Submitted URL: https://t.co/X0ukaAEsUs
Effective URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Submission: On July 25 via api from CA

Summary

This website contacted 60 IPs in 9 countries across 48 domains to perform 263 HTTP transactions. The main IP is 35.173.160.135, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is threatpost.com.
TLS certificate: Issued by DigiCert SHA2 Secure Server CA on June 10th 2020. Valid for: a year.
This is the only time threatpost.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 104.244.42.69 13414 (TWITTER)
1 1 108.174.10.10 14413 (LINKEDIN)
1 2 2620:1ec:21::14 8068 (MICROSOFT...)
19 35.173.160.135 14618 (AMAZON-AES)
11 143.204.201.71 16509 (AMAZON-02)
5 2606:4700:e6:... 13335 (CLOUDFLAR...)
2 2a00:1450:400... 15169 (GOOGLE)
8 2600:9000:205... 16509 (AMAZON-02)
12 2600:9000:214... 16509 (AMAZON-02)
1 1 2a04:fa87:fff... 2635 (AUTOMATTIC)
1 192.0.77.2 2635 (AUTOMATTIC)
4 12 2a00:1450:400... 15169 (GOOGLE)
17 185.220.205.220 41436 (CLOUDWEBM...)
7 172.217.16.130 15169 (GOOGLE)
5 99.86.0.120 16509 (AMAZON-02)
3 92.122.254.129 16625 (AKAMAI-AS)
1 34.253.1.139 16509 (AMAZON-02)
3 185.33.221.50 29990 (ASN-APPNEX)
5 185.64.189.112 62713 (AS-PUBMATIC)
10 15 2606:2800:233... 15133 (EDGECAST)
3 6 35.244.159.8 15169 (GOOGLE)
1 178.128.135.80 14061 (DIGITALOC...)
1 35.156.185.79 16509 (AMAZON-02)
1 3 72.251.249.13 29791 (VOXEL-DOT...)
1 100.24.218.250 14618 (AMAZON-AES)
4 213.19.162.51 26667 (RUBICONPR...)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 3 2a00:1450:400... 15169 (GOOGLE)
1 3 2620:116:800d... 16509 (AMAZON-02)
1 151.101.112.157 54113 (FASTLY)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2600:9000:205... 16509 (AMAZON-02)
6 2a00:1450:400... 15169 (GOOGLE)
5 72.247.225.32 16625 (AKAMAI-AS)
2 2 185.94.180.126 35220 (SPOTX-AMS)
19 185.167.97.84 41436 (CLOUDWEBM...)
1 2 3.126.15.129 16509 (AMAZON-02)
1 1 88.99.244.177 24940 (HETZNER-AS)
5 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
41 2a00:1450:400... 15169 (GOOGLE)
5 18.185.185.10 16509 (AMAZON-02)
1 104.244.42.195 13414 (TWITTER)
1 2a03:2880:f01... 32934 (FACEBOOK)
1 199.232.53.140 54113 (FASTLY)
1 2 216.58.205.230 15169 (GOOGLE)
2 35.157.177.102 16509 (AMAZON-02)
8 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1288:110... 34010 (YAHOO-IRD)
2 3 34.252.111.25 16509 (AMAZON-02)
3 35.156.153.71 16509 (AMAZON-02)
2 34.98.64.218 15169 (GOOGLE)
1 1 165.227.252.242 14061 (DIGITALOC...)
1 205.185.216.10 20446 (HIGHWINDS3)
1 2 18.195.24.101 16509 (AMAZON-02)
1 13.35.254.100 16509 (AMAZON-02)
1 92.122.253.36 16625 (AKAMAI-AS)
1 23.37.42.132 16625 (AKAMAI-AS)
1 37.157.6.245 198622 (ADFORM)
1 2a02:fa8:8806... 41041 (VCLK-EU-)
4 185.220.204.220 41436 (CLOUDWEBM...)
1 37.252.172.45 29990 (ASN-APPNEX)
2 63.250.56.119 41436 (CLOUDWEBM...)
263 60
Apex Domain
Subdomains
Transfer
42 sekindo.com
live.sekindo.com
video.sekindo.com
3 MB
38 threatpost.com
threatpost.com
assets.threatpost.com
media.threatpost.com
826 KB
30 googlesyndication.com
8b675fca0d72ef4d503d0e09691ad717.safeframe.googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
187 KB
23 advertising.com
adserver-us.adtech.advertising.com
ads.adaptv.advertising.com
pixel.advertising.com
11 KB
17 ampproject.org
cdn.ampproject.org
409 KB
13 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
ad.doubleclick.net
googleads.g.doubleclick.net
cm.g.doubleclick.net Failed
113 KB
12 google.com
www.google.com
2 KB
11 adlightning.com
tagan.adlightning.com
202 KB
10 pubmatic.com
hbopenbid.pubmatic.com
ads.pubmatic.com
407 B
8 openx.net
teachingaids-d.openx.net
u.openx.net
eu-u.openx.net
2 KB
7 gstatic.com
www.gstatic.com
fonts.gstatic.com
315 KB
7 rubiconproject.com
fastlane.rubiconproject.com
prebid-server.rubiconproject.com
eus.rubiconproject.com Failed
8 KB
6 googleapis.com
fonts.googleapis.com
4 KB
5 adnxs.com
ib.adnxs.com
acdn.adnxs.com Failed
3 KB
5 amazon-adsystem.com
c.amazon-adsystem.com
59 KB
5 admetricspro.com
qd.admetricspro.com
183 KB
3 adsrvr.org
match.adsrvr.org
1 KB
3 quantserve.com
secure.quantserve.com
pixel.quantserve.com
9 KB
3 google-analytics.com
www.google-analytics.com
19 KB
3 lijit.com
ap.lijit.com
1 KB
3 3lift.com
tlx.3lift.com
eb2.3lift.com
619 B
2 bidswitch.net
x.bidswitch.net
816 B
2 spotxchange.com
sync.search.spotxchange.com
1 KB
2 serverbid.com
e.serverbid.com
sync.serverbid.com
267 B
2 servenobid.com
ads.servenobid.com
public.servenobid.com
461 B
2 casalemedia.com
as-sec.casalemedia.com
2 KB
2 google.de
adservice.google.de
www.google.de
1 KB
2 linkedin.com
www.linkedin.com
2 KB
2 t.co
t.co
852 B
1 dotomi.com
aol-match.dotomi.com
104 B
1 adform.net
c1.adform.net
188 B
1 digitaloceanspaces.com
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
1 yahoo.com
pr-bh.ybp.yahoo.com
839 B
1 indexww.com
js-sec.indexww.com Failed
1 reddit.com
www.reddit.com
1 KB
1 facebook.com
graph.facebook.com
522 B
1 twitter.com
analytics.twitter.com
652 B
1 loopme.me
csync.loopme.me
224 B
1 quantcount.com
rules.quantcount.com
354 B
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 googletagmanager.com
www.googletagmanager.com
43 KB
1 a-mo.net
prebid.a-mo.net
359 B
1 wp.com
i1.wp.com
65 B
1 gravatar.com
secure.gravatar.com
385 B
1 kasperskycontenthub.com
kasperskycontenthub.com
398 B
1 googletagservices.com
www.googletagservices.com
17 KB
1 lnkd.in
lnkd.in
526 B
0 everesttech.net Failed
sync-tm.everesttech.net Failed
263 48
Domain Requested by
24 tpc.googlesyndication.com tagan.adlightning.com
threatpost.com
cdn.ampproject.org
23 live.sekindo.com threatpost.com
live.sekindo.com
19 video.sekindo.com threatpost.com
live.sekindo.com
18 threatpost.com t.co
threatpost.com
17 cdn.ampproject.org threatpost.com
15 adserver-us.adtech.advertising.com 10 redirects threatpost.com
12 www.google.com 4 redirects threatpost.com
tagan.adlightning.com
12 media.threatpost.com threatpost.com
11 tagan.adlightning.com threatpost.com
tagan.adlightning.com
8 assets.threatpost.com threatpost.com
7 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
threatpost.com
6 fonts.googleapis.com live.sekindo.com
threatpost.com
5 pagead2.googlesyndication.com securepubads.g.doubleclick.net
5 ads.adaptv.advertising.com live.sekindo.com
5 fonts.gstatic.com live.sekindo.com
threatpost.com
5 ads.pubmatic.com live.sekindo.com
qd.admetricspro.com
5 hbopenbid.pubmatic.com qd.admetricspro.com
live.sekindo.com
5 c.amazon-adsystem.com t.co
c.amazon-adsystem.com
live.sekindo.com
5 qd.admetricspro.com threatpost.com
4 u.openx.net 3 redirects live.sekindo.com
4 fastlane.rubiconproject.com qd.admetricspro.com
4 ib.adnxs.com qd.admetricspro.com
live.sekindo.com
3 pixel.advertising.com threatpost.com
3 match.adsrvr.org 2 redirects
3 googleads.g.doubleclick.net threatpost.com
3 www.google-analytics.com 1 redirects www.googletagmanager.com
threatpost.com
3 ap.lijit.com 1 redirects qd.admetricspro.com
3 teachingaids-d.openx.net qd.admetricspro.com
live.sekindo.com
2 eb2.3lift.com 1 redirects qd.admetricspro.com
2 prebid-server.rubiconproject.com live.sekindo.com
2 ad.doubleclick.net 1 redirects threatpost.com
2 pixel.quantserve.com 1 redirects threatpost.com
2 x.bidswitch.net 1 redirects threatpost.com
2 sync.search.spotxchange.com 2 redirects
2 www.gstatic.com www.google.com
2 as-sec.casalemedia.com qd.admetricspro.com
live.sekindo.com
2 www.linkedin.com 1 redirects threatpost.com
2 t.co threatpost.com
1 aol-match.dotomi.com
1 c1.adform.net
1 public.servenobid.com qd.admetricspro.com
1 serverbid-sync.nyc3.cdn.digitaloceanspaces.com qd.admetricspro.com
1 sync.serverbid.com 1 redirects
1 eu-u.openx.net qd.admetricspro.com
1 pr-bh.ybp.yahoo.com threatpost.com
1 js-sec.indexww.com live.sekindo.com
qd.admetricspro.com
1 acdn.adnxs.com live.sekindo.com
qd.admetricspro.com
1 eus.rubiconproject.com live.sekindo.com
qd.admetricspro.com
1 www.reddit.com threatpost.com
1 graph.facebook.com threatpost.com
1 analytics.twitter.com tagan.adlightning.com
1 8b675fca0d72ef4d503d0e09691ad717.safeframe.googlesyndication.com tagan.adlightning.com
1 csync.loopme.me 1 redirects
1 rules.quantcount.com secure.quantserve.com
1 www.google.de threatpost.com
1 stats.g.doubleclick.net 1 redirects
1 static.ads-twitter.com www.googletagmanager.com
1 secure.quantserve.com www.googletagmanager.com
1 www.googletagmanager.com threatpost.com
1 prebid.a-mo.net qd.admetricspro.com
1 tlx.3lift.com qd.admetricspro.com
1 e.serverbid.com qd.admetricspro.com
1 ads.servenobid.com qd.admetricspro.com
1 adservice.google.de tagan.adlightning.com
1 i1.wp.com threatpost.com
1 secure.gravatar.com 1 redirects
1 kasperskycontenthub.com threatpost.com
1 www.googletagservices.com threatpost.com
1 lnkd.in 1 redirects
0 sync-tm.everesttech.net Failed threatpost.com
0 cm.g.doubleclick.net Failed threatpost.com
263 71
Subject Issuer Validity Valid
t.co
DigiCert SHA2 High Assurance Server CA
2020-03-05 -
2021-03-02
a year crt.sh
threatpost.com
DigiCert SHA2 Secure Server CA
2020-06-10 -
2021-06-15
a year crt.sh
*.adlightning.com
Amazon
2020-07-22 -
2021-08-22
a year crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-02-04 -
2020-10-09
8 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
assets.threatpost.com
Amazon
2020-03-04 -
2021-04-04
a year crt.sh
kasperskycontenthub.com
DigiCert SHA2 Secure Server CA
2020-06-01 -
2021-06-09
a year crt.sh
media.threatpost.com
Amazon
2020-03-04 -
2021-04-04
a year crt.sh
*.wp.com
Sectigo RSA Domain Validation Secure Server CA
2020-04-02 -
2022-07-05
2 years crt.sh
www.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
www.sekindo.com
Go Daddy Secure Certificate Authority - G2
2020-05-27 -
2022-06-18
2 years crt.sh
*.google.de
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2020-03-02 -
2021-04-01
a year crt.sh
*.servenobid.com
Amazon
2020-03-12 -
2021-04-12
a year crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
*.pubmatic.com
Sectigo RSA Organization Validation Secure Server CA
2019-02-22 -
2021-02-21
2 years crt.sh
*.adtech.advertising.com
DigiCert SHA2 Secure Server CA
2020-04-16 -
2022-04-21
2 years crt.sh
*.openx.net
GeoTrust RSA CA 2018
2020-06-18 -
2021-08-17
a year crt.sh
e.serverbid.com
Let's Encrypt Authority X3
2020-06-22 -
2020-09-20
3 months crt.sh
*.3lift.com
Amazon
2020-07-04 -
2021-08-05
a year crt.sh
*.lijit.com
Go Daddy Secure Certificate Authority - G2
2020-03-11 -
2021-05-10
a year crt.sh
*.a-mo.net
Amazon
2019-09-06 -
2020-10-06
a year crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2020-06-24 -
2021-02-17
8 months crt.sh
*.google-analytics.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.gstatic.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2019-10-04 -
2020-10-07
a year crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2019-08-14 -
2020-08-18
a year crt.sh
www.google.de
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
upload.video.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.bidswitch.net
Sectigo RSA Domain Validation Secure Server CA
2020-04-23 -
2022-05-04
2 years crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.v.ssp.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-03-01 -
2020-08-28
6 months crt.sh
*.twitter.com
DigiCert SHA2 High Assurance Server CA
2020-03-05 -
2021-03-02
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-07-21 -
2020-10-12
3 months crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2020-04-10 -
2020-10-10
6 months crt.sh
*.reddit.com
DigiCert SHA2 Secure Server CA
2020-04-06 -
2020-10-03
6 months crt.sh
misc-sni.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.doubleclick.net
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.ybp.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-06-02 -
2020-11-29
6 months crt.sh
pixel.advertising.com
DigiCert SHA2 High Assurance Server CA
2020-03-11 -
2020-09-07
6 months crt.sh
*.nyc3.cdn.digitaloceanspaces.com
DigiCert SHA2 Secure Server CA
2020-03-11 -
2021-04-14
a year crt.sh
cdn.adnxs.com
GeoTrust RSA CA 2018
2020-01-02 -
2021-04-02
a year crt.sh
track.adform.net
DigiCert SHA2 Secure Server CA
2019-09-16 -
2021-09-20
2 years crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
*.dotomi.com
GlobalSign RSA OV SSL CA 2018
2019-06-19 -
2021-08-31
2 years crt.sh

This page contains 32 frames:

Primary Page: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Frame ID: 15094C68A8CD28462F72A31F028FE8BF
Requests: 104 HTTP requests in this frame

Frame: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595683880&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Frame ID: 642B35BF404736795AF2234A2547299B
Requests: 45 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Roboto&display=swap
Frame ID: 2D9216AC2D4A74C4EA932185B590AD0D
Requests: 5 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Roboto&display=swap
Frame ID: 27FEFEE1C4B0467D082D8D884D7DEAFD
Requests: 19 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/user_sync.html?p=159196&userIdMacro=PM_UID&gdpr=1&gdpr_consent=&predirect=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D91%26advUuid%3DPM_UID%26gdpr%3D1%26gdpr_consent%3D
Frame ID: 2541084285CBA14DB8F74B3F7646F28D
Requests: 1 HTTP requests in this frame

Frame: https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=94&advUuid=20a0e934-ce7b-11ea-ad4b-182a6e991106
Frame ID: 0F1BD8675C55CC4F0FA393DAE31E40F9
Requests: 1 HTTP requests in this frame

Frame: https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=98&advUuid=fffc3dbc-183a-4f8c-a6d6-cecf9f579e48
Frame ID: 6F7089A78D0A46631A7C281C67ADD0EB
Requests: 1 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&theme=standard&size=normal&cb=b148s414nukk
Frame ID: EC448B62472422D4D327DAFFBFC1D3DF
Requests: 1 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&theme=light&size=normal&cb=ckj578t8cw3q
Frame ID: ED4C337B206D19CF59CE4FC362825444
Requests: 1 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Frame ID: 03ABF70ABABC8747809678D138BC0AF7
Requests: 15 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/bframe?hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=qzq9yawqi2uq
Frame ID: D1638955425E09501523A95A993DDD77
Requests: 1 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Frame ID: 28051E116DF75654E75F83F2EE3C4C28
Requests: 24 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Frame ID: 7A3B83C7E23C5350E1E9060072A6875E
Requests: 22 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Frame ID: 6F709D9C459A031B3A58C62687056AA5
Requests: 11 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/bframe?hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&cb=ya9al3gyzv6j
Frame ID: A1CD1D3E61B5DAAD98CFBA442EFDDD3C
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/210/runner.html
Frame ID: 72941469D4461250C98917C11C76520A
Requests: 1 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/showad.js
Frame ID: 59B9A5B8CC17FB7D4DDC8B51874E619D
Requests: 1 HTTP requests in this frame

Frame: https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
Frame ID: 109A8BAC4D017F2D89E5E3C918B33A65
Requests: 1 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/showad.js
Frame ID: 46F59952CF3F8BBBDF40278BED5D2779
Requests: 1 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/showad.js
Frame ID: C4ACC7C1AC840447520E4B915034C35C
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?gdpr=1&gdpr_consent=
Frame ID: EE5E08F234CBFCD3816C36A4BAB5192B
Requests: 1 HTTP requests in this frame

Frame: https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Frame ID: CB64D141E649D88DAC04612A8412950E
Requests: 1 HTTP requests in this frame

Frame: https://js-sec.indexww.com/um/ixmatch.html
Frame ID: 9760117D8A44A0163D7DB015CCA52938
Requests: 1 HTTP requests in this frame

Frame: https://js-sec.indexww.com/um/ixmatch.html
Frame ID: 85F56C5D69D160656207349089D6719E
Requests: 1 HTTP requests in this frame

Frame: https://eu-u.openx.net/w/1.0/pd?plm=6&ph=e1b1f5e1-3c2c-4287-9806-317cfbf3bd12&gdpr=1
Frame ID: A2188B17A64034447DBF1818052CCCFF
Requests: 1 HTTP requests in this frame

Frame: https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Frame ID: 5C1D0EFA35FB1F22E9D053CBCB849C30
Requests: 1 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/showad.js
Frame ID: 0582193512C4EE1DB84732BA6A5A9D9C
Requests: 1 HTTP requests in this frame

Frame: https://ap.lijit.com/beacon?informer=13394437&dnr=1
Frame ID: 6520CB492E010F25BBC1436AB4CBD7BE
Requests: 1 HTTP requests in this frame

Frame: https://eb2.3lift.com/sync?&ld=1
Frame ID: 4CA0AF3458C9D095A585D3D931DF4BDD
Requests: 1 HTTP requests in this frame

Frame: https://public.servenobid.com/sync.html
Frame ID: ED6D1E0D9EB8924E9B0D55BA9DB6DB1C
Requests: 1 HTTP requests in this frame

Frame: https://acdn.adnxs.com/dmp/async_usersync.html
Frame ID: 6BEDA007B135EEF1D2473EDEFD1A7800
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html
Frame ID: E80EAD4EF9BD53817BB92EC7A9237991
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://t.co/X0ukaAEsUs Page URL
  2. https://lnkd.in/gvYmtmc HTTP 301
    https://www.linkedin.com/slink?code=gvYmtmc HTTP 301
    https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/ Page URL

Page Statistics

263
Requests

97 %
HTTPS

35 %
IPv6

48
Domains

71
Subdomains

60
IPs

9
Countries

5046 kB
Transfer

9398 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://t.co/X0ukaAEsUs Page URL
  2. https://lnkd.in/gvYmtmc HTTP 301
    https://www.linkedin.com/slink?code=gvYmtmc HTTP 301
    https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 14
  • https://secure.gravatar.com/avatar/fab896982b5c9974407bc14bd8b50b84?s=60&d=https%3A%2F%2Fkasperskycontenthub.com%2Fwp-content%2Fthemes%2Fkaspersky-root%2Fassets%2Fimages%2Favatar_default.jpg&r=g HTTP 302
  • https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
Request Chain 43
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=57546500f489e26;misc=1595683880438; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=57546500f489e26;misc=1595683880438 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1A204c5f8a-ce7b-11ea-8160-1245d65848a4;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=57546500f489e26;misc=1595683880438
Request Chain 44
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=5819fa03604562c;misc=1595683880438; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=5819fa03604562c;misc=1595683880438 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1A204c2dc6-ce7b-11ea-ab80-12bf237d14d4;cfp=1;rndc=1595683879;v=2;cmd=bid;cors=yes;alias=5819fa03604562c;misc=1595683880438
Request Chain 45
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=5959dcf22887aee;misc=1595683880439; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1595683879;v=2;cmd=bid;cors=yes;alias=5959dcf22887aee;misc=1595683880439 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1A207be5f2-ce7b-11ea-9e3f-126272b4dea0;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=5959dcf22887aee;misc=1595683880439
Request Chain 46
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=607448ba68dcd64;misc=1595683880439; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1595683879;v=2;cmd=bid;cors=yes;alias=607448ba68dcd64;misc=1595683880439 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1A204e5736-ce7b-11ea-94b4-1245d65848a4;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=607448ba68dcd64;misc=1595683880439
Request Chain 47
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=61043a50535c1d8;misc=1595683880439; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=61043a50535c1d8;misc=1595683880439 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1A204c382a-ce7b-11ea-9162-1204ea82ed4e;cfp=1;rndc=1595683879;v=2;cmd=bid;cors=yes;alias=61043a50535c1d8;misc=1595683880439
Request Chain 85
  • https://www.google-analytics.com/r/collect?v=1&_v=j83&aip=1&a=1673332111&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&dr=https%3A%2F%2Ft.co%2FX0ukaAEsUs&ul=en-us&de=UTF-8&dt=Office%20365%20Users%20Targeted%20By%20%27Coronavirus%20Employee%20Training%27%20Phish%20%7C%20Threatpost&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=YEBAAEAB~&jid=1165477124&gjid=686388252&cid=17976605.1595683881&tid=UA-35676203-21&_gid=716639561.1595683881&_r=1&gtm=2wg7f0PM29HLF&z=406532500 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-35676203-21&cid=17976605.1595683881&jid=1165477124&_gid=716639561.1595683881&gjid=686388252&_v=j83&z=406532500 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=17976605.1595683881&jid=1165477124&_v=j83&z=406532500 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=17976605.1595683881&jid=1165477124&_v=j83&z=406532500&slf_rd=1&random=1447906220
Request Chain 94
  • https://sync.search.spotxchange.com/partner?adv_id=8805&redir=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D94%26advUuid%3D%24SPOTX_USER_ID HTTP 302
  • https://sync.search.spotxchange.com/partner?adv_id=8805&redir=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D94%26advUuid%3D%24SPOTX_USER_ID&__user_check__=1&sync_id=20a0e965-ce7b-11ea-ad4b-182a6e991106 HTTP 302
  • https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=94&advUuid=20a0e934-ce7b-11ea-ad4b-182a6e991106
Request Chain 95
  • https://u.openx.net/w/1.0/cm?id=476b50d3-5ccf-49a1-89b8-1ddf8ea18042&r=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D98%26advUuid%3D HTTP 302
  • https://u.openx.net/w/1.0/cm?cc=1&id=476b50d3-5ccf-49a1-89b8-1ddf8ea18042&r=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D98%26advUuid%3D HTTP 302
  • https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=98&advUuid=fffc3dbc-183a-4f8c-a6d6-cecf9f579e48
Request Chain 107
  • https://x.bidswitch.net/sync?ssp=sekindo&user_id=5f1c3428aed92&custom_data=5f1c3428aed92&gdpr=1&gdpr_consent= HTTP 302
  • https://x.bidswitch.net/ul_cb/sync?ssp=sekindo&user_id=5f1c3428aed92&custom_data=5f1c3428aed92&gdpr=1&gdpr_consent=
Request Chain 108
  • https://csync.loopme.me/?redirect=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D93%26advUuid%3D%7Bdevice_id%7D HTTP 302
  • https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=93&advUuid=b74fd560-895e-413a-9856-c53b91bc21c3
Request Chain 157
  • https://ad.doubleclick.net/ddm/trackimp/N790339.3167285ADWORDSGDN/B23768030.267046029;dc_trk_aid=461813821;dc_trk_cid=106332843;ord=351815005;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua= HTTP 302
  • https://ad.doubleclick.net/ddm/trackimp/N790339.3167285ADWORDSGDN/B23768030.267046029;dc_pre=CK-t5NfB6OoCFfbQuwgdfoUASg;dc_trk_aid=461813821;dc_trk_cid=106332843;ord=351815005;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=
Request Chain 201
  • https://www.google.com/pagead/drt/ui HTTP 302
  • https://googleads.g.doubleclick.net/pagead/drt/si
Request Chain 202
  • https://www.google.com/pagead/drt/ui HTTP 302
  • https://googleads.g.doubleclick.net/pagead/drt/si
Request Chain 203
  • https://www.google.com/pagead/drt/ui HTTP 302
  • https://googleads.g.doubleclick.net/pagead/drt/si
Request Chain 220
  • https://u.openx.net/w/1.0/pd?gdpr=1&gdpr_consent= HTTP 302
  • https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
Request Chain 228
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=adaptv&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=adaptv&ttd_tpi=1 HTTP 302
  • https://pixel.advertising.com/ups/55953/sync?uid=01287a56-cb62-4017-99e9-7069f0dc3660&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=01287a56-cb62-4017-99e9-7069f0dc3660
Request Chain 241
  • https://sync.serverbid.com/ss/2000891.html HTTP 302
  • https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Request Chain 243
  • https://ap.lijit.com/beacon?informer=13394437 HTTP 302
  • https://ap.lijit.com/beacon?informer=13394437&dnr=1
Request Chain 244
  • https://eb2.3lift.com/sync HTTP 302
  • https://eb2.3lift.com/sync?&ld=1
Request Chain 249
  • https://pixel.quantserve.com/pixel/p-NcBg8UA4xqUFp.gif?idmatch=0&gdpr=1&gdpr_consent= HTTP 302
  • https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=fJbnr3rE5K5kwrepf8T7_nDB4_xkx--qf5aGA7PU

263 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
X0ukaAEsUs
t.co/
224 B
484 B
Document
General
Full URL
https://t.co/X0ukaAEsUs
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.69 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
f7404d5c824268c4ddb739fde626e3d11cc0721627b6e3688af1b99106eb9017
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Xss-Protection 0

Request headers

:method
GET
:authority
t.co
:scheme
https
:path
/X0ukaAEsUs
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
cache-control
private,max-age=300
content-encoding
gzip
content-length
174
content-type
text/html; charset=utf-8
date
Sat, 25 Jul 2020 13:31:18 GMT
expires
Sat, 25 Jul 2020 13:36:18 GMT
server
tsa_o
set-cookie
muc=729499db-6adc-4231-a089-0f2d2239890b; Max-Age=63072000; Expires=Mon, 25 Jul 2022 13:31:18 GMT; Domain=t.co; Secure; SameSite=None
strict-transport-security
max-age=0
vary
Origin
x-connection-hash
e3f59fbd1161e9f928a362da3121b1d4
x-response-time
117
x-xss-protection
0
Primary Request /
threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Redirect Chain
  • https://lnkd.in/gvYmtmc
  • https://www.linkedin.com/slink?code=gvYmtmc
  • https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
78 KB
20 KB
Document
General
Full URL
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Requested by
Host: t.co
URL: https://t.co/X0ukaAEsUs
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
d7efee496bcc0e1d7a110829e1947d2ce0ea08ae444ce1db65c4dee915dfc8bf
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
threatpost.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
document
Referer
https://t.co/X0ukaAEsUs
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://t.co/X0ukaAEsUs

Response headers

Server
nginx
Date
Sat, 25 Jul 2020 13:31:19 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
close
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Link
<https://threatpost.com/wp-json/>; rel="https://api.w.org/" <https://threatpost.com/?p=156899>; rel=shortlink
X-Frame-Options
SAMEORIGIN
X-Debug-Auth
off
X-Request-Host
threatpost.com
x-cache-hit
HIT
Content-Encoding
gzip

Redirect headers

status
301
cache-control
no-cache, no-store
pragma
no-cache
content-encoding
gzip
expires
Thu, 01 Jan 1970 00:00:00 GMT
location
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
vary
Accept-Encoding
set-cookie
bcookie="v=2&387d359f-52d9-455f-85ff-d7b848fd016b"; domain=.linkedin.com; Path=/; Secure; Expires=Tue, 26-Jul-2022 01:08:51 GMT; SameSite=None bscookie="v=1&20200725133119f56d9d36-670c-476a-8309-a95d3fe62c5cAQFjMODmJZ0BDa379-zVGTad75kCV8D2"; domain=.www.linkedin.com; Path=/; Secure; Expires=Tue, 26-Jul-2022 01:08:51 GMT; HttpOnly; SameSite=None lissc=1; domain=.linkedin.com; Path=/; Secure; Expires=Sun, 25-Jul-2021 13:31:19 GMT; SameSite=None lidc="b=VGST06:g=1851:u=1:i=1595683879:t=1595770279:s=AQEd-E9REVKQMUmTxC7fHeXYunHo5gN_"; Expires=Sun, 26 Jul 2020 13:31:19 GMT; domain=.linkedin.com; Path=/; SameSite=None; Secure
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
x-xss-protection
1; mode=block
content-security-policy
default-src *; connect-src 'self' https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob: https://accounts.google.com/gsi/status https://linkedin.sc.omtrdc.net/b/ss/ static.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com media.licdn.com media-exp1.licdn.com media-exp2.licdn.com media-exp3.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/insight.min.js platform.linkedin.com platform-akam.linkedin.com platform-ecst.linkedin.com platform-azur.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
x-frame-options
sameorigin
x-content-type-options
nosniff
strict-transport-security
max-age=2592000
x-li-fabric
prod-lva1
x-li-pop
afd-prod-lva1
x-li-proto
http/2
x-li-uuid
dSyVrwgCJRZgWUti/ioAAA==
x-msedge-ref
Ref A: B857DE7CD6D64FC0A8CED3C95F2F4BAD Ref B: FRAEDGE0819 Ref C: 2020-07-25T13:31:19Z
date
Sat, 25 Jul 2020 13:31:18 GMT
main.css
threatpost.com/wp-content/themes/threatpost-2018/assets/css/
253 KB
39 KB
Stylesheet
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592971
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
41f3222c29889fb48f5dca1d481858e5339a759655510c256ef4edf56c80f7f5

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:20 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Jul 2020 12:16:12 GMT
Server
nginx
ETag
W/"5f1ad10c-3f2b8"
Transfer-Encoding
chunked
Content-Type
text/css
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 13:31:20 GMT
op.js
tagan.adlightning.com/math-aids-threatpost/
33 KB
12 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/op.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.71 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
d933af0973508b716620c3a327cffb27b092058c43836d000f1472a28cadc026

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-amz-version-id
VoEFgIyKXtLEMn0Jn.EPO8QAciA7W__k
content-encoding
gzip
etag
"5e82040b13de879a8ac1d3f79edfd5d5"
age
1596
x-cache
Hit from cloudfront
status
200
content-length
12262
x-amz-meta-git_commit
cc9018f
last-modified
Fri, 24 Jul 2020 17:21:09 GMT
server
AmazonS3
date
Sat, 25 Jul 2020 13:04:44 GMT
content-type
application/javascript
via
1.1 6080b2713e502211e152f21f5c59c5a7.cloudfront.net (CloudFront)
cache-control
max-age=3600
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
x-amz-cf-id
XQULRLPamB0yO1iaF-xEi6Fy0fzQ4HQl8T5gGh8I1NGnfZ0isS5Q2Q==
ros-layout.js
qd.admetricspro.com/js/threatpost/
20 KB
3 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/ros-layout.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e6::ac40:c21a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cace34903480e5ed89780d9bb1705ef84720ca19a45996d80240c6a677599b09

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:19 GMT
content-encoding
br
cf-cache-status
HIT
age
374
status
200
cf-request-id
0427c4d3f200001766500b0200000001
last-modified
Fri, 24 Jul 2020 10:54:23 GMT
server
cloudflare
etag
W/"5126-5ab2dcbbc9b3c-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5b863d9988ad1766-FRA
expires
Sat, 25 Jul 2020 13:32:49 GMT
gpt.js
www.googletagservices.com/tag/js/
48 KB
17 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c5e5742593fb85b25251acdb96a2f0d31ee17b2eb8b6b8c737714ea1efc56a11
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"581 / 997 of 1000 / last-modified: 1595628830"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
16533
x-xss-protection
0
expires
Sat, 25 Jul 2020 13:31:19 GMT
cmp.js
qd.admetricspro.com/js/threatpost/
218 KB
61 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/cmp.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e6::ac40:c21a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
aaf45a172ec90c76bcecd61c68d998c2256fe9b1700371e80011d1161c5ab629

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:19 GMT
content-encoding
br
cf-cache-status
HIT
age
317
status
200
cf-request-id
0427c4d3f300001766500b1200000001
last-modified
Fri, 27 Sep 2019 21:07:46 GMT
server
cloudflare
etag
W/"367ba-5938f47194c80-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5b863d9988af1766-FRA
expires
Sat, 25 Jul 2020 13:21:26 GMT
targeting.js
qd.admetricspro.com/js/threatpost/
275 B
555 B
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/targeting.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e6::ac40:c21a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6cdc57f82f4b0d09e5b4e584ca4736cd3871f20563d4ce25120b057d8ffb4eb2

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:19 GMT
content-encoding
br
cf-cache-status
HIT
age
317
status
200
cf-request-id
0427c4d3f300001766500b2200000001
last-modified
Sat, 08 Feb 2020 20:49:18 GMT
server
cloudflare
etag
W/"113-59e16a3cfb471-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5b863d9988b01766-FRA
expires
Sat, 25 Jul 2020 13:31:28 GMT
prebid.js
qd.admetricspro.com/js/threatpost/
384 KB
108 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/prebid.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e6::ac40:c21a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ed1bd9b5fc31e624bb0b3ca2c510546c8a1bb6b41923e06768a735c75a9c704c

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:19 GMT
content-encoding
br
cf-cache-status
HIT
age
317
status
200
cf-request-id
0427c4d3f300001766500b3200000001
last-modified
Wed, 22 Jul 2020 04:38:40 GMT
server
cloudflare
etag
W/"601dd-5ab005060aaae-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5b863d9988b21766-FRA
expires
Sat, 25 Jul 2020 13:31:28 GMT
engine.js
qd.admetricspro.com/js/threatpost/
14 KB
10 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/engine.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:e6::ac40:c21a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
8d68191f5a8b81e2ce16e71760665eeed8a03cfc82303a04008700e5fe21d347

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:19 GMT
content-encoding
br
cf-cache-status
HIT
age
317
status
200
cf-request-id
0427c4d3f300001766500b4200000001
last-modified
Fri, 17 Jul 2020 16:50:44 GMT
server
cloudflare
etag
W/"38f2-5aaa5f54002ae-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=14400
cf-ray
5b863d9988b31766-FRA
expires
Sat, 25 Jul 2020 13:30:53 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
89 KB
18 KB
Stylesheet
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=d5a1318b
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:aa00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
15e9840f31982980328598c38e5c60434072901f2c902713ef9c4d4900e05307
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
gzip
x-amz-cf-pop
FRA6-C1
x-cache
Miss from cloudfront
status
200
content-length
18049
x-cache-hit
HIT
last-modified
Fri, 24 Jul 2020 12:16:13 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 c275031486c6f7b744b8d30847e98b14.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
p9Natp2kmOItpA3SyYSC-y_rkRRweRMxDbxnLmlrbwvyem0ZpKEGGA==
expires
Sat, 25 Jul 2020 16:35:49 GMT
jquery.js
threatpost.com/wp-includes/js/jquery/
95 KB
37 KB
Script
General
Full URL
https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:20 GMT
Content-Encoding
gzip
Last-Modified
Wed, 10 Jun 2020 22:05:38 GMT
Server
nginx
ETag
W/"5ee15932-17a69"
Transfer-Encoding
chunked
Content-Type
application/x-javascript
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 13:31:20 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
177 KB
55 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/kaspersky-cookies-notification/scripts/alert_text.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert.js,wp-content/plugins/honeypot-comments/public/assets/js/public.js,wp-content/plugins/kspr_twitter_pullquote/js/kaspersky-twitter-pullquote.js,wp-content/themes/threatpost-2018/assets/js/main.js,wp-content/themes/threatpost-2018/assets/js/loadmore.js,wp-content/plugins/kaspersky-social-sharing/assets/js/social-share.js&ver=d5a1318b
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:aa00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
b0209d39595432d762f6ba2a81dc0bffa6a6e1ed9021ba24ffa06c3c7e4bcb02
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
gzip
x-amz-cf-pop
FRA6-C1
x-cache
Miss from cloudfront
status
200
content-length
56256
x-cache-hit
HIT
last-modified
Fri, 24 Jul 2020 12:16:11 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 c275031486c6f7b744b8d30847e98b14.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
Ds8U_vWO8ffbRxHpUnqHdmxXj9Lkz1w-dCrxsh2fC5HQHoz45sPnDw==
expires
Sat, 25 Jul 2020 16:35:49 GMT
/
kasperskycontenthub.com/
0
398 B
Script
General
Full URL
https://kasperskycontenthub.com/?dm=ed1f9e435dc885292eab65620c51f3fb&action=load&blogid=103&siteid=1&t=1496517651&back=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:20 GMT
X-Content-Type-Options
nosniff
Server
nginx
X-Frame-Options
SAMEORIGIN
Connection
close
Content-Type
application/javascript
x-cache-hit
HIT
Transfer-Encoding
chunked
X-Debug-Auth
off
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Request-Host
kasperskycontenthub.com
X-XSS-Protection
1; mode=block
new-normal-phishing-scam.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/06/25085723/
132 KB
133 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/06/25085723/new-normal-phishing-scam.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:6c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f3a5ad8f1154a9cc3879f0e4aa7509b274340d166b1480e297d5d8acc6df12c1

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 25 Jun 2020 13:09:53 GMT
via
1.1 79503619d600dbc1c9e04a650d3d7f3f.cloudfront.net (CloudFront), 1.1 8d31bbd9d6638cdacab37047b8045da4.cloudfront.net (CloudFront)
last-modified
Thu, 25 Jun 2020 12:57:25 GMT
server
AmazonS3
age
2593288
etag
"c218118fb64ffe75aadcb6c847da15ba"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA53-C1
accept-ranges
bytes
content-length
135464
x-amz-cf-id
NqXCuJew8u96zQMGfQCIir4M3qv1JvXJGo_ZDbQtyeeffkAyCpGvFA==
expires
Fri, 25 Jun 2021 12:57:23 GMT
avatar_default.jpg
i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/
Redirect Chain
  • https://secure.gravatar.com/avatar/fab896982b5c9974407bc14bd8b50b84?s=60&d=https%3A%2F%2Fkasperskycontenthub.com%2Fwp-content%2Fthemes%2Fkaspersky-root%2Fassets%2Fimages%2Favatar_default.jpg&r=g
  • https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
65 B
65 B
Image
General
Full URL
https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.2 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
3a90c56bbc2ea3fae7e089cc529bc02869c5035ee31c3111d829b9ae974cf42d

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
404
x-nc
HIT ams 8
date
Sat, 25 Jul 2020 13:31:20 GMT
server
nginx
content-type
text/html; charset=utf-8

Redirect headers

x-nc
HIT fra 1
date
Sat, 25 Jul 2020 13:31:20 GMT
last-modified
Wed, 11 Jan 1984 08:00:00 GMT
server
nginx
status
302
content-type
text/html; charset=utf-8
location
https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
cache-control
max-age=300
link
<https://www.gravatar.com/avatar/fab896982b5c9974407bc14bd8b50b84?s=60&d=https%3A%2F%2Fkasperskycontenthub.com%2Fwp-content%2Fthemes%2Fkaspersky-root%2Fassets%2Fimages%2Favatar_default.jpg&r=g>; rel="canonical"
content-length
0
expires
Sat, 25 Jul 2020 13:36:20 GMT
subscribe2.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/
8 KB
9 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/subscribe2.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:6c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
aa64fa30a3263fa3105736228a6feaaa4f7d32d8ef96b12e56f6fb95511b66a7

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 15 Feb 2020 06:22:32 GMT
via
1.1 7ce1191b390045e05b9cc74f7514b77b.cloudfront.net (CloudFront), 1.1 8d31bbd9d6638cdacab37047b8045da4.cloudfront.net (CloudFront)
last-modified
Tue, 19 Feb 2019 20:14:58 GMT
server
AmazonS3
age
13936129
etag
"5ba45563f793f39ef6baf02645651654"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA6-C1, FRA53-C1
accept-ranges
bytes
content-length
8281
x-amz-cf-id
p94lk8t1-HCu_juEOQBmuV_QN2h6nycAqRS2k5RqJsJ899GJEBZ-XQ==
expires
Wed, 19 Feb 2020 20:14:57 GMT
unnamed-300x126.png
media.threatpost.com/wp-content/uploads/sites/103/2020/06/25090132/
25 KB
26 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/06/25090132/unnamed-300x126.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:6c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
9ea0032753917c317f05190764fa9b873dfc18548d6901c780bc3114ebb88f5b

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 25 Jun 2020 13:10:31 GMT
via
1.1 882f747f39885162595630c95dd0012d.cloudfront.net (CloudFront), 1.1 8d31bbd9d6638cdacab37047b8045da4.cloudfront.net (CloudFront)
last-modified
Thu, 25 Jun 2020 13:01:34 GMT
server
AmazonS3
age
2593250
etag
"96c9311fa4e4bfb8d542db06be59f03e"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C2, FRA53-C1
accept-ranges
bytes
content-length
25636
x-amz-cf-id
bfueHkFnYOpUEFK48lzUyCKf5vD9uXSRnCcbC4Plj0YmNfocEYlxEw==
expires
Fri, 25 Jun 2021 13:01:32 GMT
coronavirus-phishing-300x149.png
media.threatpost.com/wp-content/uploads/sites/103/2020/06/25083831/
23 KB
24 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/06/25083831/coronavirus-phishing-300x149.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:6c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4bb83c93e820a6b9fc3444613e14c6430190b2cf7831f424409bedd880bf46a1

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 20 Jul 2020 13:08:46 GMT
via
1.1 07318a09275049862b4535d73a930b7d.cloudfront.net (CloudFront), 1.1 8d31bbd9d6638cdacab37047b8045da4.cloudfront.net (CloudFront)
last-modified
Thu, 25 Jun 2020 12:38:32 GMT
server
AmazonS3
age
433355
etag
"9cacb8efcff5fc267313c0bd279e909c"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA53-C1
accept-ranges
bytes
content-length
23845
x-amz-cf-id
0BQRuB01jJ6n2sz9d2IeitW5UJiuTioeIj6Q-f8t5VQGWpclSUp5eg==
expires
Fri, 25 Jun 2021 12:38:31 GMT
Blurry-Photo-540x270.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/07/24085230/
17 KB
18 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/07/24085230/Blurry-Photo-540x270.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:6c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
7a7ceb7b48750a554d38ea389263a0957c4e68c8396d44a560d2f4fdf0abdee7

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 24 Jul 2020 12:54:49 GMT
via
1.1 73f3a23156999272233949c078c30859.cloudfront.net (CloudFront), 1.1 8d31bbd9d6638cdacab37047b8045da4.cloudfront.net (CloudFront)
last-modified
Fri, 24 Jul 2020 12:52:46 GMT
server
AmazonS3
age
88592
etag
"ceeae7bcb79c6a290f2437278353d51d"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1, FRA53-C1
accept-ranges
bytes
content-length
17546
x-amz-cf-id
lM1zBjaXeY3J4AXTzPtgjTNvobYG0000N0Y2DV_97Ywlfo4OgdN0dA==
expires
Sat, 24 Jul 2021 12:52:43 GMT
Malware-Generic-540x270.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/03/11092825/
42 KB
42 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/03/11092825/Malware-Generic-540x270.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:6c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
799bc904c343ab04dbb361ac369a74d045cda6488fd06f0f475ee41effe7ee40

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 23 Jun 2020 07:52:42 GMT
via
1.1 0176a7920fd558900dd5f893f79acb9e.cloudfront.net (CloudFront), 1.1 8d31bbd9d6638cdacab37047b8045da4.cloudfront.net (CloudFront)
last-modified
Wed, 11 Mar 2020 13:28:29 GMT
server
AmazonS3
age
2785119
etag
"4645a22426cc22cb37cb9bbf018608ee"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA53-C1
accept-ranges
bytes
content-length
42907
x-amz-cf-id
Cg_Vtiqlz57XFlQ88LemoX1fwyttdjn2hkuiXwUWmCWbVtjlW4Ae1w==
expires
Thu, 11 Mar 2021 13:28:28 GMT
COVID_virus_global_video-540x270.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/07/23115346/
52 KB
52 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/07/23115346/COVID_virus_global_video-540x270.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:6c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
509deaa4ad0d1ebde8f64eea80032043b2297ce86e428c92af2cbc547040339f

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 15:58:41 GMT
via
1.1 b541956a3e11a8d6bd72d74e925ca434.cloudfront.net (CloudFront), 1.1 8d31bbd9d6638cdacab37047b8045da4.cloudfront.net (CloudFront)
last-modified
Thu, 23 Jul 2020 15:53:51 GMT
server
AmazonS3
age
163960
etag
"fe65728e39dfa728abda729e0c93627e"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA53-C1
accept-ranges
bytes
content-length
52970
x-amz-cf-id
A_e2E-re8fX-woRUwbJXySMvIZQeG65bTykZf22Uf-cEklL2g7hASw==
expires
Fri, 23 Jul 2021 15:53:50 GMT
api.js
www.google.com/recaptcha/
674 B
882 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?hl=en
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
fa3d7a81033aa528fcb9e450d51011de199b00b03693595d186eb78191653fd4
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
cross-origin-resource-policy
cross-origin
content-security-policy
frame-ancestors 'self'
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
446
x-xss-protection
1; mode=block
expires
Sat, 25 Jul 2020 13:31:20 GMT
data-leak-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/10/21145020/
2 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/10/21145020/data-leak-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:6c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
7517792de8d4a1319afd85d8c3dcffe799ba5545129a650182e6c4b055302852

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 16 Jul 2020 20:27:10 GMT
via
1.1 216b2e0a8a27f8fca1b540a1c4ea6922.cloudfront.net (CloudFront), 1.1 8d31bbd9d6638cdacab37047b8045da4.cloudfront.net (CloudFront)
last-modified
Mon, 21 Oct 2019 18:50:23 GMT
server
AmazonS3
age
752651
etag
"12bb1aa91531788d81a1791bcbb631f9"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C2, FRA53-C1
accept-ranges
bytes
content-length
2106
x-amz-cf-id
37MXkVvyDh0qpp8_E7BECURaJTpvYlZwSzbEPf0tu9A4Xs4Egd2ydg==
expires
Tue, 20 Oct 2020 18:50:20 GMT
work-from-home-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/03/13163335/
2 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/03/13163335/work-from-home-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:6c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3435531b595fb1b2b529346e1df8c979a1fd727f56ea8c0d792316035440cac5

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 10 Jun 2020 20:00:09 GMT
via
1.1 b454a0b154ae18408006bc2a9abd88ec.cloudfront.net (CloudFront), 1.1 8d31bbd9d6638cdacab37047b8045da4.cloudfront.net (CloudFront)
last-modified
Fri, 13 Mar 2020 20:33:52 GMT
server
AmazonS3
age
3864671
etag
"fd4942a0704785b24b44d177f4a57d86"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA53-C1
accept-ranges
bytes
content-length
2098
x-amz-cf-id
x8pP8U4ioiVDLUR2-75Tt481uiNzosq0SLgvB8HEWi5RSr7FMHAdtQ==
expires
Sat, 13 Mar 2021 20:33:49 GMT
36c3-fake-emails-featured-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/01/31170549/
2 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/01/31170549/36c3-fake-emails-featured-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:6c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1f152c8879492dd153cf7a47ad195151e20491e60985d86f9ef7a7ddc85062f6

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 04 Jun 2020 17:25:36 GMT
via
1.1 5755f825ee6ab59b8a6349608c249e4e.cloudfront.net (CloudFront), 1.1 8d31bbd9d6638cdacab37047b8045da4.cloudfront.net (CloudFront)
last-modified
Fri, 31 Jan 2020 22:05:52 GMT
server
AmazonS3
age
4392346
etag
"62a0a00cafda215547f47f6b6f52bdce"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA53-C1
accept-ranges
bytes
content-length
1665
x-amz-cf-id
zZ28mC2RMUVlSOLIBXEwgAtU9POsZtKrsyNwPgHOBI2OsghePvDdqw==
expires
Sat, 30 Jan 2021 22:05:49 GMT
ai-safety-featured-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2018/06/08121133/
2 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2018/06/08121133/ai-safety-featured-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:6c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5d363c974cd81869ce3fd8d76a06f12b273be51cb358a9a85c21d157eedde824

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 21 May 2020 19:01:41 GMT
via
1.1 e3666efb6956ba7f03c75c3401b8c79e.cloudfront.net (CloudFront), 1.1 8d31bbd9d6638cdacab37047b8045da4.cloudfront.net (CloudFront)
last-modified
Tue, 03 Jul 2018 02:40:26 GMT
server
AmazonS3
age
5596180
etag
"29cb0a26bc7f2d80110ca80691f44ecd"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, FRA53-C1
accept-ranges
bytes
content-length
2089
x-amz-cf-id
mMOguZ8JbzKuxi4ovuotY_8agGwwGvSduWaSovEhV-SUwr7cmjnGww==
expires
Wed, 03 Jul 2019 02:40:23 GMT
microsoft-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/01/22095352/
2 KB
3 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/01/22095352/microsoft-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:6c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
bcaa21df70fd10c5a594ac5996411eb517750a210903adaa56dc097d5936dc9e

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 19 May 2020 20:38:28 GMT
via
1.1 8b5bc0831e6dab612582614c3009efa7.cloudfront.net (CloudFront), 1.1 8d31bbd9d6638cdacab37047b8045da4.cloudfront.net (CloudFront)
last-modified
Wed, 22 Jan 2020 14:53:54 GMT
server
AmazonS3
age
5763173
etag
"872d8d15e18da7498f683a1a4b3d2477"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1, FRA53-C1
accept-ranges
bytes
content-length
2145
x-amz-cf-id
OYYDebiWK0hr0LVscx5tGl92Q2Ubvkj8k-agAN8R-gZ2sNIbPE07qA==
expires
Thu, 21 Jan 2021 14:53:52 GMT
liveView.php
live.sekindo.com/live/
28 KB
8 KB
Script
General
Full URL
https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
fbdb402f49f26e675acf8eed356bdda95f14a70cb8efc21d4a7e6c2e083684da

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:20 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/javascript; charset=utf-8
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
2 KB
1 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/jquery.json.min.js&ver=d5a1318b
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:aa00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
172314ff74044b918766ed4763279b5e8798622087c0a2930f59c9d44662213d
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
gzip
x-amz-cf-pop
FRA6-C1
x-cache
Miss from cloudfront
status
200
content-length
926
x-cache-hit
HIT
last-modified
Fri, 24 Jul 2020 12:16:09 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 c275031486c6f7b744b8d30847e98b14.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
epXMWkPRzGFSKu4tOa85oWLgVFsyosvDQv84rDFFXhVd4XCD0j5asw==
expires
Sat, 25 Jul 2020 16:35:41 GMT
gravityforms.min.js
threatpost.com/wp-content/plugins/gravityforms/js/
34 KB
12 KB
Script
General
Full URL
https://threatpost.com/wp-content/plugins/gravityforms/js/gravityforms.min.js?ver=2.4.17.15
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
3097d0444becd9d089b52b7074072f19201525de874d0775012572fb375b7838

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:21 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Jul 2020 12:16:11 GMT
Server
nginx
ETag
W/"5f1ad10b-88c2"
Transfer-Encoding
chunked
Content-Type
application/x-javascript
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 13:31:21 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
7 KB
3 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/conditional_logic.min.js&ver=d5a1318b
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:aa00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
f75166e3f70100b65a6ce1d4128bc15286e92b19a546fa7709f739e9bcfe52c6
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
gzip
x-amz-cf-pop
FRA6-C1
x-cache
Miss from cloudfront
status
200
content-length
2685
x-cache-hit
HIT
last-modified
Fri, 24 Jul 2020 12:16:11 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 c275031486c6f7b744b8d30847e98b14.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
i3ep5T2AqdllB4VUqwIyBM3j2r6xCbZmsBAeuVC2TjzecY3zxffdHw==
expires
Sat, 25 Jul 2020 16:35:44 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
5 KB
2 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/placeholders.jquery.min.js&ver=d5a1318b
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:aa00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
d62a7b7ec5313469ebff5c006b9068dc44d6d1c122cf787ffa29a10113b34060
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
gzip
x-amz-cf-pop
FRA6-C1
x-cache
Miss from cloudfront
status
200
content-length
1747
x-cache-hit
HIT
last-modified
Fri, 24 Jul 2020 12:16:09 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 c275031486c6f7b744b8d30847e98b14.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
7-L3ADu3etVLDqnCqdx_doOsO4zc_iepSb0NLe1_bsoelxV0MUjo1A==
expires
Sat, 25 Jul 2020 16:35:49 GMT
api.js
www.google.com/recaptcha/
676 B
516 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?hl=en&render=explicit&ver=5.4.2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
0e669f69d0d5871e548dbb229e3bebf12dec178b21276546a23785618dd74ab3
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
cross-origin-resource-policy
cross-origin
content-security-policy
frame-ancestors 'self'
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
447
x-xss-protection
1; mode=block
expires
Sat, 25 Jul 2020 13:31:20 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
2 KB
1 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/js/wp-embed.min.js,wp-content/plugins/akismet/_inc/form.js&ver=d5a1318b
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:aa00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
21e46fe44c6929876f5a413c843ae516c0ddfd1aad3e8e33446b7bc0a6781b08
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
gzip
x-amz-cf-pop
FRA6-C1
x-cache
Miss from cloudfront
status
200
content-length
973
x-cache-hit
HIT
last-modified
Wed, 10 Jun 2020 22:05:38 GMT
server
nginx
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 c275031486c6f7b744b8d30847e98b14.cloudfront.net (CloudFront)
cache-control
max-age=86400
x-debug-auth
off
x-request-host
assets.threatpost.com
x-amz-cf-id
1VZ-WNhvs-LGFGfvtoFD7xiYcwR4omRrpQ8znUEHou_Gfie0L3jR-A==
expires
Sat, 25 Jul 2020 16:35:41 GMT
b-cc9018f-2cba83b0.js
tagan.adlightning.com/math-aids-threatpost/
58 KB
20 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-cc9018f-2cba83b0.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.71 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
92814e48e334fb45bb8d9d0d2a6e68a1e601fd7ce63d25c10969cfd57bf4b1e8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 07 Jul 2020 18:05:52 GMT
content-encoding
gzip
age
1538729
x-cache
Hit from cloudfront
status
200
content-length
19746
x-amz-meta-git_commit
cc9018f
last-modified
Tue, 07 Jul 2020 17:59:39 GMT
server
AmazonS3
etag
"21fe90f3aceeb46480a69949d763c756"
x-amz-version-id
KDx1ypMRqiob.YrLSDtIdsXad7Sl2JS5
via
1.1 6080b2713e502211e152f21f5c59c5a7.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
HhludB6Mi6D416iBSYP4rGA0-RRhLKR2OxLza5a9VBeEWrd9VwbHYg==
bl-cc9018f-8cdfc568.js
tagan.adlightning.com/math-aids-threatpost/
62 KB
18 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.71 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1f3d486ddbb9dda160529fdf0d8a6f4c1e77024078294664fb0456e9b33ba648

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 24 Jul 2020 17:22:10 GMT
content-encoding
gzip
age
72551
x-cache
Hit from cloudfront
status
200
content-length
18264
x-amz-meta-git_commit
cc9018f
last-modified
Fri, 24 Jul 2020 17:20:50 GMT
server
AmazonS3
etag
"35c351702648e8545a61bf940b50fb5c"
x-amz-version-id
YqdsBXP6TUW_8NLIciYdX4aAa4RYWjap
via
1.1 6080b2713e502211e152f21f5c59c5a7.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
NdoOwHtPNUtVYirE9yNfTdKhvOOBK2WDtEIJ9X74dvyyjf-9fozTCw==
pubads_impl_2020072001.js
securepubads.g.doubleclick.net/gpt/
253 KB
90 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
31e539be75870ad6cec377525eb196ea9fbc423ea53d68c03b2c94b96701bc47
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 20 Jul 2020 13:10:24 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
91349
x-xss-protection
0
expires
Sat, 25 Jul 2020 13:31:20 GMT
integrator.sync.js
adservice.google.de/adsid/
113 B
833 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.sync.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ea03bfd7fdda1eac185ebc3e8e74b33065b04c8e0adc48cbbd4136748dbd2742
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
108
x-xss-protection
0
apstag.js
c.amazon-adsystem.com/aax2/
102 KB
26 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: t.co
URL: https://t.co/X0ukaAEsUs
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.0.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Server /
Resource Hash
7301462cb27dcb0cf467822211f6cdd478be091ed9d776b29f426ce78c4a414f

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:21:32 GMT
content-encoding
gzip
server
Server
age
587
etag
b586b236f6b3db3c4ca9410451195336
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=900
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
na_7vj32VWvmyL4DhZLSaCZzB60D6WTPuggWV6PfDyQ4AgZ7RERBYg==
via
1.1 35c75b7f0ca8c787d67c8ebd22bc7fc3.cloudfront.net (CloudFront)
nncoection
close
cygnus
as-sec.casalemedia.com/
24 B
987 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=438654&v=7.2&r=%7B%22id%22%3A%221e9592cc0fe265%22%2C%22imp%22%3A%5B%7B%22id%22%3A%222cf0a08b9843cd%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438654%22%2C%22sid%22%3A%22728x90%22%7D%2C%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%223da6963f874a93%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438649%22%2C%22sid%22%3A%22300x250%22%7D%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%2246aa836ff96ae7%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438650%22%2C%22sid%22%3A%22300x250%22%7D%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%222cf0a08b9843cd%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438654%22%2C%22sid%22%3A%22970x250%22%7D%2C%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%222cf0a08b9843cd%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438654%22%2C%22sid%22%3A%22970x90%22%7D%2C%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%223da6963f874a93%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438649%22%2C%22sid%22%3A%22336x280%22%7D%2C%22banner%22%3A%7B%22w%22%3A336%2C%22h%22%3A280%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%2246aa836ff96ae7%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438650%22%2C%22sid%22%3A%22300x600%22%7D%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%7D%5D%2C%22site%22%3A%7B%22ref%22%3A%22https%3A%2F%2Ft.co%2FX0ukaAEsUs%22%2C%22page%22%3A%22https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F%22%7D%2C%22ext%22%3A%7B%22source%22%3A%22prebid%22%7D%2C%22source%22%3A%7B%22ext%22%3A%7B%22schain%22%3A%7B%22ver%22%3A%221.0%22%2C%22complete%22%3A1%2C%22nodes%22%3A%5B%7B%22asi%22%3A%22admetricspro.com%22%2C%22sid%22%3A%221005%22%2C%22hp%22%3A1%7D%5D%7D%7D%7D%7D&ac=j&sd=1
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.254.129 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache /
Resource Hash
dffcb07eba52aa5cd8030ea512e6cc13bb284435d25a00c35304a3ff4e308d32

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:20 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
44
Expires
Sat, 25 Jul 2020 13:31:20 GMT
adreq
ads.servenobid.com/
220 B
461 B
XHR
General
Full URL
https://ads.servenobid.com/adreq?cb=10902
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.253.1.139 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
ab8b5116952debacead07f0b99bade8d4d33372c6b54040662162cbe65eb0283

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
gzip
amp-access-control-allow-source-origin
*
status
200
vary
accept-encoding
content-type
application/json
access-control-allow-origin
https://threatpost.com
access-control-expose-headers
AMP-Access-Control-Allow-Source-Origin
access-control-allow-credentials
true
prebid
ib.adnxs.com/ut/v3/
19 B
709 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.221.50 , Netherlands, ASN29990 (ASN-APPNEX, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
0c09c070833c786cb25be38bc30992b30bad578f817dbc9e34beacd8b8ea44c5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:20 GMT
X-Proxy-Origin
82.102.19.136; 82.102.19.136; 728.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.48:80
AN-X-Request-Uuid
28ab491b-229b-445a-9fae-f6201bb5ab72
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
19
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
translator
hbopenbid.pubmatic.com/
0
115 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Sat, 25 Jul 2020 13:31:20 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
ADTECH;apid=1A204c5f8a-ce7b-11ea-8160-1245d65848a4;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=57546500f489e26;misc=1595683880438
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=57546500f489e26;misc=1595683880438;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=57546500f489e26;misc=1595683880438
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1A204c5f8a-ce7b-11ea-8160-1245d65848a4;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=57546500f489e26;misc=15...
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1A204c5f8a-ce7b-11ea-8160-1245d65848a4;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=57546500f489e26;misc=1595683880438
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
374c481ea6a2b5ef5fce80e34977911727abdb6fdaac8971825545d0dc3c4d02

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:20 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
1225
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:20 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1A204c5f8a-ce7b-11ea-8160-1245d65848a4;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=57546500f489e26;misc=1595683880438
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A204c2dc6-ce7b-11ea-ab80-12bf237d14d4;cfp=1;rndc=1595683879;v=2;cmd=bid;cors=yes;alias=5819fa03604562c;misc=1595683880438
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=5819fa03604562c;misc=1595683880438;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=5819fa03604562c;misc=1595683880438
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1A204c2dc6-ce7b-11ea-ab80-12bf237d14d4;cfp=1;rndc=1595683879;v=2;cmd=bid;cors=yes;alias=5819fa03604562c;misc=15...
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1A204c2dc6-ce7b-11ea-ab80-12bf237d14d4;cfp=1;rndc=1595683879;v=2;cmd=bid;cors=yes;alias=5819fa03604562c;misc=1595683880438
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
9de0ec24eeeb6119b0176c0d071a50de23b6a0238b668b34936f8e7a0d23cb6a

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:20 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
1225
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:20 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1A204c2dc6-ce7b-11ea-ab80-12bf237d14d4;cfp=1;rndc=1595683879;v=2;cmd=bid;cors=yes;alias=5819fa03604562c;misc=1595683880438
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A207be5f2-ce7b-11ea-9e3f-126272b4dea0;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=5959dcf22887aee;misc=1595683880439
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=5959dcf22887aee;misc=1595683880439;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1595683879;v=2;cmd=bid;cors=yes;alias=5959dcf22887aee;misc=1595683880439
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1A207be5f2-ce7b-11ea-9e3f-126272b4dea0;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=5959dcf22887aee;misc=15...
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1A207be5f2-ce7b-11ea-9e3f-126272b4dea0;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=5959dcf22887aee;misc=1595683880439
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
9388229cb00d2164d295217265676f3bc4cb3d9b3a2ede2f26aa460e36f64a43

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:21 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
1225
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:20 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1A207be5f2-ce7b-11ea-9e3f-126272b4dea0;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=5959dcf22887aee;misc=1595683880439
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A204e5736-ce7b-11ea-94b4-1245d65848a4;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=607448ba68dcd64;misc=1595683880439
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=607448ba68dcd64;misc=1595683880439;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1595683879;v=2;cmd=bid;cors=yes;alias=607448ba68dcd64;misc=1595683880439
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1A204e5736-ce7b-11ea-94b4-1245d65848a4;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=607448ba68dcd64;misc=15...
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1A204e5736-ce7b-11ea-94b4-1245d65848a4;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=607448ba68dcd64;misc=1595683880439
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
afb18dff4382037f3e86b0556a68a87aa9be94376a1b3777da6778e13c45ba78

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:20 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
1225
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:20 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1A204e5736-ce7b-11ea-94b4-1245d65848a4;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=607448ba68dcd64;misc=1595683880439
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A204c382a-ce7b-11ea-9162-1204ea82ed4e;cfp=1;rndc=1595683879;v=2;cmd=bid;cors=yes;alias=61043a50535c1d8;misc=1595683880439
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=61043a50535c1d8;misc=1595683880439;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1595683880;v=2;cmd=bid;cors=yes;alias=61043a50535c1d8;misc=1595683880439
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1A204c382a-ce7b-11ea-9162-1204ea82ed4e;cfp=1;rndc=1595683879;v=2;cmd=bid;cors=yes;alias=61043a50535c1d8;misc=15...
1 KB
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1A204c382a-ce7b-11ea-9162-1204ea82ed4e;cfp=1;rndc=1595683879;v=2;cmd=bid;cors=yes;alias=61043a50535c1d8;misc=1595683880439
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:97b6:26be:138a:cba8:bb01 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
dcc00c8c3860227af80c6fe91fceb7dc218c5ac95673bacd83e1f8ce83881fd2

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:20 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
1225
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:20 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1A204c382a-ce7b-11ea-9162-1204ea82ed4e;cfp=1;rndc=1595683879;v=2;cmd=bid;cors=yes;alias=61043a50535c1d8;misc=1595683880439
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
arj
teachingaids-d.openx.net/w/1.0/
172 B
559 B
XHR
General
Full URL
https://teachingaids-d.openx.net/w/1.0/arj?ju=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&ch=UTF-8&res=1600x1200x24&ifr=false&tz=-120&tws=1600x1200&be=1&bc=hb_pb_3.0.2&dddid=4901f72b-34e3-43d8-8b61-11ef84bcf5d3%2C4901f72b-34e3-43d8-8b61-11ef84bcf5d3%2Cf8df6c1b-1eef-403d-9762-4aef5b9e9ce0%2Cf1bdf137-36df-405f-b48b-6ad8869ad7ca%2Cf1bdf137-36df-405f-b48b-6ad8869ad7ca&nocache=1595683880440&pubcid=bda9ed3a-3f5c-4d9c-96c8-769c87114558&schain=1.0%2C1!admetricspro.com%2C1005%2C1%2C%2C%2C&aus=728x90%2C970x250%2C970x90%7C728x90%2C970x250%2C970x90%7C300x250%2C336x280%7C300x250%2C300x600%7C300x250%2C300x600&divIds=div-gpt-ad-6794670-2%2Cdiv-gpt-ad-6794670-2%2Cdiv-gpt-ad-6794670-3%2Cdiv-gpt-ad-6794670-5%2Cdiv-gpt-ad-6794670-5&auid=540932704%2C540932709%2C540932713%2C540932715%2C540932720
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.244.159.8 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
OXGW/16.190.0 /
Resource Hash
53ed169f8eb34db1aada3ff0defedb3c55edd2c97bebe48ba90efcab28fb2c2c

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
gzip
server
OXGW/16.190.0
status
200
vary
Accept, Accept-Encoding
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
163
via
1.1 google
expires
Mon, 26 Jul 1997 05:00:00 GMT
prebid
ib.adnxs.com/ut/v3/
19 B
710 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.221.50 , Netherlands, ASN29990 (ASN-APPNEX, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
0c09c070833c786cb25be38bc30992b30bad578f817dbc9e34beacd8b8ea44c5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:20 GMT
X-Proxy-Origin
82.102.19.136; 82.102.19.136; 728.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.179:80
AN-X-Request-Uuid
f0004543-b1d2-4cfe-ad83-7940030088ea
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
19
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
v2
e.serverbid.com/api/
16 B
168 B
XHR
General
Full URL
https://e.serverbid.com/api/v2
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
178.128.135.80 North Bergen, United States, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
/
Resource Hash
903eb8f1cc364e01930ba03579f049a72794aa91d1a5842a2edb6365e436bb7c

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

status
200
date
Sat, 25 Jul 2020 13:31:20 GMT
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
content-length
16
vary
Origin
content-type
application/json
auction
tlx.3lift.com/header/
19 B
310 B
XHR
General
Full URL
https://tlx.3lift.com/header/auction?lib=prebid&v=3.26.0&referrer=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&tmax=1200
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.185.79 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
0535c3bb3a17e4ac0fb7d29214d2181275662129dc2bdd2a89c35934e9fc5ba5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:20 GMT
x-auction-status
12, 12, 12
status
200
content-type
application/json; charset=utf-8
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
19
x-xss-protection
0
expires
Thu, 15 Oct 1992 20:10:00 GMT
bid
ap.lijit.com/rtb/
47 B
723 B
XHR
General
Full URL
https://ap.lijit.com/rtb/bid?src=prebid_prebid_3.26.0
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
72.251.249.13 Amsterdam, Netherlands, ASN29791 (VOXEL-DOT-NET, US),
Reverse DNS
Software
nginx /
Resource Hash
9ed2539745b4994c4df3635b5f500868f839c5e1f3796827603200afde508100

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Date
Sat, 25 Jul 2020 13:31:20 GMT
Content-Encoding
gzip
Server
nginx
Vary
Accept-Encoding, User-Agent
Access-Control-Allow-Methods
GET, POST, DELETE, PUT
Content-Type
application/json
Access-Control-Allow-Origin
https://threatpost.com
Access-Control-Allow-Credentials
true
X-Sovrn-Pod
ad_ap2ams1
Access-Control-Allow-Headers
X-Requested-With, Content-Type
Content-Length
65
c
prebid.a-mo.net/a/
46 B
359 B
XHR
General
Full URL
https://prebid.a-mo.net/a/c
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
100.24.218.250 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
Cowboy /
Resource Hash
f1607dbb00c3035d245d73227e2f273991568b211b571b5090ce8c656a2ae8dd

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
server
Cowboy
status
200
vary
origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://threatpost.com
cache-control
max-age=0, private, must-revalidate
access-control-allow-credentials
true
content-length
46
fastlane.json
fastlane.rubiconproject.com/a/api/
263 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=2&alt_size_ids=55%2C57&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&tk_flint=pbjs_lite_v3.26.0&x_source.tid=4901f72b-34e3-43d8-8b61-11ef84bcf5d3&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.30540689213323713
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
213.19.162.51 , United Kingdom, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
nginx/1.16.0 /
Resource Hash
2e0552eff6d7081e8d1e88083e4b43cef8c7d9318fde97e4febdbb76bfad2b17

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:20 GMT
Server
nginx/1.16.0
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Keep-Alive
timeout=5
Content-Length
263
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
241 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=15&alt_size_ids=16&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&tk_flint=pbjs_lite_v3.26.0&x_source.tid=f8df6c1b-1eef-403d-9762-4aef5b9e9ce0&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.9040104530303785
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
213.19.162.51 , United Kingdom, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
nginx/1.16.0 /
Resource Hash
02f1451bb9892fed52bb94c1199b6d718dc603a48eebd35e659e909196988c55

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:20 GMT
Server
nginx/1.16.0
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Keep-Alive
timeout=5
Content-Length
241
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
261 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509506&size_id=15&alt_size_ids=10&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&tk_flint=pbjs_lite_v3.26.0&x_source.tid=f1bdf137-36df-405f-b48b-6ad8869ad7ca&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.5544884375717563
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
213.19.162.51 , United Kingdom, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
nginx/1.16.0 /
Resource Hash
7e6123e5ac5fe408b1d927215e37369a6aa3d9c9df1acc4b85cc234ef05428dd

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:20 GMT
Server
nginx/1.16.0
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Keep-Alive
timeout=5
Content-Length
261
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
261 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=15&alt_size_ids=10&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&tk_flint=pbjs_lite_v3.26.0&x_source.tid=f1bdf137-36df-405f-b48b-6ad8869ad7ca&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.3888818067830013
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
213.19.162.51 , United Kingdom, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
nginx/1.16.0 /
Resource Hash
609cf66442de385176c0a007353a00aab1aff6d8c0503cdf36080d6e20162c3a

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:20 GMT
Server
nginx/1.16.0
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Keep-Alive
timeout=5
Content-Length
261
Expires
Wed, 17 Sep 1975 21:32:10 GMT
gtm.js
www.googletagmanager.com/
128 KB
43 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
64b8dcb39ab123ef4f1a14cb8d95a0a8ede4e90402cd376f9ff46349e203907a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
br
vary
Accept-Encoding
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
43525
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 12:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Sat, 25 Jul 2020 13:31:20 GMT
icons.svg
threatpost.com/wp-content/themes/threatpost-2018//assets/sprite/
13 KB
5 KB
Other
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018//assets/sprite/icons.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
01864580e1f385dc4512aed0de4b324cc1a04812709e7020e857612fc0ce9f4c

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:21 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Jul 2020 12:16:13 GMT
Server
nginx
ETag
W/"5f1ad10d-3496"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 13:31:21 GMT
icons.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/
13 KB
5 KB
Other
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/icons.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
01864580e1f385dc4512aed0de4b324cc1a04812709e7020e857612fc0ce9f4c

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:21 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Jul 2020 12:16:13 GMT
Server
nginx
ETag
W/"5f1ad10d-3496"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 13:31:21 GMT
logo.png
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
19 KB
19 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/logo.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
39af7c1116fb967a330e8770f775e6b5ee871add01ed45c98a1634911cebfb0a

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592971
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:21 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:11 GMT
Server
nginx
ETag
"5f1ad10b-4a32"
Content-Type
image/png
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
18994
Expires
Sat, 01 Aug 2020 13:31:21 GMT
museosans-300-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-300-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
45ddc09b0ad6ab916bd9a0282070b161045e186fc025303f4aa1aa821fc45ac7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592971
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:20 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:13 GMT
Server
nginx
ETag
"5f1ad10d-51b8"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20920
Expires
Sun, 25 Jul 2021 13:31:20 GMT
museosans-700-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-700-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
ae00ae9c862bc8b8923efd1d9a18befa912678a869d4dd01179a59ed3de731be

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592971
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:20 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:13 GMT
Server
nginx
ETag
"5f1ad10d-51a4"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20900
Expires
Sun, 25 Jul 2021 13:31:20 GMT
museosans-100-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-100-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
06fc565587b8b700936a1677218cb269a6cc31ca5f701eb45461e86a3d54d5c7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592971
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:20 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:11 GMT
Server
nginx
ETag
"5f1ad10b-50c8"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20680
Expires
Sun, 25 Jul 2021 13:31:20 GMT
museosans-500-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-500-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
2de77164bb9924542e1dea4ee4a0ff27d40b51a3d7939dac7db11a95045c9b7d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592971
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:20 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:13 GMT
Server
nginx
ETag
"5f1ad10d-5194"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20884
Expires
Sun, 25 Jul 2021 13:31:20 GMT
recaptcha__en.js
www.gstatic.com/recaptcha/releases/r8WWNwsCvXtk22_oRSVCCZx9/
330 KB
130 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/r8WWNwsCvXtk22_oRSVCCZx9/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?hl=en
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
61394e856497a7705a004cb627296445fe074d1f78b10ab81071915059b5a926
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 20 Jul 2020 16:39:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 20 Jul 2020 04:04:52 GMT
server
sffe
age
420720
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
133183
x-xss-protection
0
expires
Tue, 20 Jul 2021 16:39:20 GMT
mail-plane-light.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
828 B
722 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/mail-plane-light.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
5a7ed822968963e31d88424c96387ad9f4fd4f4b5a5b581a33f65e3784d162cf

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592971
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:21 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Jul 2020 12:16:13 GMT
Server
nginx
ETag
W/"5f1ad10d-33c"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 13:31:21 GMT
twitter-blue.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
868 B
847 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/twitter-blue.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
420508fc523520f35de5c851905543294123d7676b5a5668744691f2abe9e730

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592971
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:21 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Jul 2020 12:16:13 GMT
Server
nginx
ETag
W/"5f1ad10d-364"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 13:31:21 GMT
museosans-700italic-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
15 KB
16 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-700italic-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
859faa9b9ed0990288b2f393a102b1fe2668ac79088b113b6f0beaee521221eb

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592971
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:20 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:11 GMT
Server
nginx
ETag
"5f1ad10b-3dcc"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
15820
Expires
Sun, 25 Jul 2021 13:31:20 GMT
liveView.php
live.sekindo.com/live/ Frame 642B
2 KB
1 KB
Script
General
Full URL
https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595683880&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
df5a6f084187081464a412263b2a17646b35aeffa5422974b916892d32cf80e8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:20 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/javascript; charset=utf-8
mail-plane-large-dark.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
812 B
722 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/mail-plane-large-dark.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
a9d2b2df99c1a115d5394c70a898d8801092208dc582f8bd6fb01b35c30d6b22

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592971
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:21 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Jul 2020 12:16:13 GMT
Server
nginx
ETag
W/"5f1ad10d-32c"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Sat, 01 Aug 2020 13:31:21 GMT
logo-white.png
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
10 KB
10 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/logo-white.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
e4058d4ee9da1ceaddfa91ddb63650ba67285f1bbfee487d9dfe648bced669a0

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592971
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:22 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:13 GMT
Server
nginx
ETag
"5f1ad10d-260a"
Content-Type
image/png
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
9738
Expires
Sat, 01 Aug 2020 13:31:22 GMT
museosans-300italic-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
23 KB
23 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-300italic-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
f8a2b5b62eb722c3379b30cf0cc58d3176ee6be48036d6ad2aa838d2029c4189

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1595592971
Origin
https://threatpost.com

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:20 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:12 GMT
Server
nginx
ETag
"5f1ad10c-5bac"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
23468
Expires
Sun, 25 Jul 2021 13:31:20 GMT
iab_consent_sdk.v1.0.js
live.sekindo.com/content/ClientDetections/ Frame 642B
19 KB
6 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/iab_consent_sdk.v1.0.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595683880&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
a3336e3373c170b40764f5a62d121335bec4243b0034e561937194dfe2e413fd

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:20 GMT
Content-Encoding
gzip
Last-Modified
Wed, 12 Feb 2020 15:01:36 GMT
Server
nginx
ETag
W/"5e441350-4be0"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Sun, 25 Jul 2021 13:31:20 GMT
DetectGDPR2.v1.1.js
live.sekindo.com/content/ClientDetections/ Frame 642B
9 KB
3 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/DetectGDPR2.v1.1.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595683880&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
0cf25abe73b03e246c0a820c825a1f433e36949c2cf456ce889d86e8dd9ec427

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:20 GMT
Content-Encoding
gzip
Last-Modified
Wed, 08 Jul 2020 16:36:53 GMT
Server
nginx
ETag
W/"5f05f625-225b"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Sun, 25 Jul 2021 13:31:20 GMT
DetectGDPR.v1.1.js
live.sekindo.com/content/ClientDetections/ Frame 642B
8 KB
3 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/DetectGDPR.v1.1.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595683880&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
f40e3d5b91387e92272b6d46fc83ce21041f130a29316d7216d3a1793d46c4f3

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:20 GMT
Content-Encoding
gzip
Last-Modified
Wed, 08 Jul 2020 16:36:52 GMT
Server
nginx
ETag
W/"5f05f624-1ec4"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Sun, 25 Jul 2021 13:31:20 GMT
hls.0.12.4_1.min.js
live.sekindo.com/content/video/hls/ Frame 642B
247 KB
85 KB
Script
General
Full URL
https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595683880&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
7d0492c66125b1c2bdc419641e41542857e7d90e323d355ee0b8bb268da121fb

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:20 GMT
Content-Encoding
gzip
Last-Modified
Mon, 06 Jan 2020 15:31:55 GMT
Server
nginx
ETag
W/"5e1352eb-3dcb9"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Sun, 25 Jul 2021 13:31:20 GMT
prebidVid.3.19.0_9.min.js
live.sekindo.com/content/prebid/ Frame 642B
296 KB
108 KB
Script
General
Full URL
https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595683880&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
7860ef37e85676dcb81a99d7e5d6453bdacdf9d35aa45517a9ba9ea25bbd4c85

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:20 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jul 2020 14:28:49 GMT
Server
nginx
ETag
W/"5f106421-4a003"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Sun, 25 Jul 2021 13:31:20 GMT
liveVideo.php
live.sekindo.com/live/ Frame 642B
439 KB
124 KB
Script
General
Full URL
https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31367D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c3428aed92&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.8847&geoLong=4.5049&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1595683880&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=both&flowCloseButtonPosition=right
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
ebe6d5046f2282bff1163bcbd498f2aa0c87b8df01063d2d3e42a56d18c3862d

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:19 GMT
Content-Encoding
gzip
Server
nginx
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
bid
c.amazon-adsystem.com/e/dtb/
23 B
369 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=600&u=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&pr=https%3A%2F%2Ft.co%2FX0ukaAEsUs&pid=tqnpkiC64HSvC&cb=0&ws=1600x1200&v=7.52.00&t=1200&slots=%5B%7B%22sd%22%3A%220%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%2C%22970x90%22%5D%2C%22sn%22%3A%22%2F21707124336%2FThreatPost-970x250-ATF%22%7D%2C%7B%22sd%22%3A%221%22%2C%22s%22%3A%5B%22300x250%22%2C%22336x280%22%5D%2C%22sn%22%3A%22%2F21707124336%2FThreatPost-300x250-ATF%22%7D%2C%7B%22sd%22%3A%222%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%2C%22sn%22%3A%22%2F21707124336%2FThreatPost-300x600-ATF%22%7D%2C%7B%22sd%22%3A%223%22%2C%22s%22%3A%5B%222x2%22%5D%2C%22sn%22%3A%22%2F21707124336%2FThreatPost-2x2-Skin%22%7D%5D&pubid=cb8cfc89-e83e-44aa-a3a2-ff78eda781ef&gdprl=%7B%22status%22%3A%22no-cmp%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.0.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Server /
Resource Hash
745a085b52b8371ec6705413fca70a28c6d8bff0db480e6b124bd08c54e95ef8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
via
1.1 35c75b7f0ca8c787d67c8ebd22bc7fc3.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
FRA6-C1
status
200
vary
User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://threatpost.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
23
x-amz-cf-id
s0dI9KhaB8pDG94Ruym2G7Z4uYnhPxOBPAhwc4y3q2kMNeIMAr2OwA==
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.0.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 05:54:51 GMT
content-encoding
gzip
vary
Accept-Encoding,Origin
age
27390
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Tue, 23 Jun 2020 10:10:39 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 d07eabeb1ed60c06da1457f35fb5c8c5.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
PT6W5E1hDfhDD3gXZ6lep2h_wSo4AliZe9gLVaenq15-oVO85zL7sQ==
analytics.js
www.google-analytics.com/
45 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
fd361b57998c76f86335afa28b8a62527d88a8200fb5c428d6f0fff73383e955
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 04 Jun 2020 23:38:14 GMT
server
Golfe2
age
4541
date
Sat, 25 Jul 2020 12:15:39 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18469
expires
Sat, 25 Jul 2020 14:15:39 GMT
quant.js
secure.quantserve.com/
22 KB
8 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:116:800d:21:51e4:db4b:4436:b305 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
8130c2c72afad9d94581ef93aaa00524093103c47c71fce52f606d5ff693c3ce
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
gzip
last-modified
Sat, 25-Jul-2020 13:31:20 GMT
etag
M0-2a172724
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
private, no-transform, max-age=604800
strict-transport-security
max-age=86400
content-length
8060
expires
Sat, 01 Aug 2020 13:31:20 GMT
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:20 GMT
content-encoding
gzip
age
57563
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-hhn4075-HHN
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1595683881.926378,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j83&aip=1&a=1673332111&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-35676203-21&cid=17976605.1595683881&jid=1165477124&_gid=716639561.1595683881&gjid=686388252&_v=j83&z=406532500
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=17976605.1595683881&jid=1165477124&_v=j83&z=406532500
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=17976605.1595683881&jid=1165477124&_v=j83&z=406532500&slf_rd=1&random=1447906220
42 B
492 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=17976605.1595683881&jid=1165477124&_v=j83&z=406532500&slf_rd=1&random=1447906220
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:21 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:20 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=17976605.1595683881&jid=1165477124&_v=j83&z=406532500&slf_rd=1&random=1447906220
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
194 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j83&aip=1&a=1673332111&t=event&ni=0&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&dr=https%3A%2F%2Ft.co%2FX0ukaAEsUs&ul=en-us&de=UTF-8&dt=Office%20365%20Users%20Targeted%20By%20%27Coronavirus%20Employee%20Training%27%20Phish%20%7C%20Threatpost&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=VISIBILITY&ea=elementVisibility%20%2F%20%5BHeader%5D%20%2F%20Social%20Networks%20View&_u=YEDAAEAB~&jid=&gjid=&cid=17976605.1595683881&tid=UA-35676203-21&_gid=716639561.1595683881&gtm=2wg7f0PM29HLF&z=1169369790
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jul 2020 20:46:40 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
319480
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
rules-p-_7kVx0t9Jqj90.js
rules.quantcount.com/
3 B
354 B
Script
General
Full URL
https://rules.quantcount.com/rules-p-_7kVx0t9Jqj90.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:4200:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:30:24 GMT
via
1.1 7ed7afde326861e358c3c83359e99895.cloudfront.net (CloudFront)
last-modified
Fri, 03 Mar 2017 23:52:35 GMT
server
AmazonS3
age
58
etag
"8a80554c91d9fca8acb82f023de02f11"
x-cache
Error from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=300
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-length
3
x-amz-cf-id
3f2clybLEqi1M3jEtaig-iukp-bY3jHxBGuuTziZE1ovcwIn2qdD1A==
adsct
t.co/i/
43 B
368 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=ntt0j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.69 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
105
pragma
no-cache
last-modified
Sat, 25 Jul 2020 13:31:21 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=0
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
e3f59fbd1161e9f928a362da3121b1d4
x-transaction
006da5a800364ae5
expires
Tue, 31 Mar 1981 05:00:00 GMT
apstag.js
c.amazon-adsystem.com/aax2/ Frame 642B
102 KB
26 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31367D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c3428aed92&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.8847&geoLong=4.5049&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.0.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Server /
Resource Hash
7301462cb27dcb0cf467822211f6cdd478be091ed9d776b29f426ce78c4a414f

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:21:32 GMT
content-encoding
gzip
server
Server
age
588
etag
b586b236f6b3db3c4ca9410451195336
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=900
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
Gn7vpKhpwPJQ6qfRPTU_kq6tcBlmC-4vj_T0Ce3nEwcBMgTdSYc-4A==
via
1.1 35c75b7f0ca8c787d67c8ebd22bc7fc3.cloudfront.net (CloudFront)
nncoection
close
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/ Frame 642B
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.0.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 05:54:51 GMT
content-encoding
gzip
vary
Accept-Encoding,Origin
age
27391
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Tue, 23 Jun 2020 10:10:39 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 d07eabeb1ed60c06da1457f35fb5c8c5.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
7uPKoMxlUbOUeEindoA1SV3Xzvo4oy0KCXjmFa9XPNv5UL8_qrCq-w==
css
fonts.googleapis.com/ Frame 2D92
2 KB
669 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto&display=swap
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31367D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c3428aed92&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.8847&geoLong=4.5049&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
00d4fbacbadc6ecbd73be323ec77febf3d856ce00dc5334d06462a315c7da8e7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 12:25:41 GMT
server
ESF
date
Sat, 25 Jul 2020 13:31:21 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 25 Jul 2020 13:31:21 GMT
css
fonts.googleapis.com/ Frame 27FE
2 KB
646 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto&display=swap
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31367D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c3428aed92&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.8847&geoLong=4.5049&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
00d4fbacbadc6ecbd73be323ec77febf3d856ce00dc5334d06462a315c7da8e7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 12:24:51 GMT
server
ESF
date
Sat, 25 Jul 2020 13:31:21 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 25 Jul 2020 13:31:21 GMT
user_sync.html
ads.pubmatic.com/AdServer/js/ Frame 2541
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/user_sync.html?p=159196&userIdMacro=PM_UID&gdpr=1&gdpr_consent=&predirect=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D91%26advUuid%3DPM_UID%26gdpr%3D1%26gdpr_consent%3D
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31367D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c3428aed92&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.8847&geoLong=4.5049&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.32 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Last-Modified
Tue, 14 Apr 2020 10:28:34 GMT
ETag
"1300708-2eae-5a33da96f833f"
Server
Apache/2.2.15 (CentOS)
Accept-Ranges
bytes
Content-Encoding
gzip
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
4169
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=170093
Expires
Mon, 27 Jul 2020 12:46:14 GMT
Date
Sat, 25 Jul 2020 13:31:21 GMT
Connection
keep-alive
Vary
Accept-Encoding
liveCS.php
live.sekindo.com/live/ Frame 0F1B
Redirect Chain
  • https://sync.search.spotxchange.com/partner?adv_id=8805&redir=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D94%26advUuid%3D%24SPOTX_USER_ID
  • https://sync.search.spotxchange.com/partner?adv_id=8805&redir=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D94%26advUuid%3D%24SPOTX_USER_ID&__user_chec...
  • https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=94&advUuid=20a0e934-ce7b-11ea-ad4b-182a6e991106
0
0
Document
General
Full URL
https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=94&advUuid=20a0e934-ce7b-11ea-ad4b-182a6e991106
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31367D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c3428aed92&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.8847&geoLong=4.5049&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash

Request headers

Host
live.sekindo.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Server
nginx
Date
Sat, 25 Jul 2020 13:31:21 GMT
Content-Type
text/html; charset=utf-8
Transfer-Encoding
chunked
X-Powered-By
PHP/7.3.20
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Cache-Control
no-store
Pragma
no-cache
Age
0
Content-Encoding
gzip

Redirect headers

Server
nginx
Date
Sat, 25 Jul 2020 13:31:21 GMT
Content-Type
text/plain
Content-Length
0
Connection
keep-alive
Set-Cookie
audience=20a0e934-ce7b-11ea-ad4b-182a6e991106; expires=Sun, 25-Jul-2021 14:38:01 GMT; path=/; domain=.spotxchange.com; SameSite=none; Secure
Location
https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=94&advUuid=20a0e934-ce7b-11ea-ad4b-182a6e991106
X-fe
38
Access-Control-Allow-Methods
GET, POST, OPTIONS
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Cache-Control
no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0
liveCS.php
live.sekindo.com/live/ Frame 6F70
Redirect Chain
  • https://u.openx.net/w/1.0/cm?id=476b50d3-5ccf-49a1-89b8-1ddf8ea18042&r=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D98%26advUuid%3D
  • https://u.openx.net/w/1.0/cm?cc=1&id=476b50d3-5ccf-49a1-89b8-1ddf8ea18042&r=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D98%26advUuid%3D
  • https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=98&advUuid=fffc3dbc-183a-4f8c-a6d6-cecf9f579e48
0
0
Document
General
Full URL
https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=98&advUuid=fffc3dbc-183a-4f8c-a6d6-cecf9f579e48
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31367D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c3428aed92&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.8847&geoLong=4.5049&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash

Request headers

Host
live.sekindo.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Server
nginx
Date
Sat, 25 Jul 2020 13:31:20 GMT
Content-Type
text/html; charset=utf-8
Transfer-Encoding
chunked
X-Powered-By
PHP/7.3.20
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Cache-Control
no-store
Pragma
no-cache
Age
0
Content-Encoding
gzip

Redirect headers

status
302
vary
Accept, Accept-Encoding
set-cookie
i=dbf5e455-fdfb-4888-b865-90041738eea0|1595683881; Version=1; Expires=Sun, 25-Jul-2021 13:31:21 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.190.0
p3p
CP="CUR ADM OUR NOR STA NID"
location
https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=98&advUuid=fffc3dbc-183a-4f8c-a6d6-cecf9f579e48
date
Sat, 25 Jul 2020 13:31:21 GMT
content-type
text/html
content-length
0
content-encoding
gzip
via
1.1 google
alt-svc
clear
placeHolder.png
live.sekindo.com/content/video/splayer/assets/
23 KB
24 KB
Image
General
Full URL
https://live.sekindo.com/content/video/splayer/assets/placeHolder.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
76102878c1198de858725194952ba1c6b35bdee0f870cc6a124e93d17385e64e

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:20 GMT
Last-Modified
Sun, 11 Jun 2017 08:04:06 GMT
Server
nginx
ETag
"593cf976-5dbf"
Content-Type
image/png
Cache-Control
no-cache, private
Accept-Ranges
bytes
Content-Length
23999
Expires
Sat, 25 Jul 2020 13:31:19 GMT
vid5d5bb0d47c725224559183.jpg
video.sekindo.com/uploads/cn1/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 27FE
8 KB
8 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn1/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.jpg?cbuster=1570431012
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
39acff21a7526c57aecfab519ae6bc57b24611d05058c34fe7a1c6391a456339
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:19 GMT
Last-Modified
Tue, 20 Aug 2019 08:42:11 GMT
Server
Tengine
ETag
"5d5bb263-1f36"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
7990
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e7c813b434a0248969272.jpg
video.sekindo.com/uploads/cn11/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 27FE
7 KB
8 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn11/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e7c813b434a0248969272.jpg?cbuster=1585217855
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
e8a8c38a4d34ff1b394ec479ab194b2e0659c402f027fb04b9eb90881d3b23f3
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:19 GMT
Last-Modified
Thu, 26 Mar 2020 10:18:15 GMT
Server
Tengine
ETag
"5e7c8167-1d8c"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
7564
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e8ddb51d9b95030068777.jpg
video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 27FE
11 KB
12 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e8ddb51d9b95030068777.jpg?cbuster=1586355029
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
92d0171289868d45a2099f1e0507824921169d4e8048aaecdf52802adae3c939
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:19 GMT
Last-Modified
Wed, 08 Apr 2020 14:12:22 GMT
Server
Tengine
ETag
"5e8ddbc6-2d3a"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
11578
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e8ddb4deacf8289516989.jpg
video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 27FE
21 KB
21 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e8ddb4deacf8289516989.jpg?cbuster=1586355025
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
fd920468078f9ce3bd928870d328f15f530bd07ef49098cc310acee65e9e9284
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:19 GMT
Last-Modified
Wed, 08 Apr 2020 14:12:15 GMT
Server
Tengine
ETag
"5e8ddbbf-52a0"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
21152
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e86d7b9d2c91800058387.jpg
video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 27FE
13 KB
13 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e86d7b9d2c91800058387.jpg?cbuster=1585895359
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
f1a73d1be169d95a5d478b3a6751e42b1f5c2c0a6e5486c709b90241004376c9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:19 GMT
Last-Modified
Fri, 03 Apr 2020 06:30:14 GMT
Server
Tengine
ETag
"5e86d7f6-331c"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
13084
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e82652053bc0719376164.jpg
video.sekindo.com/uploads/cn11/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 27FE
5 KB
5 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn11/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e82652053bc0719376164.jpg?cbuster=1585603877
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
4e10c320e69dbec70da9b25b702c4d54d655d0b0ff3034e5deca574a18215f4a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:19 GMT
Last-Modified
Mon, 30 Mar 2020 23:02:22 GMT
Server
Tengine
ETag
"5e827a7e-136d"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
4973
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e86d7b36a41a121341580.jpg
video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 27FE
21 KB
21 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn12/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e86d7b36a41a121341580.jpg?cbuster=1585895352
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
fd920468078f9ce3bd928870d328f15f530bd07ef49098cc310acee65e9e9284
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:19 GMT
Last-Modified
Fri, 03 Apr 2020 06:30:08 GMT
Server
Tengine
ETag
"5e86d7f0-52a0"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
21152
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e7c8135a40b2024482084.jpg
video.sekindo.com/uploads/cn11/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 27FE
12 KB
13 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn11/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e7c8135a40b2024482084.jpg?cbuster=1585217851
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
e4be5b94ae5d44559ee0e809b87774c6f6e3df1c523e6ab24e31977e965e76a8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:19 GMT
Last-Modified
Thu, 26 Mar 2020 10:18:09 GMT
Server
Tengine
ETag
"5e7c8161-31c4"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
12740
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5dfbdccdd42f1591065679.jpg
video.sekindo.com/uploads/cn9/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 27FE
4 KB
5 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn9/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5dfbdccdd42f1591065679.jpg?cbuster=1576787159
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
d2a953a03ff9038e93d2a3b6b85a73eb2d6fdd185b2f4472ba592b802867078b
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:19 GMT
Last-Modified
Thu, 19 Dec 2019 20:26:26 GMT
Server
Tengine
ETag
"5dfbdcf2-11a2"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
4514
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5db0ab9eb009c482959510.jpg
video.sekindo.com/uploads/cn9/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 27FE
12 KB
13 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn9/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5db0ab9eb009c482959510.jpg?cbuster=1571859369
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
e0ebb40eaa4376fa3a837ac43f2b6ada7c35d3703b01c06a7a6b9c5184589e23
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:19 GMT
Last-Modified
Wed, 23 Oct 2019 19:37:06 GMT
Server
Tengine
ETag
"5db0abe2-3156"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
12630
Expires
Thu, 31 Dec 2037 23:55:55 GMT
sync
x.bidswitch.net/ul_cb/ Frame 642B
Redirect Chain
  • https://x.bidswitch.net/sync?ssp=sekindo&user_id=5f1c3428aed92&custom_data=5f1c3428aed92&gdpr=1&gdpr_consent=
  • https://x.bidswitch.net/ul_cb/sync?ssp=sekindo&user_id=5f1c3428aed92&custom_data=5f1c3428aed92&gdpr=1&gdpr_consent=
43 B
212 B
Image
General
Full URL
https://x.bidswitch.net/ul_cb/sync?ssp=sekindo&user_id=5f1c3428aed92&custom_data=5f1c3428aed92&gdpr=1&gdpr_consent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.126.15.129 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
date
Sat, 25 Jul 2020 13:31:22 GMT
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
content-length
43
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"

Redirect headers

status
302
date
Sat, 25 Jul 2020 13:31:22 GMT
cache-control
no-cache, no-store, must-revalidate
content-length
0
location
https://x.bidswitch.net/ul_cb/sync?ssp=sekindo&user_id=5f1c3428aed92&custom_data=5f1c3428aed92&gdpr=1&gdpr_consent=
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
liveCS.php
live.sekindo.com/live/ Frame 642B
Redirect Chain
  • https://csync.loopme.me/?redirect=https%3A%2F%2Flive.sekindo.com%2Flive%2FliveCS.php%3Fsource%3Dexternal%26pixel%3D%26advId%3D93%26advUuid%3D%7Bdevice_id%7D
  • https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=93&advUuid=b74fd560-895e-413a-9856-c53b91bc21c3
0
347 B
Image
General
Full URL
https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=93&advUuid=b74fd560-895e-413a-9856-c53b91bc21c3
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:22 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Cache-Control
no-store
Content-Type
text/html; charset=utf-8

Redirect headers

status
302
date
Sat, 25 Jul 2020 13:31:22 GMT
content-length
0
location
https://live.sekindo.com/live/liveCS.php?source=external&pixel=&advId=93&advUuid=b74fd560-895e-413a-9856-c53b91bc21c3
vid5d5bb0d47c725224559183.jpg
video.sekindo.com/uploads/cn1/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 2D92
8 KB
8 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn1/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.jpg?cbuster=1570431012
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
39acff21a7526c57aecfab519ae6bc57b24611d05058c34fe7a1c6391a456339
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://amli.sekindo.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:19 GMT
Last-Modified
Tue, 20 Aug 2019 08:42:11 GMT
Server
Tengine
ETag
"5d5bb263-1f36"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
7990
Expires
Thu, 31 Dec 2037 23:55:55 GMT
truncated
/ Frame 2D92
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 2D92
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
liveView.php
live.sekindo.com/live/ Frame 642B
81 KB
4 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=1&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn1%2Fvideo%2Fusers%2Fconverted%2F28530%2Fvideo_5d5baf9fe4c32389620327%2Fvid5d5bb0d47c725224559183.mp4&vid_content_id=483586&vid_content_desc=Apple%27s+new+phone+to+be+called+iPhone+XC%3F&vid_content_title=Apple%27s+new+phone+to+be+called+iPhone+XC%3F&vid_content_duration=40&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&x=320&y=180&fpl=1&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31367D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&isApp=0&geoLati=50.8847&geoLong=4.5049&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c3428aed92&cbuster=1595683881172&gdpr=1&gdprConsent=&isWePassGdpr=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31367D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c3428aed92&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.8847&geoLong=4.5049&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
9aec97fddf995761c7389f87b754a34d0135758ca226610be0f91df291f941aa

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:21 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
3374
liveView.php
live.sekindo.com/live/ Frame 642B
24 KB
2 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=0&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn1%2Fvideo%2Fusers%2Fconverted%2F28530%2Fvideo_5d5baf9fe4c32389620327%2Fvid5d5bb0d47c725224559183.mp4&vid_content_id=483586&vid_content_desc=Apple%27s+new+phone+to+be+called+iPhone+XC%3F&vid_content_title=Apple%27s+new+phone+to+be+called+iPhone+XC%3F&vid_content_duration=40&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&x=320&y=180&fpl=1&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31367D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&isApp=0&geoLati=50.8847&geoLong=4.5049&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c3428aed92&cbuster=1595683881173&gdpr=1&gdprConsent=&isWePassGdpr=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31367D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c3428aed92&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.8847&geoLong=4.5049&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
8968cda100ec64a74bb84508bb1952c6168e740be591638efccd9e5037c15a63

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:20 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
1817
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/ Frame 2D92
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31367D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c3428aed92&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.8847&geoLong=4.5049&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto&display=swap
Origin
https://threatpost.com

Response headers

date
Fri, 12 Jun 2020 20:41:36 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:50 GMT
server
sffe
age
3689385
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
11016
x-xss-protection
0
expires
Sat, 12 Jun 2021 20:41:36 GMT
ads
securepubads.g.doubleclick.net/gampad/
171 KB
21 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1700474065459858&correlator=197180169440978&output=ldjh&impl=fifs&adsid=NT&eid=21064170%2C21066533&vrg=2020072001&tfua=0&tfcd=0&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200725&iu_parts=21707124336%2CThreatPost-970x250-ATF%2CThreatPost-300x250-ATF%2CThreatPost-300x600-ATF%2CThreatPost-2x2-Skin&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3%2C%2F0%2F4&prev_iu_szs=728x90%7C970x250%7C970x90%2C300x250%7C336x280%2C300x250%7C300x600%2C2x2&prev_scp=amznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2%7Camznbid%3D2%26amznp%3D2&eri=1&cust_params=urlhost%3Dhttps%253A%252F%252Fthreatpost.com%252F%26urlpath%3D%252Foffice-365-users-targeted-by-coronavirus-employee-training-phish%252F156899%252F%26urlquery%3Dgoogfc%26contentid%3D156899%26category%3Dmalware-2%26contenttags%3Dblack-lives-matter%252Ccoronavirus%252Ccovid-19%252Ccyber-attacks-0%252Cemail%252Cemployees%252Clockdown%252Cmalware%252Cphishing%252Cspam%252Cthreat-actors%252Ctraining%252Ctrickbot&cookie_enabled=1&bc=31&abxe=1&lmt=1595683881&dt=1595683881212&dlt=1595683879785&idt=574&frm=20&biw=1600&bih=1200&oid=3&adxs=436%2C1082%2C1082%2C0&adys=10%2C257%2C1570%2C0&adks=1015519800%2C654286612%2C375389812%2C3385906655&ucis=1%7C2%7C3%7C4&ifi=1&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&ref=https%3A%2F%2Ft.co%2FX0ukaAEsUs&dssz=42&icsg=176173059&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=728x90%7C300x250%7C300x250%7C1600x2&msz=728x90%7C300x250%7C300x250%7C1600x2&ga_vid=17976605.1595683881&ga_sid=1595683881&ga_hid=1673332111&fws=0%2C0%2C0%2C0&ohw=0%2C0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
f21942185b94200b118dad6caca5cee84e9e9010085ca2b92e515b4fb9f62df6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:21 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
21350
x-xss-protection
0
google-lineitem-id
-1,-1,-1,5283645110
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-1,-1,-1,138301519116
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://threatpost.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
8b675fca0d72ef4d503d0e09691ad717.safeframe.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://8b675fca0d72ef4d503d0e09691ad717.safeframe.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

translator
hbopenbid.pubmatic.com/ Frame 642B
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Sat, 25 Jul 2020 13:31:21 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
openrtb
ads.adaptv.advertising.com/rtb/ Frame 642B
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=TeachingAidsLLC
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.185.185.10 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

access-control-allow-origin
https://threatpost.com
access-control-allow-credentials
true
server
adaptv/1.0
Connection
keep-alive
content-length
0
content-type
application/json
pixel;r=1901652166;source=gtm;rf=0;a=p-_7kVx0t9Jqj90;url=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F;ref=https%3A%2F%2Ft.co%2FX0ukaAE...
pixel.quantserve.com/
35 B
371 B
Image
General
Full URL
https://pixel.quantserve.com/pixel;r=1901652166;source=gtm;rf=0;a=p-_7kVx0t9Jqj90;url=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F;ref=https%3A%2F%2Ft.co%2FX0ukaAEsUs;fpan=1;fpa=P0-1803308690-1595683881290;ns=0;ce=1;qjs=1;qv=35f667c6-20200713111428;cm=;gdpr=0;d=threatpost.com;je=0;sr=1600x1200x24;enc=n;dst=1;et=1595683881290;tzo=-120;ogl=image.https%3A%2F%2Fmedia%252Ethreatpost%252Ecom%2Fwp-content%2Fuploads%2Fsites%2F103%2F2020%2F06%2F25083724%2Fblack%2Ctype.article%2Ctitle.Office%20365%20Users%20Targeted%20By%20'Coronavirus%20Employee%20Training'%20Phish%2Cdescription.Threat%20actors%20shift%20focus%20from%20COVID-19%20to%20employee%20coronavirus%20training%20and%20cur%2Curl.https%3A%2F%2Fthreatpost%252Ecom%2Foffice-365-users-targeted-by-coronavirus-employee-trainin
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:116:800d:21:51e4:db4b:4436:b305 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:21 GMT
strict-transport-security
max-age=86400
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
status
200
cache-control
private, no-cache, no-store, proxy-revalidate
content-type
image/gif
content-length
35
expires
Fri, 04 Aug 1978 12:00:00 GMT
chunklist_640.m3u8
video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/ Frame 642B
330 B
730 B
XHR
General
Full URL
https://video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/chunklist_640.m3u8
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
cc1a06507fef3821468dfabe5f908b44d8e048a85ab70cf5a95a3ea7a6c7f071

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:19 GMT
Last-Modified
Tue, 20 Aug 2019 08:43:55 GMT
Server
Tengine
ETag
"5d5bb2cb-14a"
Content-Type
application/vnd.apple.mpegurl
Access-Control-Allow-Origin
*
Expires
Sat, 01 Aug 2020 13:31:19 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
330
X-Proxy-Cache
HIT
recaptcha__en.js
www.gstatic.com/recaptcha/releases/r8WWNwsCvXtk22_oRSVCCZx9/
330 KB
130 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/r8WWNwsCvXtk22_oRSVCCZx9/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?hl=en&render=explicit&ver=5.4.2
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
61394e856497a7705a004cb627296445fe074d1f78b10ab81071915059b5a926
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 20 Jul 2020 16:39:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 20 Jul 2020 04:04:52 GMT
server
sffe
age
420721
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
133183
x-xss-protection
0
expires
Tue, 20 Jul 2021 16:39:20 GMT
flipboard.svg
assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/img/
236 B
567 B
Image
General
Full URL
https://assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/img/flipboard.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:aa00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
506d565f94cecbb486394c545a96e8459217f8d045496b511e8c815142abfc70

Request headers

Referer
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=d5a1318b
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
public
date
Sat, 25 Jul 2020 13:31:21 GMT
content-encoding
gzip
last-modified
Fri, 24 Jul 2020 12:16:13 GMT
server
nginx
x-amz-cf-pop
FRA6-C1
etag
W/"5f1ad10d-ec"
x-cache
Miss from cloudfront
content-type
image/svg+xml
status
200
cache-control
max-age=604800, public
x-amz-cf-id
3RmnjkfFRMKfku-hYljNVGEJaZrZOhyXZIiqqgF6cWO-UchKFDjdnQ==
via
1.1 c275031486c6f7b744b8d30847e98b14.cloudfront.net (CloudFront)
expires
Sat, 01 Aug 2020 13:31:21 GMT
fontawesome-webfont.woff2
assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/fonts/
75 KB
76 KB
Font
General
Full URL
https://assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/fonts/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2057:aa00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=d5a1318b
Origin
https://threatpost.com

Response headers

date
Sat, 25 Jul 2020 13:31:21 GMT
via
1.1 d8e97d2c28917e4c41ab79bb1e94b845.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA6-C1
x-cache
Miss from cloudfront
status
200
content-length
77160
pragma
public
last-modified
Fri, 24 Jul 2020 12:16:11 GMT
server
nginx
etag
"5f1ad10b-12d68"
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000, public
accept-ranges
bytes
x-amz-cf-id
kaz1IR8fuhbqjynQbSONICo4OGBho5-AtFF6vTOsN87DC2CevoOdFw==
expires
Sun, 25 Jul 2021 13:31:21 GMT
photo-newsletter.jpg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
83 KB
83 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/photo-newsletter.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
nginx /
Resource Hash
940e0c3385928422aae38e1a74f1d84b462d8ce1a056c686fde505a0bf3162bb

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
public
Date
Sat, 25 Jul 2020 13:31:22 GMT
Last-Modified
Fri, 24 Jul 2020 12:16:12 GMT
Server
nginx
ETag
"5f1ad10c-14c88"
Content-Type
image/jpeg
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
85128
Expires
Sat, 01 Aug 2020 13:31:22 GMT
adsct
analytics.twitter.com/i/
31 B
652 B
Script
General
Full URL
https://analytics.twitter.com/i/adsct?p_id=Twitter&p_user_id=0&txn_id=ntt0j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.195 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:21 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
57
x-xss-protection
0
x-response-time
113
pragma
no-cache
last-modified
Sat, 25 Jul 2020 13:31:21 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
application/javascript;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
dd5b05cde19b4de8bde1c48d30c0676c
x-transaction
0017d2dc00d8a0e1
expires
Tue, 31 Mar 1981 05:00:00 GMT
anchor
www.google.com/recaptcha/api2/ Frame EC44
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&theme=standard&size=normal&cb=b148s414nukk
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-bHaba/ftQmEIUQd3aTYyEg' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&theme=standard&size=normal&cb=b148s414nukk
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 25 Jul 2020 13:31:21 GMT
content-security-policy
script-src 'report-sample' 'nonce-bHaba/ftQmEIUQd3aTYyEg' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
10391
server
GSE
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
/
graph.facebook.com/
110 B
522 B
XHR
General
Full URL
https://graph.facebook.com/?id=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:800e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
232411ca9ae89a21d83595cee9813359600154cf7db9f5770b1e22f53b7b9995
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload
etag
"cda67678ddd451cce7c30edd06822a4ee89eacb1"
status
200
x-fb-rev
1002419886
alt-svc
h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
110
pragma
no-cache
x-fb-debug
bCkbym9zK4XvUc+C8chwZJMxQq5wVoZb62dThHGAB4QBiDCHLra+qZH2RgGuzbY15nBbiFymoEAti+QkGaqfcw==
x-fb-trace-id
AQHmpXRCBhj
date
Sat, 25 Jul 2020 13:31:21 GMT
content-type
application/json
access-control-allow-origin
*
x-fb-request-id
A0VTvpBTyYUEcBpfpfG1owz
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v3.0
expires
Sat, 01 Jan 2000 00:00:00 GMT
share
www.linkedin.com/countserv/count/
0
0
Script
General
Full URL
https://www.linkedin.com/countserv/count/share?url=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&format=jsonp&callback=jQuery112406893978556675062_1595683880461&_=1595683880462
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:21::14 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

info.json
www.reddit.com/api/
102 B
1 KB
XHR
General
Full URL
https://www.reddit.com/api/info.json?url=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.53.140 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
snooserv /
Resource Hash
f4f2c0a4763f01ee2b13b4f8189e6fd5f32bd704d71fed8d0f11883de9724198
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:21 GMT
via
1.1 varnish
x-content-type-options
nosniff
x-cache
MISS
status
200
content-length
102
x-xss-protection
1; mode=block
x-served-by
cache-man4124-MAN
x-moose
majestic
expires
-1
server
snooserv
x-timer
S1595683882.515904,VS0,VE161
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
X-Moose
cache-control
private, s-maxage=0, max-age=0, must-revalidate, no-store, max-age=0, must-revalidate
x-ua-compatible
IE=edge
accept-ranges
bytes
x-cache-hits
0
anchor
www.google.com/recaptcha/api2/ Frame ED4C
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&theme=light&size=normal&cb=ckj578t8cw3q
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-iDdswlpqf13oGv6ZAXwc5A' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/anchor?ar=1&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&theme=light&size=normal&cb=ckj578t8cw3q
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 25 Jul 2020 13:31:21 GMT
content-security-policy
script-src 'report-sample' 'nonce-iDdswlpqf13oGv6ZAXwc5A' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
10516
server
GSE
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
w_640_000.ts
video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/ Frame 642B
307 KB
307 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/w_640_000.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
f603a089c9e5601d169903db787d29fc049a3a287dd40ad03900dc02745fcaeb

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:19 GMT
Last-Modified
Tue, 20 Aug 2019 08:43:53 GMT
Server
Tengine
ETag
"5d5bb2c9-4ca68"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Sat, 01 Aug 2020 13:31:19 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
313960
X-Proxy-Cache
HIT
571bff7d-e6fa-4c6f-b136-e54b84a8777d
https://threatpost.com/ Frame 642B
63 KB
0
Other
General
Full URL
blob:https://threatpost.com/571bff7d-e6fa-4c6f-b136-e54b84a8777d
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e1c3c2dafe2208caea4f809f414a89a9d256deb8671e1c5d49bff9a873782796

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Length
64352
Content-Type
text/javascript
bl-cc9018f-8cdfc568.js
tagan.adlightning.com/math-aids-threatpost/ Frame 03AB
62 KB
18 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.71 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1f3d486ddbb9dda160529fdf0d8a6f4c1e77024078294664fb0456e9b33ba648

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 24 Jul 2020 17:22:10 GMT
content-encoding
gzip
age
72552
x-cache
Hit from cloudfront
status
200
content-length
18264
x-amz-meta-git_commit
cc9018f
last-modified
Fri, 24 Jul 2020 17:20:50 GMT
server
AmazonS3
etag
"35c351702648e8545a61bf940b50fb5c"
x-amz-version-id
YqdsBXP6TUW_8NLIciYdX4aAa4RYWjap
via
1.1 6080b2713e502211e152f21f5c59c5a7.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
lNnNqATUY6ZRdbQhwYzyJnrY5v8cbCQ2rtftTeNVRqWYCmrzc3fHuw==
b-cc9018f-2cba83b0.js
tagan.adlightning.com/math-aids-threatpost/ Frame 03AB
58 KB
20 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-cc9018f-2cba83b0.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.71 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
92814e48e334fb45bb8d9d0d2a6e68a1e601fd7ce63d25c10969cfd57bf4b1e8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 07 Jul 2020 18:05:52 GMT
content-encoding
gzip
age
1538730
x-cache
Hit from cloudfront
status
200
content-length
19746
x-amz-meta-git_commit
cc9018f
last-modified
Tue, 07 Jul 2020 17:59:39 GMT
server
AmazonS3
etag
"21fe90f3aceeb46480a69949d763c756"
x-amz-version-id
KDx1ypMRqiob.YrLSDtIdsXad7Sl2JS5
via
1.1 6080b2713e502211e152f21f5c59c5a7.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
iK_RFU6tW5-eMBH-wore_iMKxRixMm9fKaICNSrBbZCuxTxfkLzWpQ==
bframe
www.google.com/recaptcha/api2/ Frame D163
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/bframe?hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=qzq9yawqi2uq
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-2Gf1RmNPVlPkOTN+uTMEEQ' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/bframe?hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=qzq9yawqi2uq
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 25 Jul 2020 13:31:21 GMT
content-security-policy
script-src 'report-sample' 'nonce-2Gf1RmNPVlPkOTN+uTMEEQ' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
1177
server
GSE
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
bl-cc9018f-8cdfc568.js
tagan.adlightning.com/math-aids-threatpost/ Frame 2805
62 KB
18 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.71 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1f3d486ddbb9dda160529fdf0d8a6f4c1e77024078294664fb0456e9b33ba648

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 24 Jul 2020 17:22:10 GMT
content-encoding
gzip
age
72552
x-cache
Hit from cloudfront
status
200
content-length
18264
x-amz-meta-git_commit
cc9018f
last-modified
Fri, 24 Jul 2020 17:20:50 GMT
server
AmazonS3
etag
"35c351702648e8545a61bf940b50fb5c"
x-amz-version-id
YqdsBXP6TUW_8NLIciYdX4aAa4RYWjap
via
1.1 6080b2713e502211e152f21f5c59c5a7.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
9-wVJXB5Du-AMe5X_M5VHwNfdPOVLnnQoTBL7yto-IAWcdj4S9l4ew==
b-cc9018f-2cba83b0.js
tagan.adlightning.com/math-aids-threatpost/ Frame 2805
58 KB
20 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-cc9018f-2cba83b0.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.71 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
92814e48e334fb45bb8d9d0d2a6e68a1e601fd7ce63d25c10969cfd57bf4b1e8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 07 Jul 2020 18:05:52 GMT
content-encoding
gzip
age
1538730
x-cache
Hit from cloudfront
status
200
content-length
19746
x-amz-meta-git_commit
cc9018f
last-modified
Tue, 07 Jul 2020 17:59:39 GMT
server
AmazonS3
etag
"21fe90f3aceeb46480a69949d763c756"
x-amz-version-id
KDx1ypMRqiob.YrLSDtIdsXad7Sl2JS5
via
1.1 6080b2713e502211e152f21f5c59c5a7.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
40bV4cWiZEy5KIiNgnfUY5UX5l4kn37A_W7mcgcuxZbtjr6StFFi-w==
bl-cc9018f-8cdfc568.js
tagan.adlightning.com/math-aids-threatpost/ Frame 7A3B
62 KB
18 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.71 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1f3d486ddbb9dda160529fdf0d8a6f4c1e77024078294664fb0456e9b33ba648

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 24 Jul 2020 17:22:10 GMT
content-encoding
gzip
age
72552
x-cache
Hit from cloudfront
status
200
content-length
18264
x-amz-meta-git_commit
cc9018f
last-modified
Fri, 24 Jul 2020 17:20:50 GMT
server
AmazonS3
etag
"35c351702648e8545a61bf940b50fb5c"
x-amz-version-id
YqdsBXP6TUW_8NLIciYdX4aAa4RYWjap
via
1.1 6080b2713e502211e152f21f5c59c5a7.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
XiKLKJ24b0luT0lUrSj5NXTxkA-fz58UFvq4CWERj6RdTtp7_gua1g==
b-cc9018f-2cba83b0.js
tagan.adlightning.com/math-aids-threatpost/ Frame 7A3B
58 KB
20 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-cc9018f-2cba83b0.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.71 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
92814e48e334fb45bb8d9d0d2a6e68a1e601fd7ce63d25c10969cfd57bf4b1e8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 07 Jul 2020 18:05:52 GMT
content-encoding
gzip
age
1538730
x-cache
Hit from cloudfront
status
200
content-length
19746
x-amz-meta-git_commit
cc9018f
last-modified
Tue, 07 Jul 2020 17:59:39 GMT
server
AmazonS3
etag
"21fe90f3aceeb46480a69949d763c756"
x-amz-version-id
KDx1ypMRqiob.YrLSDtIdsXad7Sl2JS5
via
1.1 6080b2713e502211e152f21f5c59c5a7.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
BEK2y6QcrIluuG6DdFAc4qLj5t3UoKuFj4k09To7jephAPRiGRsmCA==
bl-cc9018f-8cdfc568.js
tagan.adlightning.com/math-aids-threatpost/ Frame 6F70
62 KB
18 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-cc9018f-8cdfc568.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.71 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1f3d486ddbb9dda160529fdf0d8a6f4c1e77024078294664fb0456e9b33ba648

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 24 Jul 2020 17:22:10 GMT
content-encoding
gzip
age
72552
x-cache
Hit from cloudfront
status
200
content-length
18264
x-amz-meta-git_commit
cc9018f
last-modified
Fri, 24 Jul 2020 17:20:50 GMT
server
AmazonS3
etag
"35c351702648e8545a61bf940b50fb5c"
x-amz-version-id
YqdsBXP6TUW_8NLIciYdX4aAa4RYWjap
via
1.1 6080b2713e502211e152f21f5c59c5a7.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
KRYqwHcKgrhT5YiasteHd8gB4oAYPSz-91y8crxAFs9P2BNkMLTV4g==
b-cc9018f-2cba83b0.js
tagan.adlightning.com/math-aids-threatpost/ Frame 6F70
58 KB
20 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-cc9018f-2cba83b0.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.201.71 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
92814e48e334fb45bb8d9d0d2a6e68a1e601fd7ce63d25c10969cfd57bf4b1e8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 07 Jul 2020 18:05:52 GMT
content-encoding
gzip
age
1538730
x-cache
Hit from cloudfront
status
200
content-length
19746
x-amz-meta-git_commit
cc9018f
last-modified
Tue, 07 Jul 2020 17:59:39 GMT
server
AmazonS3
etag
"21fe90f3aceeb46480a69949d763c756"
x-amz-version-id
KDx1ypMRqiob.YrLSDtIdsXad7Sl2JS5
via
1.1 6080b2713e502211e152f21f5c59c5a7.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
FE5PEAgRLkkD4Oe725CJDK47ifHXg9yqhw2j9Qpb_vjD_j2BdhXKWw==
avjp
teachingaids-d.openx.net/v/1.0/ Frame 642B
92 B
286 B
XHR
General
Full URL
https://teachingaids-d.openx.net/v/1.0/avjp?ju=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&ch=UTF-8&res=1600x1200x24&ifr=true&tz=-120&tws=1600x1200&be=1&bc=hb_pb_3.0.2&dddid=0db73a4b-6b0c-4040-b861-77f115c3bfc6&nocache=1595683882017&gdpr_consent=&gdpr=1&schain=1.0,1!admetricspro.com,1005,1,,,&skip=1&auid=540882778&vwd=320&vht=180
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.244.159.8 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
OXGW/16.190.0 /
Resource Hash
004e5faf0bf890f61697daeede9f21826affd1137fb2cb58eaf4719937a04a14

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:22 GMT
via
1.1 google
server
OXGW/16.190.0
status
200
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
92
expires
Mon, 26 Jul 1997 05:00:00 GMT
translator
hbopenbid.pubmatic.com/ Frame 642B
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Sat, 25 Jul 2020 13:31:21 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
prebid
ib.adnxs.com/ut/v3/ Frame 642B
19 B
710 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.221.50 , Netherlands, ASN29990 (ASN-APPNEX, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
0c09c070833c786cb25be38bc30992b30bad578f817dbc9e34beacd8b8ea44c5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:22 GMT
X-Proxy-Origin
82.102.19.136; 82.102.19.136; 728.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.146:80
AN-X-Request-Uuid
8c4e07d6-7da5-4222-86a2-820dfeae0176
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
19
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
cygnus
as-sec.casalemedia.com/ Frame 642B
25 B
988 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=435870&v=8.1&r={%22id%22:%221116552773d39dc%22,%22imp%22:[{%22id%22:%221225afc54892519%22,%22ext%22:{%22siteID%22:%22435870%22,%22sid%22:%22320x180%22},%22bidfloor%22:2,%22bidfloorcur%22:%22USD%22,%22video%22:{%22mimes%22:[%22video/mp4%22,%22application/javascript%22],%22minduration%22:1,%22maxduration%22:200,%22api%22:[1,2],%22protocols%22:[1,2,3,4,5,6],%22linearity%22:1,%22startdelay%22:0,%22skip%22:1,%22w%22:320,%22h%22:180,%22placement%22:1}},{%22id%22:%22137cf1569e175aa%22,%22ext%22:{%22siteID%22:%22435871%22,%22sid%22:%22320x180%22},%22bidfloor%22:2,%22bidfloorcur%22:%22USD%22,%22video%22:{%22mimes%22:[%22video/mp4%22,%22application/javascript%22],%22minduration%22:1,%22maxduration%22:200,%22api%22:[1,2],%22protocols%22:[1,2,3,4,5,6],%22linearity%22:1,%22startdelay%22:0,%22skip%22:1,%22w%22:320,%22h%22:180,%22placement%22:1}}],%22site%22:{%22ref%22:%22https://t.co/X0ukaAEsUs%22,%22page%22:%22https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F%22},%22ext%22:{%22source%22:%22prebid%22},%22source%22:{%22ext%22:{%22schain%22:{%22ver%22:%221.0%22,%22complete%22:1,%22nodes%22:[{%22asi%22:%22admetricspro.com%22,%22sid%22:%221005%22,%22hp%22:1}]}}},%22regs%22:{%22ext%22:{%22gdpr%22:1}},%22user%22:{%22ext%22:{%22consent%22:%22%22}}}&ac=j&sd=1&nf=1
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.254.129 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache /
Resource Hash
3eae8416a1a1053ed91c483d9e7b2120943b2295dea89b6aec9ddf56d0fdf0b6

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:22 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
45
Expires
Sat, 25 Jul 2020 13:31:22 GMT
openrtb
ads.adaptv.advertising.com/rtb/ Frame 642B
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=TeachingAidsLLC
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.185.185.10 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

access-control-allow-origin
https://threatpost.com
access-control-allow-credentials
true
server
adaptv/1.0
Connection
keep-alive
content-length
0
content-type
application/json
liveView.php
live.sekindo.com/live/ Frame 27FE
43 B
463 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=6&serverTime=1595683881&s=58057&sta=12381395&x=320&y=180&msta=12348808&vid_vastType=3&vid_viewabilityState=1&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20content_VE%20%2F%201%20%2F%20default&isApp=0&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&csuuid=5f1c3428aed92&rvn=${VP_RVN_MACRO}&attemptMultiplier=10&contentFileId=0&mediaPlayListId=0&playerVer=3.0.0&cbuster=1595683882009&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=&uid=SekindoSPlayer5f1c3428d9783&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&floatStatus=true
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
42b976597a2d977d0e300f6d06bc903db389e5c112d33c1c8c249690a522d9f2

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:21 GMT
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000
Content-Disposition
inline; filename="pixel.gif"
Content-Type
image/gif
Expires
Thu, 31 Dec 2037 23:55:55 GMT
amp4ads-v0.js
cdn.ampproject.org/rtv/032007210634000/ Frame 03AB
206 KB
57 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f14d0b5bdba6df0ce559261f0a5dae89e6def28580f94e3689a8753b9dca0bd7
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126792
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57397
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:18:10 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"4f0584f1caea2f79"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:18:10 GMT
amp-ad-exit-0.1.js
cdn.ampproject.org/rtv/032007210634000/v0/ Frame 03AB
16 KB
6 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/v0/amp-ad-exit-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
66f14ced94dbd60cb3c1f8fc74f67f01d05b4cbeee93c877a2e86ad31847eb44
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126830
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5902
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:17:32 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"ed761c4f9176d72d"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:17:32 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/032007210634000/v0/ Frame 03AB
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/v0/amp-analytics-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
fb199303a3c6c4ec7d96d3135a9798cf63f52e829aba12d2ae8c30f01425281a
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126820
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29699
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:17:42 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"ff583ae049a1bccf"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:17:42 GMT
amp-fit-text-0.1.js
cdn.ampproject.org/rtv/032007210634000/v0/ Frame 03AB
4 KB
2 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/v0/amp-fit-text-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
360a25e0b7ac5376a0c319d1eac76df31ffcce5b82faa2f3a0b3ef70f370d151
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126801
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1786
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:18:01 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"fe8a226332f994d7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:18:01 GMT
amp-form-0.1.js
cdn.ampproject.org/rtv/032007210634000/v0/ Frame 03AB
48 KB
15 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/v0/amp-form-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0847fb2a4b12a2cfd5b8775ebf0a1ca59c1d8c34894ee2f3f26e827969f39567
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126828
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15001
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:17:34 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"f044ff03265d7aa3"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:17:34 GMT
13935446593836661808
tpc.googlesyndication.com/simgad/ Frame 03AB
40 KB
40 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/13935446593836661808?sqp=4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4&rs=AOga4qk_BRenaGYz-jize-8OGT1GyIuzAg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
75043ec312d78915a013c1eeac64a7727d8be6e1b59a8b71574c620c2e01a60c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 16 Jul 2020 02:23:00 GMT
x-content-type-options
nosniff
last-modified
Thu, 10 Oct 2019 19:49:54 GMT
server
sffe
age
817702
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
40771
x-xss-protection
0
expires
Fri, 16 Jul 2021 02:23:00 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 03AB
2 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:08:58 GMT
x-content-type-options
nosniff
server
cafe
age
8544
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Sun, 26 Jul 2020 11:08:58 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 03AB
295 B
398 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 08:18:35 GMT
x-content-type-options
nosniff
server
cafe
age
18767
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Sun, 26 Jul 2020 08:18:35 GMT
B23768030.267046029;dc_pre=CK-t5NfB6OoCFfbQuwgdfoUASg;dc_trk_aid=461813821;dc_trk_cid=106332843;ord=351815005;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=
ad.doubleclick.net/ddm/trackimp/N790339.3167285ADWORDSGDN/ Frame 03AB
Redirect Chain
  • https://ad.doubleclick.net/ddm/trackimp/N790339.3167285ADWORDSGDN/B23768030.267046029;dc_trk_aid=461813821;dc_trk_cid=106332843;ord=351815005;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=?
  • https://ad.doubleclick.net/ddm/trackimp/N790339.3167285ADWORDSGDN/B23768030.267046029;dc_pre=CK-t5NfB6OoCFfbQuwgdfoUASg;dc_trk_aid=461813821;dc_trk_cid=106332843;ord=351815005;dc_lat=;dc_rdid=;tag_...
42 B
337 B
Image
General
Full URL
https://ad.doubleclick.net/ddm/trackimp/N790339.3167285ADWORDSGDN/B23768030.267046029;dc_pre=CK-t5NfB6OoCFfbQuwgdfoUASg;dc_trk_aid=461813821;dc_trk_cid=106332843;ord=351815005;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=?
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.205.230 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:22 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:22 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
302
content-type
text/html; charset=UTF-8
location
https://ad.doubleclick.net/ddm/trackimp/N790339.3167285ADWORDSGDN/B23768030.267046029;dc_pre=CK-t5NfB6OoCFfbQuwgdfoUASg;dc_trk_aid=461813821;dc_trk_cid=106332843;ord=351815005;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=?
cache-control
no-cache, must-revalidate
follow-only-when-prerender-shown
1
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
adview
securepubads.g.doubleclick.net/pagead/ Frame 03AB
0
0
Image
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CgBlWKTQcX_CoELS4lQfqipPYC47Cj6leqOuCh6QLn93H1JMOEAEg0YfSIGC56L6A1AGgAe_1jtsDyAEC4AIAqAMByAMIqgS1Ak_QgvmlJar1hdrgNnzHrxnEQWrzf_22-IapMDOM-yd3PmAzoeIupoCoaQSXgcNfxH5_Qrb5U8cGP_fiZIkn4k4yWPAS9dg9rLatk-0-8o0u88h3rjdMCEq1fXeBvY-pevpSt8umg8ETNPpae_KkhjHnX3LrjC9gOfI1piAWkQZ-j7LucaCITiAT-FmBZiyu30VH0z1ycm25KCj0JVlv9mgvWVMQrHZoRy4fal6vPOKWB5V1OAoB2nlSZZH8ZwRD3XIm6rv2tBiEmYtksJbDpTc4az4ZVCF2hjRLfHmh7wdxUHzjPp3xKD7a1EXCEjA0duyKP9Yd24en4xtTeRTBI5Eqk7jcIhfhsskE1-SoSZw3ybL6jZti5_f6Ac-UfRlkKNKd5tB_KwTNrYnnXG2H2FRLadOWpcAE-f_-2bkC4AQBkgUECAQYAZIFBAgFGASgBgKAB562mymoB47OG6gH1ckbqAeT2BuoB7oGqAfw2RuoB_LZG6gHpr4bqAfs1RvYBwHyBwQQi-Yc0ggJCIDhgFAQARgd8ggbYWR4LXN1YnN5bi03MjYzNTczNDQ2ODA0MDc4gAoDyAsB2BMM&sigh=6bToGZG7oxk&tpd=AGWhJmswcgp0mkah6gKhgWt4Ot6SsDjmuo-_nylzWEPB__XjnA
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

truncated
/ Frame 03AB
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
935f5705c95b587f18d16bce97e4647851f536549d720e37e2adee5df8aa92d7

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
bframe
www.google.com/recaptcha/api2/ Frame A1CD
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/bframe?hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&cb=ya9al3gyzv6j
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-BmBrHz/9FIBg7F6AwreCCw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/bframe?hl=en&v=r8WWNwsCvXtk22_oRSVCCZx9&k=6LehhAETAAAAAAcsm2ZGDsLCqyGhesy4Yn43WNBe&cb=ya9al3gyzv6j
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Sat, 25 Jul 2020 13:31:22 GMT
content-security-policy
script-src 'report-sample' 'nonce-BmBrHz/9FIBg7F6AwreCCw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
1173
server
GSE
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
amp4ads-v0.js
cdn.ampproject.org/rtv/032007210634000/ Frame 7A3B
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f14d0b5bdba6df0ce559261f0a5dae89e6def28580f94e3689a8753b9dca0bd7
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126792
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57397
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:18:10 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"4f0584f1caea2f79"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:18:10 GMT
amp-ad-exit-0.1.js
cdn.ampproject.org/rtv/032007210634000/v0/ Frame 7A3B
16 KB
6 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/v0/amp-ad-exit-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
66f14ced94dbd60cb3c1f8fc74f67f01d05b4cbeee93c877a2e86ad31847eb44
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126830
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5902
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:17:32 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"ed761c4f9176d72d"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:17:32 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/032007210634000/v0/ Frame 7A3B
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/v0/amp-analytics-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
fb199303a3c6c4ec7d96d3135a9798cf63f52e829aba12d2ae8c30f01425281a
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126820
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29699
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:17:42 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"ff583ae049a1bccf"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:17:42 GMT
amp-fit-text-0.1.js
cdn.ampproject.org/rtv/032007210634000/v0/ Frame 7A3B
4 KB
2 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/v0/amp-fit-text-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
360a25e0b7ac5376a0c319d1eac76df31ffcce5b82faa2f3a0b3ef70f370d151
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126801
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1786
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:18:01 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"fe8a226332f994d7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:18:01 GMT
amp-form-0.1.js
cdn.ampproject.org/rtv/032007210634000/v0/ Frame 7A3B
48 KB
15 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/v0/amp-form-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0847fb2a4b12a2cfd5b8775ebf0a1ca59c1d8c34894ee2f3f26e827969f39567
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126828
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15001
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:17:34 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"f044ff03265d7aa3"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:17:34 GMT
css
fonts.googleapis.com/ Frame 7A3B
7 KB
801 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto:300|Roboto:400,500&lang=en
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
d3838febe02ee1538a1336ac01f452a6fe7682106cd21b46cda9c40092c8e3aa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 12:26:23 GMT
server
ESF
date
Sat, 25 Jul 2020 13:31:22 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 25 Jul 2020 13:31:22 GMT
css
fonts.googleapis.com/ Frame 7A3B
5 KB
761 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto:400,500&text=
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
c4a7b4babd8d76af2ddc0840bda733cd5a0b409895bb74d5302ff1155c9b32bc
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 12:23:56 GMT
server
ESF
date
Sat, 25 Jul 2020 13:31:22 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 25 Jul 2020 13:31:22 GMT
downsize_200k_v1
tpc.googlesyndication.com/simgad/7649387453454762384/ Frame 7A3B
19 KB
19 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7649387453454762384/downsize_200k_v1?sqp=4sqPyQSWAUKTAQgAEhQNzczMPhUAAABAHQAAAAAlAAAAABgAIgoNAACAPxUAAIA_Kk8IWhABHQAAtEIgASgBMAY4A0CAwtcvSABQAFgAYFpwAngAgAEAiAEAkAEAnQEAAIA_oAEAqAEAsAGAreIEuAH___________8BxQEtsp0-MhoIqgIQqgIYASABLQAAAD8wqgI4qgJFAACAPw&rs=AOga4qnHX7cTHDIqQjqjMZgXl-eLwUU_Xg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
56941e81f565d4d620f22db67d1827dc2d9b7f343d95a81b53e463ce889a751f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 14 Jul 2020 16:50:43 GMT
x-content-type-options
nosniff
last-modified
Mon, 03 Dec 2018 12:36:05 GMT
server
sffe
age
938439
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19298
x-xss-protection
0
expires
Wed, 14 Jul 2021 16:50:43 GMT
downsize_200k_v1
tpc.googlesyndication.com/simgad/3877746513440416934/ Frame 7A3B
20 KB
20 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/3877746513440416934/downsize_200k_v1?sqp=4sqPyQSLAUKIAQgAEhQNzczMPhUAAABAHQAAAAAlAAAAABgAIgoNAACAPxUAAIA_Kk8IWhABHQAAtEIgASgBMAY4A0CAwtcvSABQAFgAYFpwAngAgAEAiAEAkAEAnQEAAIA_oAEAqAEAsAGAreIEuAH___________8BxQEtsp0-Mg8I2AQQ2AQYASABLQAAAD8&rs=AOga4qksKIynAg0yoSr3rrxJ7kyqyAGaMA
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
189a505c18811b5c6e9b69dccdd462d6441618eb611fae7449ddc22efd51ea8e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 04:10:30 GMT
x-content-type-options
nosniff
last-modified
Mon, 26 Nov 2018 12:05:13 GMT
server
sffe
age
206452
status
200
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
20239
x-xss-protection
0
expires
Fri, 23 Jul 2021 04:10:30 GMT
adview
securepubads.g.doubleclick.net/pagead/ Frame 7A3B
0
0
Image
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CYmRTKTQcX_KoELS4lQfqipPYC-Dbq61ejYas780L3f7whMkWEAEg0YfSIGC56L6A1AGgAYmys8wDyAEG4AIAqAMByAMKqgS3Ak_QChERmeO2HrZvilE8tSEnShkJgn723RmQoRBUhGUmxAa46kZM1iq-yTSRDz_bcY0ny-s0_vZDruXkShJLEhjVk_cEbe5oMNlptfWgKX4jEQjRpMoVyO-Lb0Szdk6EcYqlLRQpeDpnBhZx5e8AVhJdmMv0l2CPvGcWueOogT4oVMyR3tozufOz9zzwK_0rzJkVa2OGDggMcO-n4HU5gWIw4Fvmju4Qghgwvj9lWeoOEc56uMUh9HmDTlWFCCNaVcBG6BIIwIqpnIhn6wgtVyG3q0nawY7qpHki09uMXlM6Vq_zgBDeKQUvThpUcLEcAAPhaSUSXRobbLsEoYAkBnj85VzlL_NFfI2aKRF3AbBFDgvi-ezs1i-QSm_dyETzKyf6ae6v2RTEhDY3iRDIQY1tci3YmxB1wATMoOP83gLgBAGSBQQIBBgBkgUECAUYBKAGN4AH383MM6gHjs4bqAfVyRuoB5PYG6gHugaoB_DZG6gH8tkbqAemvhuoB-zVG9gHAfIHBBDV8TDSCAkIgOGAUBABGB3yCBthZHgtc3Vic3luLTcyNjM1NzM0NDY4MDQwNziACgPICwHYEw0&sigh=ngXkbaXQnDc&template_id=492&tpd=AGWhJmtCyRJzmT3_BCkuPTb5g24J-LIb7JfUNlZmveUTgCbOag
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 7A3B
2 KB
2 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:08:58 GMT
x-content-type-options
nosniff
server
cafe
age
8544
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Sun, 26 Jul 2020 11:08:58 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 7A3B
295 B
352 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 08:18:35 GMT
x-content-type-options
nosniff
server
cafe
age
18767
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Sun, 26 Jul 2020 08:18:35 GMT
truncated
/ Frame 7A3B
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4cf6c357601d2aa50bc7cf1d72a87e1f303e1c85e5d5a33bd9eeac6117212386

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/032007210634000/ Frame 2805
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f14d0b5bdba6df0ce559261f0a5dae89e6def28580f94e3689a8753b9dca0bd7
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126792
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57397
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:18:10 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"4f0584f1caea2f79"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:18:10 GMT
amp-ad-exit-0.1.js
cdn.ampproject.org/rtv/032007210634000/v0/ Frame 2805
16 KB
6 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/v0/amp-ad-exit-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
66f14ced94dbd60cb3c1f8fc74f67f01d05b4cbeee93c877a2e86ad31847eb44
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126830
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5902
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:17:32 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"ed761c4f9176d72d"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:17:32 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/032007210634000/v0/ Frame 2805
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/v0/amp-analytics-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
fb199303a3c6c4ec7d96d3135a9798cf63f52e829aba12d2ae8c30f01425281a
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126820
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29699
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:17:42 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"ff583ae049a1bccf"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:17:42 GMT
amp-fit-text-0.1.js
cdn.ampproject.org/rtv/032007210634000/v0/ Frame 2805
4 KB
2 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/v0/amp-fit-text-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
360a25e0b7ac5376a0c319d1eac76df31ffcce5b82faa2f3a0b3ef70f370d151
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126801
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1786
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:18:01 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"fe8a226332f994d7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:18:01 GMT
amp-form-0.1.js
cdn.ampproject.org/rtv/032007210634000/v0/ Frame 2805
48 KB
15 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/032007210634000/v0/amp-form-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0847fb2a4b12a2cfd5b8775ebf0a1ca59c1d8c34894ee2f3f26e827969f39567
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
126828
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15001
x-xss-protection
0
server
sffe
date
Fri, 24 Jul 2020 02:17:34 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"f044ff03265d7aa3"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 24 Jul 2021 02:17:34 GMT
css
fonts.googleapis.com/ Frame 2805
7 KB
801 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto:300|Roboto:400,500&lang=nl
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
d3838febe02ee1538a1336ac01f452a6fe7682106cd21b46cda9c40092c8e3aa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 12:28:58 GMT
server
ESF
date
Sat, 25 Jul 2020 13:31:22 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 25 Jul 2020 13:31:22 GMT
css
fonts.googleapis.com/ Frame 2805
5 KB
738 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto:400,500&text=
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
c4a7b4babd8d76af2ddc0840bda733cd5a0b409895bb74d5302ff1155c9b32bc
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 12:32:45 GMT
server
ESF
date
Sat, 25 Jul 2020 13:31:22 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 25 Jul 2020 13:31:22 GMT
downsize_200k_v1
tpc.googlesyndication.com/simgad/10214513565465652591/ Frame 2805
18 KB
18 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/10214513565465652591/downsize_200k_v1?sqp=4sqPyQSWAUKTAQgAEhQNzczMPhUAAABAHQAAAAAlAAAAABgAIgoNAACAPxUAAIA_Kk8IWhABHQAAtEIgASgBMAY4A0CAwtcvSABQAFgAYFpwAngAgAEAiAEAkAEAnQEAAIA_oAEAqAEAsAGAreIEuAH___________8BxQEtsp0-MhoIzgIQrwEYASABLQAAAD8wzgI4rwFFAACAPw&rs=AOga4qkj_VvkJI7FPYgSls7WQgZVV4bABg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7b02d1e08863a122a6790e5f55d8c4f96d14feeb9e52eeadbf1a7e7d63a77e5d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:22 GMT
x-content-type-options
nosniff
last-modified
Tue, 26 May 2020 12:28:24 GMT
server
sffe
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18676
x-xss-protection
0
expires
Sun, 25 Jul 2021 13:31:22 GMT
downsize_200k_v1
tpc.googlesyndication.com/simgad/5515576643607546668/ Frame 2805
2 KB
2 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/5515576643607546668/downsize_200k_v1?sqp=4sqPyQR5QncIABIUDc3MzD4VAAAAQB0AAAAAJQAAAAAYACIKDQAAgD8VAACAPypPCFoQAR0AALRCIAEoATAGOANAgMLXL0gAUABYAGBacAJ4AIABAIgBAJABAJ0BAACAP6ABAKgBALABgK3iBLgB____________AcUBLbKdPg&rs=AOga4qkUMp0JksxWiX9I5mZCojG-ITcmFg
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
03d9c997f9e46127bb632131416ff09aa73c5f1e95635f049fd41fa4d2290903
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 22 Jul 2020 16:02:41 GMT
x-content-type-options
nosniff
last-modified
Fri, 08 Feb 2019 12:19:56 GMT
server
sffe
age
250121
status
200
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2403
x-xss-protection
0
expires
Thu, 22 Jul 2021 16:02:41 GMT
adview
securepubads.g.doubleclick.net/pagead/ Frame 2805
0
0
Image
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CbAAsKTQcX_GoELS4lQfqipPYC6S0rOlcsdegw-gLpr3duK4WEAEg0YfSIGC56L6A1AGgAcbV-bcDyAEGqQLNRzx1X46zPuACAKgDAcgDCqoEtgJP0BbXNi7go1aJmwfsSunObBtVbkDx0qU9oD3vq9qiSsFE3mS0oW8EITbJjwenIg5fQQudUEBGsO9HV7qhwcKThAkFhNXoB3nIApaJIT1nThiFuMxdX2O8t53trMO-iieCX5_EMtsTyHNGEZcAR8HCqB70zDjEkXSSZNfe0FuPL_eBxYnciLQkBJDlMmH84TMPtwDPvjzT7455lBtLsJPJrQYdUHQXj4DddSQdUi7KyGNvR6IgnbH0yWzEdpu4xy6-e99GQ2yhCMenyksMGouG7C1zzaqoW18x_SS0M5UR6zBddH9BXlOL4HoQSgIfXjdo2XdlDYrvoJuBtOpiRunVM8aFer_H9Q-015x38-GpEubusbbHOh9RaRA4Io9LbKDyYtGUGA16ppWrVMJGEQFVuvN2-ZIgwATar4CmdOAEAZIFBAgEGAGSBQQIBRgEoAY3gAeiqoZIqAeOzhuoB9XJG6gHk9gbqAe6BqgH8NkbqAfy2RuoB6a-G6gH7NUb2AcB8gcEELbcFdIICQiA4YBQEAEYHfIIG2FkeC1zdWJzeW4tNzI2MzU3MzQ0NjgwNDA3OIAKA8gLAdgTDYgUAg&sigh=T4FElw_nMik&template_id=492&tpd=AGWhJmsOXfoOChph9tfyL2l57YIulJB0hlQvUn2hf5GNlj0VcA
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 2805
2 KB
2 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:08:58 GMT
x-content-type-options
nosniff
server
cafe
age
8544
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Sun, 26 Jul 2020 11:08:58 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 2805
295 B
352 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 08:18:35 GMT
x-content-type-options
nosniff
server
cafe
age
18767
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Sun, 26 Jul 2020 08:18:35 GMT
l
www.google.com/ads/measurement/ Frame 2805
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaQuwWtMMMFtmCA8RXkw9dy_8w-hhuHHoDcdtgnmuWT6unZnnXxjzTaowjpMjdIXK6LuB0Kt
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

truncated
/ Frame 2805
211 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c7a517a3ee1d9f1fff509e8c02563d44d6f1b3a0a38a244eadc14d2d915d3681

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/012007102309000/ Frame 6F70
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1d719a7b7ef17ad476a644a196c6130ed955f5ab06f7bac34632f44d4772bfe5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16066
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57400
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:03:36 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"83969d63ffc70a02"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:03:36 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012007102309000/v0/ Frame 6F70
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/v0/amp-analytics-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16063
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:03:39 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:03:39 GMT
7464639028652035684
tpc.googlesyndication.com/simgad/ Frame 6F70
330 B
466 B
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7464639028652035684
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f19e7ee6cdf20bd478c037707c447b7cd469051de4dadeac32a795efb463c2e2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 10 Jun 2020 14:30:09 GMT
x-content-type-options
nosniff
age
3884473
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
330
x-xss-protection
0
last-modified
Tue, 28 Jan 2020 23:02:00 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 10 Jun 2021 14:30:09 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 6F70
0
283 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstYLaZYezlP2wOU-CSHvvAuMt0EKcmMqrm1hi8yUixjWBhMa0rHfTuYR71MOwutE6n9UwT5gN3WNrFVuLtkbPka4Bo2-CBFTkPueeOXaTtX-0o8Br0FhEbu_OvRqWLg7TjUHSssBLSw3qpcUq5fTEe4VMe10i5aUu3cAB7q9ktQDGUV0-GZ4y3wWlBKCjBJnYG_EEktddfMyrshEXQBkGPOyUn3DFPfHD1JNMK8U1g1kmoQoHGzr3eIW-JpDkDR9VT35CLZHB4O4gGAG8aFgg&sai=AMfl-YTIv403mRXGzqRIEYYUrnl49RlUU0CPypzqbXVNAwhFscNC2ANvjst8CSTzxywgEzQoUhRNf_i3cEvKyO8AqAp9Z_T3z8Xb6ndUW5B3mrpzhiLklUkbp0IwI42aFGw&sig=Cg0ArKJSzC5xYOLGUIC0EAE&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:31:22 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 25 Jul 2020 13:31:22 GMT
l
www.google.com/ads/measurement/ Frame 6F70
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaQBGAgXoEv7kIni9agvYbzqSK2c0Avti2kOXpo-VpOD3AOC6HwUzzzX2G8s_r_8pJ895Cvp
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

truncated
/ Frame 6F70
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
046a04569720b325fd7c34372718195a3adaab492082547642ea40b5bdafadc5

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
translator
hbopenbid.pubmatic.com/ Frame 642B
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Sat, 25 Jul 2020 13:31:22 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
auction
prebid-server.rubiconproject.com/openrtb2/ Frame 642B
173 B
379 B
XHR
General
Full URL
https://prebid-server.rubiconproject.com/openrtb2/auction
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.157.177.102 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
ede4007c7fb95b8c668dcd50534bad2c7227ba02cb97bc363e4871d2a30c75f8

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:22 GMT
content-encoding
gzip
status
200
content-type
application/json
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
166
expires
0
openrtb
ads.adaptv.advertising.com/rtb/ Frame 642B
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=PrimisTwoHB
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.185.185.10 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

access-control-allow-origin
https://threatpost.com
access-control-allow-credentials
true
server
adaptv/1.0
Connection
keep-alive
content-length
0
content-type
application/json
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/ Frame 7A3B
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto:300|Roboto:400,500&lang=en
Origin
https://threatpost.com

Response headers

date
Fri, 12 Jun 2020 20:41:36 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:50 GMT
server
sffe
age
3689386
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
11016
x-xss-protection
0
expires
Sat, 12 Jun 2021 20:41:36 GMT
KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v20/ Frame 7A3B
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ce897833ac6e362df7c91ac8223fe511c6defcf33964928a81004600a2dd4c2e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto:300|Roboto:400,500&lang=en
Origin
https://threatpost.com

Response headers

date
Thu, 09 Jul 2020 02:32:55 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:48 GMT
server
sffe
age
1421907
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
11056
x-xss-protection
0
expires
Fri, 09 Jul 2021 02:32:55 GMT
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/ Frame 2805
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto:300|Roboto:400,500&lang=nl
Origin
https://threatpost.com

Response headers

date
Fri, 12 Jun 2020 20:41:36 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:50 GMT
server
sffe
age
3689386
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
11016
x-xss-protection
0
expires
Sat, 12 Jun 2021 20:41:36 GMT
KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v20/ Frame 2805
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ce897833ac6e362df7c91ac8223fe511c6defcf33964928a81004600a2dd4c2e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto:300|Roboto:400,500&lang=nl
Origin
https://threatpost.com

Response headers

date
Thu, 09 Jul 2020 02:32:55 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:48 GMT
server
sffe
age
1421907
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
11056
x-xss-protection
0
expires
Fri, 09 Jul 2021 02:32:55 GMT
si
googleads.g.doubleclick.net/pagead/drt/ Frame 03AB
Redirect Chain
  • https://www.google.com/pagead/drt/ui
  • https://googleads.g.doubleclick.net/pagead/drt/si
0
0
Image
General
Full URL
https://googleads.g.doubleclick.net/pagead/drt/si
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Redirect headers

date
Sat, 25 Jul 2020 13:31:22 GMT
x-content-type-options
nosniff
server
safe
status
302
content-type
text/html; charset=UTF-8
location
https://googleads.g.doubleclick.net/pagead/drt/si
cache-control
private
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
246
x-xss-protection
0
si
googleads.g.doubleclick.net/pagead/drt/ Frame 7A3B
Redirect Chain
  • https://www.google.com/pagead/drt/ui
  • https://googleads.g.doubleclick.net/pagead/drt/si
0
0
Image
General
Full URL
https://googleads.g.doubleclick.net/pagead/drt/si
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Redirect headers

date
Sat, 25 Jul 2020 13:31:22 GMT
x-content-type-options
nosniff
server
safe
status
302
content-type
text/html; charset=UTF-8
location
https://googleads.g.doubleclick.net/pagead/drt/si
cache-control
private
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
246
x-xss-protection
0
si
googleads.g.doubleclick.net/pagead/drt/ Frame 2805
Redirect Chain
  • https://www.google.com/pagead/drt/ui
  • https://googleads.g.doubleclick.net/pagead/drt/si
0
0
Image
General
Full URL
https://googleads.g.doubleclick.net/pagead/drt/si
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Redirect headers

date
Sat, 25 Jul 2020 13:31:22 GMT
x-content-type-options
nosniff
server
safe
status
302
content-type
text/html; charset=UTF-8
location
https://googleads.g.doubleclick.net/pagead/drt/si
cache-control
private
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
246
x-xss-protection
0
downsize_200k_v1
tpc.googlesyndication.com/simgad/10214513565465652591/ Frame 2805
18 KB
18 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/10214513565465652591/downsize_200k_v1?sqp=4sqPyQSWAUKTAQgAEhQNzczMPhUAAABAHQAAAAAlAAAAABgAIgoNAACAPxUAAIA_Kk8IWhABHQAAtEIgASgBMAY4A0CAwtcvSABQAFgAYFpwAngAgAEAiAEAkAEAnQEAAIA_oAEAqAEAsAGAreIEuAH___________8BxQEtsp0-MhoIzgIQrwEYASABLQAAAD8wzgI4rwFFAACAPw&rs=AOga4qkj_VvkJI7FPYgSls7WQgZVV4bABg
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/032007210634000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7b02d1e08863a122a6790e5f55d8c4f96d14feeb9e52eeadbf1a7e7d63a77e5d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:22 GMT
x-content-type-options
nosniff
last-modified
Tue, 26 May 2020 12:28:24 GMT
server
sffe
age
0
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18676
x-xss-protection
0
expires
Sun, 25 Jul 2021 13:31:22 GMT
downsize_200k_v1
tpc.googlesyndication.com/simgad/5515576643607546668/ Frame 2805
2 KB
2 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/5515576643607546668/downsize_200k_v1?sqp=4sqPyQR5QncIABIUDc3MzD4VAAAAQB0AAAAAJQAAAAAYACIKDQAAgD8VAACAPypPCFoQAR0AALRCIAEoATAGOANAgMLXL0gAUABYAGBacAJ4AIABAIgBAJABAJ0BAACAP6ABAKgBALABgK3iBLgB____________AcUBLbKdPg&rs=AOga4qkUMp0JksxWiX9I5mZCojG-ITcmFg
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/032007210634000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
03d9c997f9e46127bb632131416ff09aa73c5f1e95635f049fd41fa4d2290903
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 22 Jul 2020 16:02:41 GMT
x-content-type-options
nosniff
last-modified
Fri, 08 Feb 2019 12:19:56 GMT
server
sffe
age
250121
status
200
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2403
x-xss-protection
0
expires
Thu, 22 Jul 2021 16:02:41 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 2805
2 KB
2 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/032007210634000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:08:58 GMT
x-content-type-options
nosniff
server
cafe
age
8544
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Sun, 26 Jul 2020 11:08:58 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 2805
295 B
352 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/032007210634000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 08:18:35 GMT
x-content-type-options
nosniff
server
cafe
age
18767
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Sun, 26 Jul 2020 08:18:35 GMT
downsize_200k_v1
tpc.googlesyndication.com/simgad/7649387453454762384/ Frame 7A3B
19 KB
19 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7649387453454762384/downsize_200k_v1?sqp=4sqPyQSWAUKTAQgAEhQNzczMPhUAAABAHQAAAAAlAAAAABgAIgoNAACAPxUAAIA_Kk8IWhABHQAAtEIgASgBMAY4A0CAwtcvSABQAFgAYFpwAngAgAEAiAEAkAEAnQEAAIA_oAEAqAEAsAGAreIEuAH___________8BxQEtsp0-MhoIqgIQqgIYASABLQAAAD8wqgI4qgJFAACAPw&rs=AOga4qnHX7cTHDIqQjqjMZgXl-eLwUU_Xg
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/032007210634000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
56941e81f565d4d620f22db67d1827dc2d9b7f343d95a81b53e463ce889a751f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 14 Jul 2020 16:50:43 GMT
x-content-type-options
nosniff
last-modified
Mon, 03 Dec 2018 12:36:05 GMT
server
sffe
age
938439
status
200
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19298
x-xss-protection
0
expires
Wed, 14 Jul 2021 16:50:43 GMT
downsize_200k_v1
tpc.googlesyndication.com/simgad/3877746513440416934/ Frame 7A3B
20 KB
20 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/3877746513440416934/downsize_200k_v1?sqp=4sqPyQSLAUKIAQgAEhQNzczMPhUAAABAHQAAAAAlAAAAABgAIgoNAACAPxUAAIA_Kk8IWhABHQAAtEIgASgBMAY4A0CAwtcvSABQAFgAYFpwAngAgAEAiAEAkAEAnQEAAIA_oAEAqAEAsAGAreIEuAH___________8BxQEtsp0-Mg8I2AQQ2AQYASABLQAAAD8&rs=AOga4qksKIynAg0yoSr3rrxJ7kyqyAGaMA
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/032007210634000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
189a505c18811b5c6e9b69dccdd462d6441618eb611fae7449ddc22efd51ea8e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 04:10:30 GMT
x-content-type-options
nosniff
last-modified
Mon, 26 Nov 2018 12:05:13 GMT
server
sffe
age
206452
status
200
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
20239
x-xss-protection
0
expires
Fri, 23 Jul 2021 04:10:30 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 7A3B
2 KB
2 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/032007210634000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 11:08:58 GMT
x-content-type-options
nosniff
server
cafe
age
8544
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Sun, 26 Jul 2020 11:08:58 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 7A3B
295 B
352 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/032007210634000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 08:18:35 GMT
x-content-type-options
nosniff
server
cafe
age
18767
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
content-type
image/png
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Sun, 26 Jul 2020 08:18:35 GMT
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
6 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020072001&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e000e0588545229246df19f6b44e0b45c6167ccb4c983d04785a0543fce22974
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:31:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
5675
x-xss-protection
0
view
securepubads.g.doubleclick.net/pcs/ Frame 6F70
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvw37wxQ0z3hMvCxWcyDi_hEjbYRDFjq9olIjenFdwK-FbSoUckdlnAZKi7hl2rfytfb3c8llRTGyR7mmeJWR1uGeOh0CnGNYhLOfqqQYuHvrSvT8FMoa5P7oNyt_AakFeTmNz8qKL3rpEOIF6eC2LEjW-cVKwBzesPiI4KNdRH7Ufj1ik6NJUwFMl0rCAlJcfqhY0Bof6xYOVblGl1FCTean-pM3KglEexQ2_ohn7W__yYMWVYrD_SZHoVDpmic1aAtfJ9EbmOh5lapVF7Ymdm&sai=AMfl-YShnx9syYX4TcQ-nNGSGASydkNNdAGHi4ZvUIzEgWKiSjby-tijy_vU48j2yUIgenFCDMf1DM58I-aQnzUxBHti052kGslk_LRgaaqYZmpQzO5T37zswaROP7h3Ghs&sig=Cg0ArKJSzAFGnFnTIHKUEAE&adurl=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:31:22 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
6 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
08f50e9e70388c99977ca13b6af3a49f8f48c83e79230d51ea72a56c0735bd0c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1591403518460474"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5540
x-xss-protection
0
expires
Sat, 25 Jul 2020 13:31:23 GMT
7464639028652035684
tpc.googlesyndication.com/simgad/ Frame 6F70
330 B
388 B
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7464639028652035684
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f19e7ee6cdf20bd478c037707c447b7cd469051de4dadeac32a795efb463c2e2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 10 Jun 2020 14:30:09 GMT
x-content-type-options
nosniff
age
3884473
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
330
x-xss-protection
0
last-modified
Tue, 28 Jan 2020 23:02:00 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 10 Jun 2021 14:30:09 GMT
w_640_001.ts
video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/ Frame 642B
269 KB
269 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/w_640_001.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
175f8fc188e2702864cef9389872db6dc702da811744754cc479b6719b954b1e

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:21 GMT
Last-Modified
Tue, 20 Aug 2019 08:43:54 GMT
Server
Tengine
ETag
"5d5bb2ca-43320"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Sat, 01 Aug 2020 13:31:21 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
275232
X-Proxy-Cache
HIT
liveView.php
live.sekindo.com/live/ Frame 27FE
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=16&serverTime=1595683880&s=0&sta=12348808&x=320&y=180&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20content_VE%20%2F%201%20%2F%20default&isApp=0&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&csuuid=5f1c3428aed92&contentFileId=483586&mediaPlayListId=5946&playerVer=3.0.0&contentMatchType=&isExcludeFromOpt=0&cbuster=1595683883001&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=&uid=SekindoSPlayer5f1c3428d9783&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&floatStatus=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:22 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
runner.html
tpc.googlesyndication.com/sodar/sodar2/210/ Frame 7294
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/210/runner.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/210/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
4590
date
Sat, 25 Jul 2020 12:59:23 GMT
expires
Sun, 25 Jul 2021 12:59:23 GMT
last-modified
Wed, 26 Feb 2020 19:47:50 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1920
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
showad.js
ads.pubmatic.com/AdServer/js/ Frame 59B9
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/showad.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.32 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Last-Modified
Tue, 14 Apr 2020 10:27:52 GMT
ETag
"13006b6-a4bb-5a33da6f1a023"
Server
Apache/2.2.15 (CentOS)
Accept-Ranges
bytes
Content-Encoding
gzip
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
15243
Content-Type
text/html; charset=UTF-8
Cache-Control
public, max-age=24068
Expires
Sat, 25 Jul 2020 20:12:31 GMT
Date
Sat, 25 Jul 2020 13:31:23 GMT
Connection
keep-alive
Vary
Accept-Encoding
pd
u.openx.net/w/1.0/ Frame 109A
Redirect Chain
  • https://u.openx.net/w/1.0/pd?gdpr=1&gdpr_consent=
  • https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
0
0
Document
General
Full URL
https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.244.159.8 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
OXGW/16.190.0 /
Resource Hash

Request headers

:method
GET
:authority
u.openx.net
:scheme
https
:path
/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
i=208593a1-5171-42be-95dc-ea5c1dd30ea1|1595683883
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
vary
Accept, Accept-Encoding
set-cookie
i=208593a1-5171-42be-95dc-ea5c1dd30ea1|1595683883; Version=1; Expires=Sun, 25-Jul-2021 13:31:23 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None pd=v2|1595683883|gekin0vNiygu; Version=1; Expires=Sun, 09-Aug-2020 13:31:23 GMT; Max-Age=1296000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.190.0
p3p
CP="CUR ADM OUR NOR STA NID"
date
Sat, 25 Jul 2020 13:31:23 GMT
content-type
text/html
content-length
420
content-encoding
gzip
via
1.1 google
alt-svc
clear

Redirect headers

status
302
set-cookie
i=208593a1-5171-42be-95dc-ea5c1dd30ea1|1595683883; Version=1; Expires=Sun, 25-Jul-2021 13:31:23 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.190.0
p3p
CP="CUR ADM OUR NOR STA NID"
location
https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
date
Sat, 25 Jul 2020 13:31:23 GMT
content-length
0
via
1.1 google
alt-svc
clear
showad.js
ads.pubmatic.com/AdServer/js/ Frame 46F5
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/showad.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.32 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Last-Modified
Tue, 14 Apr 2020 10:27:52 GMT
ETag
"13006b6-a4bb-5a33da6f1a023"
Server
Apache/2.2.15 (CentOS)
Accept-Ranges
bytes
Content-Encoding
gzip
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
15243
Content-Type
text/html; charset=UTF-8
Cache-Control
public, max-age=24068
Expires
Sat, 25 Jul 2020 20:12:31 GMT
Date
Sat, 25 Jul 2020 13:31:23 GMT
Connection
keep-alive
Vary
Accept-Encoding
showad.js
ads.pubmatic.com/AdServer/js/ Frame C4AC
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/showad.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.32 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Last-Modified
Tue, 14 Apr 2020 10:27:52 GMT
ETag
"13006b6-a4bb-5a33da6f1a023"
Server
Apache/2.2.15 (CentOS)
Accept-Ranges
bytes
Content-Encoding
gzip
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
15243
Content-Type
text/html; charset=UTF-8
Cache-Control
public, max-age=24068
Expires
Sat, 25 Jul 2020 20:12:31 GMT
Date
Sat, 25 Jul 2020 13:31:23 GMT
Connection
keep-alive
Vary
Accept-Encoding
usync.html
eus.rubiconproject.com/ Frame EE5E
0
0

async_usersync.html
acdn.adnxs.com/ib/static/usersync/v3/ Frame CB64
0
0

ixmatch.html
js-sec.indexww.com/um/ Frame 9760
0
0

%7Bcombo_uid%7D
pr-bh.ybp.yahoo.com/sync/adaptv_ortb/ Frame 642B
43 B
839 B
Image
General
Full URL
https://pr-bh.ybp.yahoo.com/sync/adaptv_ortb/%7Bcombo_uid%7D
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1288:110:c305::8000 , United Kingdom, ASN34010 (YAHOO-IRD, GB),
Reverse DNS
Software
ATS /
Resource Hash
48a33ca9f42b91902d57ad8ac52e1ce32b92c8c10c732f2dbb6fe960ebfd9438
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:31:23 GMT
referrer-policy
strict-origin-when-cross-origin
server
ATS
age
0
expect-ct
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
strict-transport-security
max-age=31536000
content-type
image/gif
status
200
x-xss-protection
1; mode=block
content-length
43
x-content-type-options
nosniff
expires
Thu, 01 Jan 1970 00:00:00 GMT
pixel
cm.g.doubleclick.net/ Frame 642B
0
0

sync
pixel.advertising.com/ups/55953/ Frame 642B
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=adaptv&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=adaptv&ttd_tpi=1
  • https://pixel.advertising.com/ups/55953/sync?uid=01287a56-cb62-4017-99e9-7069f0dc3660&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=01287a56-cb62-4017-99e9-7069f0dc3660
0
124 B
Image
General
Full URL
https://pixel.advertising.com/ups/55953/sync?uid=01287a56-cb62-4017-99e9-7069f0dc3660&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=01287a56-cb62-4017-99e9-7069f0dc3660
Requested by
Host: threatpost.com
URL: https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.153.71 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
204
date
Sat, 25 Jul 2020 13:31:23 GMT
strict-transport-security
max-age=31536000
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:23 GMT
x-aspnet-version
4.0.30319
status
302
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
location
https://pixel.advertising.com/ups/55953/sync?uid=01287a56-cb62-4017-99e9-7069f0dc3660&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=01287a56-cb62-4017-99e9-7069f0dc3660
cache-control
private,no-cache, must-revalidate
content-type
text/html
content-length
369
m7y5t93k
sync-tm.everesttech.net/upi/pid/ Frame 642B
0
0

w_640_002.ts
video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/ Frame 642B
261 KB
261 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/w_640_002.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
9de9a21dfc3a7c2f955749eb7775022ad5ea7da7235945d9b2eb93f7317ad484

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:21 GMT
Last-Modified
Tue, 20 Aug 2019 08:43:54 GMT
Server
Tengine
ETag
"5d5bb2ca-412d0"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Sat, 01 Aug 2020 13:31:21 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
266960
X-Proxy-Cache
HIT
w_640_003.ts
video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/ Frame 642B
355 KB
356 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/w_640_003.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
931f5a817d756ac2e8ea318075ce1ba5563a05aea56767ced31cc2f5ae072ff1

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:21 GMT
Last-Modified
Tue, 20 Aug 2019 08:43:54 GMT
Server
Tengine
ETag
"5d5bb2ca-58d04"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Sat, 01 Aug 2020 13:31:21 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
363780
X-Proxy-Cache
HIT
liveView.php
live.sekindo.com/live/ Frame 27FE
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=36&serverTime=1595683880&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20content_VE%20%2F%201%20%2F%20default&isApp=0&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&csuuid=5f1c3428aed92&contentFileId=0&mediaPlayListId=0&cbuster=1595683883258&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=&uid=SekindoSPlayer5f1c3428d9783&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&floatStatus=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.205.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:23 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
w_640_004.ts
video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/ Frame 642B
386 KB
386 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/w_640_004.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
26095a8a3cb5d733aae274b3e60140f2be5b015192616ff32a27348b680fbe54

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:21 GMT
Last-Modified
Tue, 20 Aug 2019 08:43:55 GMT
Server
Tengine
ETag
"5d5bb2cb-60630"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Sat, 01 Aug 2020 13:31:21 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
394800
X-Proxy-Cache
HIT
gen_204
pagead2.googlesyndication.com/pagead/
0
228 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=210&t=2&li=gpt_2020072001&jk=1700474065459858&bg=!rK-lr7dYlqblY2Slc7YCAAAAwVIAAAAOmQGFNJ0TL0vX_FABPnoi9zOrY4xJIXaE6dcVn16bx8nReCfTevfPS_N4LuNKYEFmRjj8Y51HF8cq_U_ga_UH1Z5ywB1E7k1IpqfIthWEGQimB2LNjGSvjS01MWgPvTsqQf79WSr5JmO0Xu6TkbIO9PkSOWIgt4ne4b3aQratoeWt6xGznuleanCV5FxjN48VEnq0yiyXxhJuFBTR6ivg72BmroS7NkQojRirRFQRlS9jTwet9VMMwM-GWs04eS9uTKJyJV3-H5GU-KSLBkd27JLsqHayRu8pa-DUAIRRXnekXXM9kzXcuqEutOgJCUM21mq7yMUOnoD4dFJ1LUzkMNvoMBl4ecgeI7qSGGDUq7-CdSYtHknefvyj6xkjav9vzaHLiLbAjySqBF0unvo50tBLU0x8W_sXlyhUCNewmjIU3I0OBs_L6H3ZT7tscxqvfsEK1zt28YinTkHwxeYVSiXS366qz_BAqUEYoIbTVjnXu3j9SzvB2virW_q5aIHsK7_Bntlru6w
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:23 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
w_640_005.ts
video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/ Frame 642B
431 KB
432 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/w_640_005.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
d12ddf1a204678d1e3d6057a4ce0c52d56537572d45d3f444e87a35695be08cb

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:21 GMT
Last-Modified
Tue, 20 Aug 2019 08:43:55 GMT
Server
Tengine
ETag
"5d5bb2cb-6bd0c"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Sat, 01 Aug 2020 13:31:21 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
441612
X-Proxy-Cache
HIT
activeview
pagead2.googlesyndication.com/pcs/ Frame 03AB
42 B
773 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuPkSaIEefmd78ezRWzRc1R9kR6QgzpibvxrfUaIc01DvYINUtSxdPd__B7ZRRyNSRm4t6Ek7V2EpiIp6c3XzJDrLHlCWkuAeQIVE9v7UaQ06y6IdaKXKkhmhYikA&sai=AMfl-YTKE0i7vNAvEPK_fzLwt9IfvrCy6EDRYlrTTc8tKOCcmvyk7eztScdCfzVQn54FMyBXy6TI2cnmClN_BrztO9CcaDsFF4xq2bWhasg7RS_s32c77R9En36b8_UVOO4&sig=Cg0ArKJSzDMT_Trl5RW8EAE&cid=CAASPeRoof7QW6wrH2PPCsj202pStRip086eYSyGrLItnBtAmIPMXhtI12eYX8np99o1N5-BMW8pNkX5HENRYj8&id=ampim&o=315,10&d=970,250&ss=1600,1200&bs=1600,1200&mcvt=1001&mtos=0,0,0,1001,1001&tos=0,0,0,1001,0&tfs=309&tls=1310&g=100&h=100&tt=1310&r=v&avms=ampa&adk=1015519800
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:23 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 6F70
42 B
107 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsv8ar-oZHfKr48z4WYry2wzL7MJAXqkaY6CoJq12dhJ2JvhZ3CKO3XQgr61jdKhTiwLZLa8xxJ9a3MLYDnrrgDPUW0-4zHHXlStjpw5TY0&sig=Cg0ArKJSzKoxuaLlFJYoEAE&id=ampim&o=0,0&d=2,2&ss=1600,1200&bs=1600,1200&mcvt=1001&mtos=0,0,1001,1001,1001&tos=0,0,1001,0,0&tfs=172&tls=1173&g=100&h=100&tt=1173&r=v&avms=ampa&adk=3385906655
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:23 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 2805
42 B
107 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjss3qCNg8vkOtVf2dFFKdrXqrY8kBtF3QGeiOuLhlfqcORjnaDO5xOI7vkAGxQP4Ej7uB0LwjvYrlzvZnzzG5zjRedLTAM2xiavBny8BB8bsocvf24Htk0--CU2bBryLDP6MtyV98Y4cJU3I-OWLAhps&sai=AMfl-YQ-ImvQCrPgGs3i6n_hDdoeQ_C2IRmWlKtJ0mI3AriVpVGmslnFwwowe3t8vL0QI_-pSC9iI3yzT3GZNUK8f8gf-CTQT6QD2I_Iw5xMC-c9S3eNZ_NxCFYQGJFVq2Y&sig=Cg0ArKJSzF9aFaXyMH3KEAE&cid=CAASPeRow7k2uNO3IZ3lRabBNoyx9LB79LiBUsWqm5Us8hBUr_7yYqtYNTGdwN5FjpysTFCjwUakZQHHu77uhWE&id=ampim&o=1064,417&d=336,280&ss=1600,1200&bs=1600,1200&mcvt=1001&mtos=0,0,1001,1001,1001&tos=0,0,1001,0,0&tfs=241&tls=1242&g=100&h=100&tt=1242&r=v&avms=ampa&adk=654286612
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:24 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ixmatch.html
js-sec.indexww.com/um/ Frame 85F5
0
0
Document
General
Full URL
https://js-sec.indexww.com/um/ixmatch.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.254.129 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache /
Resource Hash

Request headers

Host
js-sec.indexww.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Server
Apache
Last-Modified
Mon, 19 Jun 2017 19:18:19 GMT
ETag
"74087b-112-55254ff6699bb"
Accept-Ranges
bytes
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Content-Type
text/html; charset=UTF-8
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
211
Date
Sat, 25 Jul 2020 13:31:24 GMT
Connection
keep-alive
pd
eu-u.openx.net/w/1.0/ Frame A218
0
0
Document
General
Full URL
https://eu-u.openx.net/w/1.0/pd?plm=6&ph=e1b1f5e1-3c2c-4287-9806-317cfbf3bd12&gdpr=1
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.98.64.218 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
OXGW/16.190.0 /
Resource Hash

Request headers

:method
GET
:authority
eu-u.openx.net
:scheme
https
:path
/w/1.0/pd?plm=6&ph=e1b1f5e1-3c2c-4287-9806-317cfbf3bd12&gdpr=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
i=208593a1-5171-42be-95dc-ea5c1dd30ea1|1595683883; pd=v2|1595683883|gekin0vNiygu
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
vary
Accept, Accept-Encoding
set-cookie
i=208593a1-5171-42be-95dc-ea5c1dd30ea1|1595683883; Version=1; Expires=Sun, 25-Jul-2021 13:31:24 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None pd=v2|1595683883.1|kiiygevNgun0.mWgqsLommOns; Version=1; Expires=Sun, 09-Aug-2020 13:31:24 GMT; Max-Age=1296000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.190.0
p3p
CP="CUR ADM OUR NOR STA NID"
date
Sat, 25 Jul 2020 13:31:24 GMT
content-type
text/html
content-length
316
content-encoding
gzip
via
1.1 google
alt-svc
clear
2000891.html
serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/ Frame 5C1D
Redirect Chain
  • https://sync.serverbid.com/ss/2000891.html
  • https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
0
0
Document
General
Full URL
https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload

Request headers

Host
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Date
Sat, 25 Jul 2020 13:31:24 GMT
Connection
Keep-Alive
Cache-Control
max-age=2924
Content-Length
4947
Content-Type
text/html
Last-Modified
Wed, 20 Nov 2019 20:29:05 GMT
Accept-Ranges
bytes
ETag
"1b0ebac83fe30af80513039edbdf566f"
x-amz-request-id
tx00000000000003c979e02-005f1aee18-35e3884-nyc3a
Strict-Transport-Security
max-age=15552000; includeSubDomains; preload
Vary
Access-Control-Request-Headers,Access-Control-Request-Method,Origin
X-HW
1595683884.dop031.pa1.t,1595683884.cds209.pa1.shn,1595683884.dop031.pa1.t,1595683884.cds204.pa1.c

Redirect headers

status
302
content-length
0
location
https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
cache-control
no-cache
showad.js
ads.pubmatic.com/AdServer/js/ Frame 0582
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/showad.js
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.32 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
KTPCACOOKIE=YES; KCCH=YES; pi=156595:2
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Last-Modified
Tue, 14 Apr 2020 10:27:52 GMT
ETag
"13006b6-a4bb-5a33da6f1a023"
Server
Apache/2.2.15 (CentOS)
Accept-Ranges
bytes
Content-Encoding
gzip
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
15243
Content-Type
text/html; charset=UTF-8
Cache-Control
public, max-age=24067
Expires
Sat, 25 Jul 2020 20:12:31 GMT
Date
Sat, 25 Jul 2020 13:31:24 GMT
Connection
keep-alive
Vary
Accept-Encoding
Cookie set beacon
ap.lijit.com/ Frame 6520
Redirect Chain
  • https://ap.lijit.com/beacon?informer=13394437
  • https://ap.lijit.com/beacon?informer=13394437&dnr=1
0
0
Document
General
Full URL
https://ap.lijit.com/beacon?informer=13394437&dnr=1
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
72.251.249.13 Amsterdam, Netherlands, ASN29791 (VOXEL-DOT-NET, US),
Reverse DNS
Software
nginx / raptor
Resource Hash

Request headers

Host
ap.lijit.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
ljt_reader=d168e64c7848bda0421a8402
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Server
nginx
Date
Sat, 25 Jul 2020 13:31:24 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Vary
Accept-Encoding
Expires
Fri, 20 Mar 2009 00:00:00 GMT
Set-Cookie
ljtrtbexp=eJxlkDsSwCAIRO9inUKRz5KrZXL3TBwb1vKB%2B8Gn2YC1e1g6cir0amOhRXT5UerWvfKsGIPMeuXMpLjYhgL4UsihiGMCSqFSoFRQSygxdQL5Ceupkfj%2BM4m%2BOOpNk%2FyU%2FDQrG723cu%2F7AQJlV5o%3D;Path=/;Domain=.lijit.com;Expires=Sun, 25-Jul-2021 13:31:24 GMT;Max-Age=31536000;Secure;SameSite=None ljt_reader=d168e64c7848bda0421a8402;Path=/;Domain=.lijit.com;Max-Age=31536000;Secure;SameSite=None
Cache-Control
private, no-cache, no-store, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
Pragma
no-cache
P3P
CP="CUR ADM OUR NOR STA NID"
X-Powered-By
raptor
Content-Encoding
gzip
X-Sovrn-Pod
ad_ap2ams1

Redirect headers

Server
nginx
Date
Sat, 25 Jul 2020 13:31:24 GMT
Content-Length
0
Set-Cookie
ljt_reader=d168e64c7848bda0421a8402;Path=/;Domain=.lijit.com;Max-Age=31536000;Secure;SameSite=None
Expires
Fri, 20 Mar 2009 00:00:00 GMT
Cache-Control
private, no-cache, no-store, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
Pragma
no-cache
P3P
CP="CUR ADM OUR NOR STA NID"
Location
https://ap.lijit.com/beacon?informer=13394437&dnr=1
X-Powered-By
raptor
X-Sovrn-Pod
ad_ap2ams1
sync
eb2.3lift.com/ Frame 4CA0
Redirect Chain
  • https://eb2.3lift.com/sync?
  • https://eb2.3lift.com/sync?&ld=1
0
0
Document
General
Full URL
https://eb2.3lift.com/sync?&ld=1
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.195.24.101 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash

Request headers

:method
GET
:authority
eb2.3lift.com
:scheme
https
:path
/sync?&ld=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
tluid=4418706532799895698
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
date
Sat, 25 Jul 2020 13:31:25 GMT
content-type
text/html; charset=utf-8
content-length
467
set-cookie
sync=CgoIgQIQiaKvsbguCgoIoQEQiaKvsbguCgoI4gEQiaKvsbguCgoI5gEQiaKvsbguCgoI1gEQiaKvsbguCgoIhwIQiaKvsbguCgkIOhCJoq-xuC4KCQgLEImir7G4LgoJCF8QiaKvsbguCgkIHxCJoq-xuC4=; Max-Age=7776000; Expires=Fri, 23 Oct 2020 13:31:25 GMT; Path=/sync; Domain=.3lift.com; SameSite=None; Secure tluid=4418706532799895698; Max-Age=7776000; Expires=Fri, 23 Oct 2020 13:31:25 GMT; Path=/; Domain=.3lift.com; SameSite=None; Secure
content-encoding
gzip
p3p
policyref="http://cdn.3lift.com/w3c/p3p.xml", CP="NON DSP COR NID OUR DEL SAM OTR UNR COM NAV INT DEM CNT STA PRE LOC OTC"
cache-control
no-cache, no-store, must-revalidate

Redirect headers

status
302
date
Sat, 25 Jul 2020 13:31:25 GMT
content-length
0
set-cookie
tluid=4418706532799895698; Max-Age=7776000; Expires=Fri, 23 Oct 2020 13:31:25 GMT; Path=/; Domain=.3lift.com; SameSite=None; Secure
location
/sync?&ld=1
cache-control
no-cache, no-store, must-revalidate
p3p
policyref="http://cdn.3lift.com/w3c/p3p.xml", CP="NON DSP COR NID OUR DEL SAM OTR UNR COM NAV INT DEM CNT STA PRE LOC OTC"
sync.html
public.servenobid.com/ Frame ED6D
0
0
Document
General
Full URL
https://public.servenobid.com/sync.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
13.35.254.100 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
public.servenobid.com
:scheme
https
:path
/sync.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

status
200
content-type
text/html
content-length
2236
last-modified
Thu, 23 Jul 2020 01:27:46 GMT
accept-ranges
bytes
server
AmazonS3
date
Fri, 24 Jul 2020 21:06:58 GMT
etag
"202461a171f44cd9bf99b8a0f91a6c12"
cache-control
max-age=86400
x-cache
Hit from cloudfront
via
1.1 d357d5d597708d2b41e0fea397aa2620.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
bEJVZeoMUQS52lekSGL0h8nDpu_ilSu2pHDeJ04YBe7jkech_RtBDw==
age
59068
async_usersync.html
acdn.adnxs.com/dmp/ Frame 6BED
0
0
Document
General
Full URL
https://acdn.adnxs.com/dmp/async_usersync.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.253.36 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
nginx/1.13.10 /
Resource Hash

Request headers

Host
acdn.adnxs.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Last-Modified
Tue, 24 Mar 2020 15:52:19 GMT
ETag
"5e7a2cb3-cefd"
Server
nginx/1.13.10
Content-Type
text/html
Vary
Accept-Encoding
Access-Control-Allow-Origin
*
Content-Encoding
gzip
Content-Length
17037
Cache-Control
max-age=86402
Expires
Sun, 26 Jul 2020 13:31:27 GMT
Date
Sat, 25 Jul 2020 13:31:25 GMT
Connection
keep-alive
usync.html
eus.rubiconproject.com/ Frame E80E
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.37.42.132 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Wed, 22 Jul 2020 18:23:17 GMT
Content-Encoding
gzip
Content-Length
9299
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=20696
Expires
Sat, 25 Jul 2020 19:16:21 GMT
Date
Sat, 25 Jul 2020 13:31:25 GMT
Connection
keep-alive
Vary
Accept-Encoding
/
c1.adform.net/serving/cookie/match/
0
188 B
Image
General
Full URL
https://c1.adform.net/serving/cookie/match/?CC=1&party=15&gdpr=1&gdpr_consent=&curl=https%3A%2F%2Fpixel.advertising.com%2Fups%2F55944%2Fsync%3Fuid%3D%24UID%26_origin%3D0%26gdpr%3d1%26gdpr_consent%3d
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
37.157.6.245 , Denmark, ASN198622 (ADFORM, DK),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:24 GMT
server
nginx
status
403
strict-transport-security
max-age=31536000; includeSubDomains
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate, no-transform
content-length
0
expires
-1
sync
pixel.advertising.com/ups/55965/
Redirect Chain
  • https://pixel.quantserve.com/pixel/p-NcBg8UA4xqUFp.gif?idmatch=0&gdpr=1&gdpr_consent=
  • https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=fJbnr3rE5K5kwrepf8T7_nDB4_xkx--qf5aGA7PU
0
124 B
Image
General
Full URL
https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=fJbnr3rE5K5kwrepf8T7_nDB4_xkx--qf5aGA7PU
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.153.71 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
204
date
Sat, 25 Jul 2020 13:31:24 GMT
strict-transport-security
max-age=31536000
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:24 GMT
status
302
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
location
https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=fJbnr3rE5K5kwrepf8T7_nDB4_xkx--qf5aGA7PU
cache-control
private, no-cache, no-store, proxy-revalidate
strict-transport-security
max-age=86400
content-length
0
expires
Fri, 04 Aug 1978 12:00:00 GMT
sync
pixel.advertising.com/ups/56465/
0
124 B
Image
General
Full URL
https://pixel.advertising.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.153.71 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
204
date
Sat, 25 Jul 2020 13:31:24 GMT
strict-transport-security
max-age=31536000
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
generic
match.adsrvr.org/track/cmf/
70 B
264 B
Image
General
Full URL
https://match.adsrvr.org/track/cmf/generic?ttd_pid=aoladtech&gdpr=1&gdpr_consent=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.252.111.25 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
8d70b3e6badb6973663b398d297bb32eaedd08826a1af98d0a1cfce5324ffce0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:24 GMT
x-aspnet-version
4.0.30319
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
status
200
cache-control
private,no-cache, must-revalidate
content-type
image/gif
content-length
70
current
aol-match.dotomi.com/match/bounce/
0
104 B
Image
General
Full URL
https://aol-match.dotomi.com/match/bounce/current?networkId=60&version=1&nuid=1A204c382a-ce7b-11ea-9162-1204ea82ed4e&gdpr=1&gdpr_consent=&rurl=https%3A%2F%2Fpixel.advertising.com%2Fups%2F55853%2Fsync%3Fuid%3D%24UID%26_origin%3D0%26gdpr%3D1%26gdpr_consent%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:fa8:8806:13::1400 , Sweden, ASN41041 (VCLK-EU-, SE),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
204
pragma
no-cache
date
Sat, 25 Jul 2020 13:31:24 GMT
cache-control
no-cache, private, max-age=0, no-store
server
nginx
expires
0
liveMatching.php
live.sekindo.com/live/ Frame 642B
0
445 B
XHR
General
Full URL
https://live.sekindo.com/live/liveMatching.php
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30372D32355F31367D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B7251554A554943386759323975644756756446395752534176494445674C79426B5A575A68645778307D7B4C363631357DFEFE&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F83.0.4103.61+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=ABT+%2F+content_VE+%2F+1+%2F+default&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5f1c3428aed92&debugInfo=12348808_ABT+%2F+content_VE+%2F+1+%2F+default&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_closeButtonPosition=right&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.8847&geoLong=4.5049&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:25 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-store
liveView.php
live.sekindo.com/live/ Frame 27FE
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1595683880&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20content_VE%20%2F%201%20%2F%20default&isApp=0&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&csuuid=5f1c3428aed92&contentFileId=0&mediaPlayListId=0&dur=500&viewPct={%22w%22:100,%22h%22:100}&cbuster=1595683886321&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=&uid=SekindoSPlayer5f1c3428d9783&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&floatStatus=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:26 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
w_640_006.ts
video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/ Frame 642B
116 KB
116 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn1/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5d5bb0d47c725224559183.mp4/w_640_006.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.167.97.84 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
Tengine /
Resource Hash
4dd37d1d10c70e222c5ca77232736e075a96b8824371e9d784c279d6e30e2085

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:31:27 GMT
Last-Modified
Tue, 20 Aug 2019 08:43:55 GMT
Server
Tengine
ETag
"5d5bb2cb-1d020"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Sat, 01 Aug 2020 13:31:27 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
118816
X-Proxy-Cache
HIT
prebid
ib.adnxs.com/ut/v3/ Frame 642B
19 B
709 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.172.45 , Ascension Island, ASN29990 (ASN-APPNEX, US),
Reverse DNS
Software
nginx/1.13.4 /
Resource Hash
0c09c070833c786cb25be38bc30992b30bad578f817dbc9e34beacd8b8ea44c5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:29 GMT
X-Proxy-Origin
82.102.19.136; 82.102.19.136; 693.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.173.89:80
AN-X-Request-Uuid
c3c48a7c-63fa-4cb6-95b0-0d4ef5048854
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
19
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
avjp
teachingaids-d.openx.net/v/1.0/ Frame 642B
92 B
342 B
XHR
General
Full URL
https://teachingaids-d.openx.net/v/1.0/avjp?ju=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&ch=UTF-8&res=1600x1200x24&ifr=true&tz=-120&tws=1600x1200&be=1&bc=hb_pb_3.0.2&dddid=bc305076-0d68-4373-a95e-2f604e566631&nocache=1595683889880&gdpr_consent=&gdpr=1&schain=1.0,1!admetricspro.com,1005,1,,,&skip=1&auid=540882779&vwd=320&vht=180
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.98.64.218 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
OXGW/16.190.0 /
Resource Hash
004e5faf0bf890f61697daeede9f21826affd1137fb2cb58eaf4719937a04a14

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:30 GMT
via
1.1 google
server
OXGW/16.190.0
status
200
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
92
expires
Mon, 26 Jul 1997 05:00:00 GMT
openrtb
ads.adaptv.advertising.com/rtb/ Frame 642B
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=TeachingAidsLLC
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.185.185.10 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

access-control-allow-origin
https://threatpost.com
access-control-allow-credentials
true
server
adaptv/1.0
Connection
keep-alive
content-length
0
content-type
application/json
translator
hbopenbid.pubmatic.com/ Frame 642B
0
0

cygnus
as-sec.casalemedia.com/ Frame 642B
0
0

liveView.php
live.sekindo.com/live/ Frame 27FE
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=25&serverTime=1595683880&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20content_VE%20%2F%201%20%2F%20default&isApp=0&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&csuuid=5f1c3428aed92&contentFileId=0&mediaPlayListId=0&dur=1000&cbuster=1595683891132&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=&uid=SekindoSPlayer5f1c3428d9783&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&floatStatus=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:31 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
liveView.php
live.sekindo.com/live/ Frame 27FE
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1595683880&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20content_VE%20%2F%201%20%2F%20default&isApp=0&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&csuuid=5f1c3428aed92&contentFileId=0&mediaPlayListId=0&dur=500&viewPct={%22w%22:100,%22h%22:100}&cbuster=1595683891321&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=&uid=SekindoSPlayer5f1c3428d9783&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&floatStatus=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.220 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:31 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
translator
hbopenbid.pubmatic.com/ Frame 642B
0
115 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Sat, 25 Jul 2020 13:31:32 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
openrtb
ads.adaptv.advertising.com/rtb/ Frame 642B
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=PrimisTwoHB
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.185.185.10 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

access-control-allow-origin
https://threatpost.com
access-control-allow-credentials
true
server
adaptv/1.0
Connection
keep-alive
content-length
0
content-type
application/json
auction
prebid-server.rubiconproject.com/openrtb2/ Frame 642B
173 B
381 B
XHR
General
Full URL
https://prebid-server.rubiconproject.com/openrtb2/auction
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.3.19.0_9.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.157.177.102 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
099cd30a75adf47d5b1642408839e6b1017f59f9e5aaeccc57a0ccae5540eabc

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:31:32 GMT
content-encoding
gzip
status
200
content-type
application/json
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
168
expires
0
liveView.php
live.sekindo.com/live/ Frame 27FE
43 B
463 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=6&serverTime=1595683881&s=58057&sta=13643488&x=320&y=180&msta=12348808&vid_vastType=3&vid_viewabilityState=1&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20content_VE%20%2F%201%20%2F%20default&isApp=0&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&csuuid=5f1c3428aed92&rvn=${VP_RVN_MACRO}&attemptMultiplier=10&contentFileId=0&mediaPlayListId=0&playerVer=3.0.0&cbuster=1595683892147&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=&uid=SekindoSPlayer5f1c3428d9783&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&floatStatus=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.250.56.119 , United States, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
42b976597a2d977d0e300f6d06bc903db389e5c112d33c1c8c249690a522d9f2

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:32 GMT
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000
Content-Disposition
inline; filename="pixel.gif"
Content-Type
image/gif
Expires
Thu, 31 Dec 2037 23:55:55 GMT
liveView.php
live.sekindo.com/live/ Frame 27FE
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1595683880&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=ABT%20%2F%20content_VE%20%2F%201%20%2F%20default&isApp=0&userIpAddr=82.102.19.136&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F83.0.4103.61%20Safari%2F537.36&csuuid=5f1c3428aed92&contentFileId=0&mediaPlayListId=0&dur=500&viewPct={%22w%22:100,%22h%22:100}&cbuster=1595683896321&gdpr=1&gdprConsent=&isWePassGdpr=0&ccpa=0&ccpaConsent=&uid=SekindoSPlayer5f1c3428d9783&pubUrl=https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F&floatStatus=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.250.56.119 , United States, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.20
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:31:36 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.20
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
eus.rubiconproject.com
URL
https://eus.rubiconproject.com/usync.html?gdpr=1&gdpr_consent=
Domain
acdn.adnxs.com
URL
https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Domain
js-sec.indexww.com
URL
https://js-sec.indexww.com/um/ixmatch.html
Domain
cm.g.doubleclick.net
URL
https://cm.g.doubleclick.net/pixel?google_nid=adaptv_dbm&google_cm&google_sc
Domain
sync-tm.everesttech.net
URL
https://sync-tm.everesttech.net/upi/pid/m7y5t93k?gdpr=1&gdpr_consent=&redir=https%3A%2F%2Fpixel.advertising.com%2Fups%2F55986%2Fsync%3Fuid%3D%24%7BUSER_ID%7D%26_origin%3D0&gdpr=1&gdpr_consent=
Domain
hbopenbid.pubmatic.com
URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Domain
as-sec.casalemedia.com
URL
https://as-sec.casalemedia.com/cygnus?s=435870&v=8.1&r={%22id%22:%22379c414492f48a9%22,%22imp%22:[{%22id%22:%2238fb761f39dfc2b%22,%22ext%22:{%22siteID%22:%22435870%22,%22sid%22:%22320x180%22},%22bidfloor%22:2,%22bidfloorcur%22:%22USD%22,%22video%22:{%22mimes%22:[%22video/mp4%22,%22application/javascript%22],%22minduration%22:1,%22maxduration%22:200,%22api%22:[1,2],%22protocols%22:[1,2,3,4,5,6],%22linearity%22:1,%22startdelay%22:0,%22skip%22:1,%22w%22:320,%22h%22:180,%22placement%22:1}}],%22site%22:{%22ref%22:%22https://t.co/X0ukaAEsUs%22,%22page%22:%22https%3A%2F%2Fthreatpost.com%2Foffice-365-users-targeted-by-coronavirus-employee-training-phish%2F156899%2F%22},%22ext%22:{%22source%22:%22prebid%22},%22source%22:{%22ext%22:{%22schain%22:{%22ver%22:%221.0%22,%22complete%22:1,%22nodes%22:[{%22asi%22:%22admetricspro.com%22,%22sid%22:%221005%22,%22hp%22:1}]}}},%22regs%22:{%22ext%22:{%22gdpr%22:1}},%22user%22:{%22ext%22:{%22consent%22:%22%22}}}&ac=j&sd=1&nf=1

Verdicts & Comments Add Verdict or Comment

242 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

string| gAMP_urlhost string| gAMP_urlpath string| gAMP_urlquery string| gAMP_contentid string| gAMP_category string| gAMP_contenttags object| g8WHCa function| g8WHCb object| xop number| kPrebidTimeout number| kRefreshPollTime number| gRefreshCount number| gOXRefreshCount boolean| gRefreshDebug boolean| gPrebidDebug number| k60SecondRefreshInterval number| k90SecondRefreshInterval number| k120SecondRefreshInterval number| k180SecondRefreshInterval number| kDoNotRefresh number| kDefaultRefreshInterval object| gSChainNodes undefined| gGDPR_forceLocale boolean| gGDPR_silentNoConsent boolean| gGDPR_forceNoConsent string| gGDPR_logoURL string| gGDPR_privacyPolicyURL string| kAmazonPublisherID object| ad728x90ATF object| ad300x250ATF object| ad300x250ATF2 object| ad728x90ATFTAB object| ad300x250ATFTAB object| ad300x250ATF2TAB object| ad320x50ATF object| ad300x250ATFM object| ad300x250ATF2M object| ad2x2skin number| gBrowserWidth object| desktopAdUnits object| tabletAdUnits object| mobileAdUnits object| gAllSlotData number| gAllSlotCount object| OX_dfp_ads number| minWidth boolean| disableBids object| googletag object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleTokenSync number| google_srt function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter undefined| google_measure_js_timing object| __core-js_shared__ object| core undefined| __cmp function| pbjsChunk object| pbjs object| _pbjsGlobals string| nobidVersion object| nobid object| gRefreshSlots object| gRefreshIDs object| gRefreshTimes object| gRefreshIntervals object| gThisRefreshIDs object| gThisRefreshSlots boolean| gInitialLoad object| gPBJSTimeoutTimer object| gAmazonSlots object| gAmazonBids boolean| gAmazonBidsBack boolean| gOpenXBidsBack boolean| gPrebidBidsBack function| amp_getBidsForAllChannels function| amp_dumpTable function| amp_getBestBids function| amp_dumpBids function| amp_dumpWins function| customOxTargeting function| openXRefreshCallback function| sendAdserverRequest function| checkIfAllBidsBack function| amazonBidsBack function| pbjsBidsBack function| bidsTimeout function| sendBidRequests function| amp_refreshAllSlots function| amp_refreshSlots function| refreshAdSlots function| configureAdSlot function| getCookie object| apstag undefined| $ function| jQuery object| gdprDynamicStrings object| kss object| gdprStrings function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill object| dataLayer object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client object| viewPortSize object| debugIp object| debugId number| sekindoDisplayedPlacement function| constructsekindoParent573 object| Mur4pa function| Mur4pb function| xblocker object| kb72la function| kb72lb function| xblacklist object| recaptcha object| google_tag_manager boolean| apstagLOADED object| google_tag_data string| GoogleAnalyticsObject function| ga object| _qevents function| twq object| gaplugins object| gaGlobal object| gaData object| gf_global function| quantserve function| __qc object| ezt object| _qoptions object| twttr boolean| sekindoFlowingPlayerOn number| __google_ad_urls_id number| google_unique_id function| gformBindFormatPricingFields function| Currency function| gformCleanNumber function| gformGetDecimalSeparator function| gformIsNumber function| gformIsNumeric function| gformDeleteUploadedFile object| _gformPriceFields undefined| _anyProductSelected function| gformIsHidden function| gformCalculateTotalPrice function| gformGetShippingPrice function| gformGetFieldId function| gformCalculateProductPrice function| gformGetProductQuantity function| gformIsProductSelected function| gformGetBasePrice function| gformFormatMoney function| gformFormatPricingField function| gformToNumber function| gformGetPriceDifference function| gformGetOptionLabel function| gformGetProductIds function| gformGetPrice function| gformRoundPrice function| gformRegisterPriceField function| gformInitPriceFields function| gformShowPasswordStrength function| gformPasswordStrength function| gformToggleShowPassword function| gformToggleCheckboxes function| gformAddListItem function| gformDeleteListItem function| gformAdjustClasses function| gformToggleIcons function| gformAddRepeaterItem function| gformDeleteRepeaterItem function| gformResetRepeaterAttributes function| gformToggleRepeaterButtons function| gformMatchCard function| gformFindCardType function| gformToggleCreditCard function| gformInitChosenFields function| gformInitCurrencyFormatFields function| GFMergeTag function| GFCalc function| gformFormatNumber function| getMatchGroups function| gf_get_field_number_format object| gform undefined| __gf_keyup_timeout function| renderRecaptcha function| gformValidateFileSize function| gformInitSpinner function| gformAddSpinner function| gf_raw_input_change function| gf_get_input_id_by_html_id function| gf_get_form_id_by_html_id function| gf_get_ids_by_html_id function| gf_input_change function| gformExtractFieldId function| gformExtractInputIndex function| rgars function| rgar object| gfMultiFileUploader undefined| __gf_timeout_handle function| gf_apply_rules function| gf_check_field_rule function| gf_get_field_logic function| gf_apply_field_rule function| gf_get_field_action function| gf_is_match function| gf_is_match_checkable function| gf_is_match_default function| gf_format_number function| gf_try_convert_float function| gf_matches_operation function| gf_get_value function| gf_do_field_action function| gf_do_next_button_action function| gf_do_action function| gf_reset_to_default function| gf_is_hidden_pricing_input object| Placeholders object| ak_js object| commentForm undefined| replyRowContainer undefined| children object| wp object| jQuery112406893978556675062 object| gf_form_conditional_logic string| gf_number_format function| do_callback object| closure_lm_345408 function| jQuery112406893978556675062_1595683880461 object| closure_lm_349332 object| ampInaboxPositionObserver object| ampInaboxFrameOverlayManager object| GoogleGcLKhOms object| google_image_requests

0 Cookies

32 Console Messages

Source Level URL
Text
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 343)
Message:
gBrowserWidth =1600
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 368)
Message:
OpenX Slot defined for /21707124336/ThreatPost-970x250-ATF div-gpt-ad-6794670-2
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 368)
Message:
OpenX Slot defined for /21707124336/ThreatPost-300x250-ATF div-gpt-ad-6794670-3
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 368)
Message:
OpenX Slot defined for /21707124336/ThreatPost-300x600-ATF div-gpt-ad-6794670-5
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 368)
Message:
OpenX Slot defined for /21707124336/ThreatPost-2x2-Skin div-gpt-ad-6794670-1
console-api log URL: https://qd.admetricspro.com/js/threatpost/cmp.js(Line 3)
Message:
CMP: Locale=en-us gdpr= false
console-api log URL: https://qd.admetricspro.com/js/threatpost/cmp.js(Line 3)
Message:
GDPR is not applicable, skipping initialization of CMP
console-api warning URL: https://qd.admetricspro.com/js/threatpost/prebid.js(Line 3)
Message:
fun-hooks: referenced 'registerAdserver' but it was never created
console-api log (Line 3)
Message:
ENGINE: gSChainNodes found, prebid configured with 1 supply chain object(s)
console-api log (Line 3)
Message:
ENGINE: final pbjs config
console-api log (Line 3)
Message:
[object Object]
console-api log (Line 3)
Message:
Initial Ad Load
console-api log (Line 3)
Message:
sendBidRequests() gPBJSTimeoutTimer=null pbjs.adserverRequestSent=undefined
console-api log (Line 3)
Message:
Amazon bids returned, count=4
console-api log (Line 3)
Message:
[object Object],[object Object],[object Object],[object Object]
console-api log (Line 3)
Message:
pbjs bids returned
console-api log (Line 3)
Message:
gPBJSTimeoutTimer cleared
console-api log (Line 3)
Message:
sendAdserverRequest(): pbjsBidsBack
console-api log (Line 3)
Message:
sendAdserverRequest()
console-api log (Line 3)
Message:
pbjs.getAdserverTargeting: >> Amazon >> Prebid
console-api log (Line 3)
Message:
[object Object]
console-api log (Line 3)
Message:
pbjs.getBidResponses:
console-api log (Line 3)
Message:
[object Object]
console-api log (Line 3)
Message:
gThisRefreshSlots=
console-api log (Line 3)
Message:
[object Object],[object Object],[object Object],[object Object]
console-api log (Line 3)
Message:
sendAdserverRequest(): ---> Calling googletag.pubads().refresh()
console-api log (Line 3)
Message:
console.groupEnd
console-api info URL: https://cdn.ampproject.org/rtv/032007210634000/amp4ads-v0.js(Line 421)
Message:
Powered by AMP ⚡ HTML – Version 2007210634000 https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
console-api info URL: https://cdn.ampproject.org/rtv/032007210634000/amp4ads-v0.js(Line 421)
Message:
Powered by AMP ⚡ HTML – Version 2007210634000 https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
console-api info URL: https://cdn.ampproject.org/rtv/032007210634000/amp4ads-v0.js(Line 421)
Message:
Powered by AMP ⚡ HTML – Version 2007210634000 https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
console-api info URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://threatpost.com/office-365-users-targeted-by-coronavirus-employee-training-phish/156899/
console-api warning URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 21)
Message:
[amp-analytics/transport] Response unparseable or failed to send image request https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvw37wxQ0z3hMvCxWcyDi_hEjbYRDFjq9olIjenFdwK-FbSoUckdlnAZKi7hl2rfytfb3c8llRTGyR7mmeJWR1uGeOh0CnGNYhLOfqqQYuHvrSvT8FMoa5P7oNyt_AakFeTmNz8qKL3rpEOIF6eC2LEjW-cVKwBzesPiI4KNdRH7Ufj1ik6NJUwFMl0rCAlJcfqhY0Bof6xYOVblGl1FCTean-pM3KglEexQ2_ohn7W__yYMWVYrD_SZHoVDpmic1aAtfJ9EbmOh5lapVF7Ymdm&sai=AMfl-YShnx9syYX4TcQ-nNGSGASydkNNdAGHi4ZvUIzEgWKiSjby-tijy_vU48j2yUIgenFCDMf1DM58I-aQnzUxBHti052kGslk_LRgaaqYZmpQzO5T37zswaROP7h3Ghs&sig=Cg0ArKJSzAFGnFnTIHKUEAE&adurl=

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=0
X-Xss-Protection 0

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

8b675fca0d72ef4d503d0e09691ad717.safeframe.googlesyndication.com
acdn.adnxs.com
ad.doubleclick.net
ads.adaptv.advertising.com
ads.pubmatic.com
ads.servenobid.com
adserver-us.adtech.advertising.com
adservice.google.de
analytics.twitter.com
aol-match.dotomi.com
ap.lijit.com
as-sec.casalemedia.com
assets.threatpost.com
c.amazon-adsystem.com
c1.adform.net
cdn.ampproject.org
cm.g.doubleclick.net
csync.loopme.me
e.serverbid.com
eb2.3lift.com
eu-u.openx.net
eus.rubiconproject.com
fastlane.rubiconproject.com
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
graph.facebook.com
hbopenbid.pubmatic.com
i1.wp.com
ib.adnxs.com
js-sec.indexww.com
kasperskycontenthub.com
live.sekindo.com
lnkd.in
match.adsrvr.org
media.threatpost.com
pagead2.googlesyndication.com
pixel.advertising.com
pixel.quantserve.com
pr-bh.ybp.yahoo.com
prebid-server.rubiconproject.com
prebid.a-mo.net
public.servenobid.com
qd.admetricspro.com
rules.quantcount.com
secure.gravatar.com
secure.quantserve.com
securepubads.g.doubleclick.net
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
static.ads-twitter.com
stats.g.doubleclick.net
sync-tm.everesttech.net
sync.search.spotxchange.com
sync.serverbid.com
t.co
tagan.adlightning.com
teachingaids-d.openx.net
threatpost.com
tlx.3lift.com
tpc.googlesyndication.com
u.openx.net
video.sekindo.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.gstatic.com
www.linkedin.com
www.reddit.com
x.bidswitch.net
acdn.adnxs.com
as-sec.casalemedia.com
cm.g.doubleclick.net
eus.rubiconproject.com
hbopenbid.pubmatic.com
js-sec.indexww.com
sync-tm.everesttech.net
100.24.218.250
104.244.42.195
104.244.42.69
108.174.10.10
13.35.254.100
143.204.201.71
151.101.112.157
165.227.252.242
172.217.16.130
178.128.135.80
18.185.185.10
18.195.24.101
185.167.97.84
185.220.204.220
185.220.205.220
185.33.221.50
185.64.189.112
185.94.180.126
192.0.77.2
199.232.53.140
205.185.216.10
213.19.162.51
216.58.205.230
23.37.42.132
2600:9000:2057:4200:6:44e3:f8c0:93a1
2600:9000:2057:aa00:2:9275:3d40:93a1
2600:9000:214f:6c00:0:5c46:4f40:93a1
2606:2800:233:97b6:26be:138a:cba8:bb01
2606:4700:e6::ac40:c21a
2620:116:800d:21:51e4:db4b:4436:b305
2620:1ec:21::14
2a00:1288:110:c305::8000
2a00:1450:4001:800::2001
2a00:1450:4001:800::200a
2a00:1450:4001:80b::2002
2a00:1450:4001:80b::2008
2a00:1450:4001:816::200e
2a00:1450:4001:818::2003
2a00:1450:4001:819::2003
2a00:1450:4001:81d::2004
2a00:1450:4001:81f::2001
2a00:1450:4001:821::2002
2a00:1450:4001:821::2003
2a00:1450:400c:c0a::9b
2a02:fa8:8806:13::1400
2a03:2880:f01c:800e:face:b00c:0:2
2a04:fa87:fffe::c000:4902
3.126.15.129
34.252.111.25
34.253.1.139
34.98.64.218
35.156.153.71
35.156.185.79
35.157.177.102
35.173.160.135
35.244.159.8
37.157.6.245
37.252.172.45
63.250.56.119
72.247.225.32
72.251.249.13
88.99.244.177
92.122.253.36
92.122.254.129
99.86.0.120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