252pG37TnVNIOb-mwOyVPfz73Soedz4rxeIdeMlGVb6xCJLVI_rP3LWrAZwjbcJh0g0d8BS01sbg4pYbyyMQA1AL2q&sai=AMfl-YQj5srwG62lDyoXki2HTCBFETpHCzvCWItFv1xSKo-3iU6EJa9SN1jKBcQyghkSs4Y0FVr60h_UsQ-7qNT6OcxQM2XBQQcumy_7CgThmTkuEKfymZWIurCNyqNCLI8&sig=Cg0ArKJSzGx5WoPG3cXlEAE&adurl=

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=0
X-Xss-Protection 0

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

176f23c8ee7cb75cdd281894c8d1d9e1.safeframe.googlesyndication.com
acdn.adnxs.com
ads.adaptv.advertising.com
ads.pubmatic.com
ads.servenobid.com
adserver-us.adtech.advertising.com
adservice.google.de
analytics.twitter.com
aol-match.dotomi.com
ap.lijit.com
as-sec.casalemedia.com
assets.threatpost.com
c.amazon-adsystem.com
c1.adform.net
cdn.ampproject.org
cm.g.doubleclick.net
csync.loopme.me
e.serverbid.com
eb2.3lift.com
encrypted-tbn0.gstatic.com
encrypted-tbn1.gstatic.com
encrypted-tbn2.gstatic.com
encrypted-tbn3.gstatic.com
eu-u.openx.net
eus.rubiconproject.com
fastlane.rubiconproject.com
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
graph.facebook.com
hbopenbid.pubmatic.com
i1.wp.com
ib.adnxs.com
js-sec.indexww.com
kasperskycontenthub.com
live.sekindo.com
lnkd.in
match.adsrvr.org
media.threatpost.com
pagead2.googlesyndication.com
pixel.advertising.com
pixel.quantserve.com
pr-bh.ybp.yahoo.com
prebid-server.rubiconproject.com
prebid.a-mo.net
prg.smartadserver.com
public.servenobid.com
qd.admetricspro.com
rules.quantcount.com
secure.gravatar.com
secure.quantserve.com
securepubads.g.doubleclick.net
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
static.ads-twitter.com
stats.g.doubleclick.net
sync-tm.everesttech.net
sync.search.spotxchange.com
sync.serverbid.com
t.co
tagan.adlightning.com
teachingaids-d.openx.net
threatpost.com
tlx.3lift.com
tpc.googlesyndication.com
u.openx.net
ups.analytics.yahoo.com
video.sekindo.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.gstatic.com
www.linkedin.com
www.reddit.com
x.bidswitch.net
104.244.42.131
104.244.42.5
107.21.45.77
108.174.10.10
134.209.129.254
143.204.201.110
143.204.201.96
151.101.112.157
151.101.14.49
165.227.252.242
172.217.16.130
172.217.23.98
18.195.193.185
18.195.225.18
18.197.47.23
185.64.189.112
185.86.139.29
185.94.180.126
192.0.77.2
194.146.38.23
199.232.53.140
205.185.216.10
213.19.162.31
216.52.2.48
23.37.42.132
2600:9000:2057:1c00:2:9275:3d40:93a1
2600:9000:2057:8800:6:44e3:f8c0:93a1
2600:9000:214f:e400:0:5c46:4f40:93a1
2606:2800:233:97b6:26be:138a:cba8:bb01
2606:4700:e6::ac40:c21a
2620:116:800d:21:36a9:ecb:e518:b308
2620:1ec:21::14
2a00:1288:110:c305::8000
2a00:1450:4001:800::2001
2a00:1450:4001:800::200a
2a00:1450:4001:800::200e
2a00:1450:4001:801::2004
2a00:1450:4001:806::200e
2a00:1450:4001:808::200e
2a00:1450:4001:80b::2003
2a00:1450:4001:80b::2008
2a00:1450:4001:814::2001
2a00:1450:4001:817::2002
2a00:1450:4001:818::2002
2a00:1450:4001:819::2003
2a00:1450:4001:81d::2002
2a00:1450:4001:81f::2001
2a00:1450:4001:81f::200e
2a00:1450:4001:820::2002
2a00:1450:4001:820::200e
2a00:1450:4001:824::2003
2a00:1450:400c:c0a::9d
2a02:fa8:8806:12::1370
2a03:2880:f01c:800e:face:b00c:0:2
2a04:fa87:fffe::c000:4902
3.126.56.137
34.253.1.139
34.98.64.218
35.157.177.102
35.173.160.135
37.157.4.28
37.252.172.37
45.83.41.218
52.19.114.209
52.28.32.108
52.29.183.32
72.247.225.32
88.99.243.111
92.122.253.36
92.122.254.129
99.86.0.120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