URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Submission: On July 25 via api from CA

Summary

This website contacted 36 IPs in 9 countries across 34 domains to perform 211 HTTP transactions. The main IP is 50.56.167.254, located in San Antonio, United States and belongs to RMH-14, US. The main domain is www.bankinfosecurity.com.
TLS certificate: Issued by Go Daddy Secure Certificate Authority... on April 16th 2020. Valid for: a year.
This is the only time www.bankinfosecurity.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
31 50.56.167.254 33070 (RMH-14)
1 2a00:1450:400... 15169 (GOOGLE)
2 23.210.248.44 16625 (AKAMAI-AS)
49 92.122.252.220 16625 (AKAMAI-AS)
32 72.247.224.209 16625 (AKAMAI-AS)
1 104.130.251.6 33070 (RMH-14)
6 2a00:1450:400... 15169 (GOOGLE)
2 88.221.60.75 16625 (AKAMAI-AS)
2 2a00:1450:400... 15169 (GOOGLE)
5 2a00:1450:400... 15169 (GOOGLE)
1 72.247.226.64 16625 (AKAMAI-AS)
1 151.101.112.134 54113 (FASTLY)
1 4 2a00:1450:400... 15169 (GOOGLE)
1 6 34.240.148.251 16509 (AMAZON-02)
1 2a02:26f0:10c... 20940 (AKAMAI-ASN1)
5 104.20.4.43 13335 (CLOUDFLAR...)
1 143.204.208.128 16509 (AMAZON-02)
2 2.21.36.164 20940 (AKAMAI-ASN1)
2 2606:2800:134... 15133 (EDGECAST)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
12 172.217.16.130 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2 2a05:f500:10:... 14413 (LINKEDIN)
1 1 2620:1ec:21::14 8068 (MICROSOFT...)
1 54.84.119.213 14618 (AMAZON-AES)
2 192.28.147.68 53580 (MARKETO)
1 2 54.194.171.8 16509 (AMAZON-02)
2 2 35.244.245.222 15169 (GOOGLE)
2 2 52.18.161.147 16509 (AMAZON-02)
2 2 52.48.248.240 16509 (AMAZON-02)
1 2 3.122.214.165 16509 (AMAZON-02)
3 2606:4700::68... 13335 (CLOUDFLAR...)
2 151.101.192.134 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
23 2a00:1450:400... 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
1 178.79.227.76 22822 (LLNW)
1 4 66.155.71.149 13768 (COGECO-PEER1)
211 36
Apex Domain
Subdomains
Transfer
81 rackcdn.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com
dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
8 MB
31 bankinfosecurity.com
www.bankinfosecurity.com
457 KB
18 googlesyndication.com
fcf61c9f2c53987e8f6061928a962663.safeframe.googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
360 KB
13 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
116 KB
10 ampproject.org
cdn.ampproject.org
427 KB
7 ml314.com
ml314.com
in.ml314.com
15 KB
5 comm100.com
chatserver.comm100.com
vue.comm100.com
chatserver3.comm100.com
249 KB
5 gstatic.com
fonts.gstatic.com
46 KB
4 google.com
adservice.google.com
www.google.com
320 B
4 google-analytics.com
www.google-analytics.com
19 KB
3 sitescout.com
pixel.sitescout.com
458 B
3 disquscdn.com
c.disquscdn.com
223 KB
3 linkedin.com
px.ads.linkedin.com
www.linkedin.com
2 KB
3 disqus.com
bankinfosecurity.disqus.com
disqus.com
30 KB
3 addthis.com
s7.addthis.com
m.addthis.com
114 KB
2 basis.net
cdn01.basis.net
pixel-a.basis.net
1017 B
2 eyeota.net
ps.eyeota.net
1 KB
2 crwdcntrl.net
sync.crwdcntrl.net
1003 B
2 adsrvr.org
match.adsrvr.org
928 B
2 rlcdn.com
idsync.rlcdn.com
801 B
2 demdex.net
dpm.demdex.net
2 KB
2 mktoresp.com
051-zxi-237.mktoresp.com
608 B
2 twimg.com
pbs.twimg.com
7 KB
2 googletagmanager.com
www.googletagmanager.com
64 KB
2 marketo.net
munchkin.marketo.net
6 KB
1 google.de
adservice.google.de
829 B
1 crazyegg.com
script.crazyegg.com
1 KB
1 addthisedge.com
v1.addthisedge.com
325 B
1 cloudfront.net
dnn506yrbagrg.cloudfront.net
822 B
1 bizographics.com
sjs.bizographics.com
2 KB
1 moatads.com
z.moatads.com
1 KB
1 googletagservices.com
www.googletagservices.com
17 KB
1 ismgcorp.com
worker.ismgcorp.com
408 B
1 googleapis.com
fonts.googleapis.com
1 KB
211 34
Domain Requested by
31 www.bankinfosecurity.com www.bankinfosecurity.com
21 75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com www.bankinfosecurity.com
19 130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com www.bankinfosecurity.com
13 tpc.googlesyndication.com securepubads.g.doubleclick.net
www.bankinfosecurity.com
cdn.ampproject.org
tpc.googlesyndication.com
12 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
www.bankinfosecurity.com
10 cdn.ampproject.org securepubads.g.doubleclick.net
10 dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com www.bankinfosecurity.com
10 0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com www.bankinfosecurity.com
6 ml314.com 1 redirects www.bankinfosecurity.com
ml314.com
6 6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com www.bankinfosecurity.com
5 fonts.gstatic.com www.bankinfosecurity.com
4 pagead2.googlesyndication.com securepubads.g.doubleclick.net
4 www.google-analytics.com 1 redirects www.bankinfosecurity.com
4 21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com www.bankinfosecurity.com
4 fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com www.bankinfosecurity.com
4 4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com www.bankinfosecurity.com
3 pixel.sitescout.com www.bankinfosecurity.com
3 chatserver3.comm100.com vue.comm100.com
3 www.google.com www.bankinfosecurity.com
3 c.disquscdn.com bankinfosecurity.disqus.com
2 disqus.com bankinfosecurity.disqus.com
2 ps.eyeota.net 1 redirects www.bankinfosecurity.com
2 sync.crwdcntrl.net 2 redirects
2 match.adsrvr.org 2 redirects
2 idsync.rlcdn.com 2 redirects
2 dpm.demdex.net 1 redirects www.bankinfosecurity.com
2 051-zxi-237.mktoresp.com munchkin.marketo.net
2 px.ads.linkedin.com 1 redirects www.bankinfosecurity.com
2 pbs.twimg.com www.bankinfosecurity.com
2 www.googletagmanager.com www.bankinfosecurity.com
2 munchkin.marketo.net www.bankinfosecurity.com
munchkin.marketo.net
2 f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com www.bankinfosecurity.com
2 s7.addthis.com www.bankinfosecurity.com
s7.addthis.com
1 pixel-a.basis.net 1 redirects
1 cdn01.basis.net www.googletagmanager.com
1 vue.comm100.com chatserver.comm100.com
1 fcf61c9f2c53987e8f6061928a962663.safeframe.googlesyndication.com securepubads.g.doubleclick.net
1 in.ml314.com ml314.com
1 www.linkedin.com 1 redirects
1 stats.g.doubleclick.net www.bankinfosecurity.com
1 adservice.google.com www.googletagservices.com
1 adservice.google.de www.googletagservices.com
1 script.crazyegg.com dnn506yrbagrg.cloudfront.net
1 m.addthis.com s7.addthis.com
1 v1.addthisedge.com s7.addthis.com
1 dnn506yrbagrg.cloudfront.net www.bankinfosecurity.com
1 chatserver.comm100.com www.bankinfosecurity.com
1 sjs.bizographics.com www.bankinfosecurity.com
1 bankinfosecurity.disqus.com www.bankinfosecurity.com
1 z.moatads.com s7.addthis.com
1 www.googletagservices.com www.bankinfosecurity.com
1 worker.ismgcorp.com www.bankinfosecurity.com
1 dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com www.bankinfosecurity.com
1 fonts.googleapis.com www.bankinfosecurity.com
211 54
Subject Issuer Validity Valid
ismg.io
Go Daddy Secure Certificate Authority - G2
2020-04-16 -
2021-07-26
a year crt.sh
upload.video.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
odc-prod-01.oracle.com
DigiCert Secure Site ECC CA-1
2020-07-22 -
2021-10-13
a year crt.sh
*.ssl.cf1.rackcdn.com
DigiCert SHA2 Secure Server CA
2020-04-19 -
2021-07-19
a year crt.sh
worker.ismgcorp.com
Go Daddy Secure Certificate Authority - G2
2020-02-13 -
2021-04-13
a year crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.marketo.net
DigiCert SHA2 Secure Server CA
2020-03-14 -
2021-04-13
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.gstatic.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
moatads.com
DigiCert SHA2 Secure Server CA
2020-01-17 -
2021-03-17
a year crt.sh
*.disqus.com
DigiCert SHA2 Secure Server CA
2020-04-20 -
2022-05-09
2 years crt.sh
*.ml314.com
Amazon
2020-02-17 -
2021-03-17
a year crt.sh
js.bizographics.com
DigiCert SHA2 Secure Server CA
2020-03-23 -
2022-03-28
2 years crt.sh
*.comm100.com
DigiCert SHA2 Secure Server CA
2020-02-12 -
2022-04-15
2 years crt.sh
*.cloudfront.net
DigiCert Global CA G2
2020-05-26 -
2021-04-21
a year crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2019-11-12 -
2020-11-18
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-06-09 -
2021-06-09
a year crt.sh
*.google.de
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2020-03-04 -
2020-09-04
6 months crt.sh
*.mktoresp.com
DigiCert SHA2 Secure Server CA
2020-01-17 -
2022-01-21
2 years crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
*.eyeota.net
Let's Encrypt Authority X3
2020-06-09 -
2020-09-07
3 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
misc-sni.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
www.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
cdn01.basis.net
Sectigo RSA Domain Validation Secure Server CA
2019-06-13 -
2021-06-12
2 years crt.sh
*.sitescout.com
RapidSSL RSA CA 2018
2020-01-15 -
2022-02-02
2 years crt.sh

This page contains 12 frames:

Primary Page: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Frame ID: 708DAFDE971419B93E128547823F8347
Requests: 167 HTTP requests in this frame

Frame: https://s7.addthis.com/static/sh.f48a1a04fe8dbf021b4cda1d.html
Frame ID: AC74122221E405DFE4D439AAAA71D36F
Requests: 1 HTTP requests in this frame

Frame: https://s7.addthis.com/static/sh.f48a1a04fe8dbf021b4cda1d.html
Frame ID: C201E3E15886D006A22AEDEB83347810
Requests: 1 HTTP requests in this frame

Frame: https://vue.comm100.com/js/bundle.968756fbcfe01603c32c1e0d9b0b9ab9.js
Frame ID: 511ADCD6F9AEA2B21315EFE96CE26EB5
Requests: 4 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&t_d=Microsoft%20Seizes%20Domains%20Used%20for%20COVID-19%20Phishing%20Scam&t_t=Microsoft%20Seizes%20Domains%20Used%20for%20COVID-19%20Phishing%20Scam&s_o=default
Frame ID: 880C5EC1EA2E52ED1CF0B2425959C4B6
Requests: 1 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Frame ID: 0AE828773DC40CDE46143241CA5912CC
Requests: 8 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Frame ID: 190604CECDC3409CDAAB2D0D0C114F06
Requests: 8 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Frame ID: 95BF9B954D8685FFAAD189924D92B1B7
Requests: 8 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Frame ID: CBF5ADE9421889E8F2E86E51FDB1C008
Requests: 8 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Frame ID: F0C252EC0317DFD0585A51EC579C5959
Requests: 8 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/210/runner.html
Frame ID: 7FBC96D28C327AF2BB1CBE8255DEF1E5
Requests: 1 HTTP requests in this frame

Frame: https://pixel.sitescout.com/dmp/asyncPixelSync
Frame ID: DF08176076B84C0F3AD6F0D1E4287AB9
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • script /\/tiny_?mce(?:\.min)?\.js/i

Overall confidence: 100%
Detected patterns
  • script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /addthis\.com\/js\//i

Overall confidence: 100%
Detected patterns
  • script /script\.crazyegg\.com\/pages\/scripts\/\d+\/\d+\.js/i

Overall confidence: 100%
Detected patterns
  • script /googletagservices\.com\/tag\/js\/gpt(?:_mobile)?\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • script /([\d.]+)?\/modernizr(?:.([\d.]+))?.*\.js/i

Overall confidence: 100%
Detected patterns
  • script /w\.sharethis\.com\//i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
  • script /jquery-ui.*\.js/i
  • html /(?:<link [^>]*href="[^"]*prettyPhoto(?:\.min)?\.css|<a [^>]*rel="prettyPhoto)/i

Overall confidence: 100%
Detected patterns
  • script /jquery-ui.*\.js/i

Overall confidence: 100%
Detected patterns
  • html /(?:<link [^>]*href="[^"]*prettyPhoto(?:\.min)?\.css|<a [^>]*rel="prettyPhoto)/i

Page Statistics

211
Requests

99 %
HTTPS

41 %
IPv6

34
Domains

54
Subdomains

36
IPs

9
Countries

10728 kB
Transfer

18182 kB
Size

14
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 141
  • https://www.google-analytics.com/r/collect?v=1&_v=j83&a=677957424&t=pageview&_s=1&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&ul=en-us&de=UTF-8&dt=Microsoft%20Seizes%20Domains%20Used%20for%20COVID-19%20Phishing%20Scam&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEDAAEAB~&jid=1980743201&gjid=1239009973&cid=1950358036.1595678702&tid=UA-212197-36&_gid=1147450682.1595678702&_r=1&z=1741624810 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-212197-36&cid=1950358036.1595678702&jid=1980743201&_gid=1147450682.1595678702&gjid=1239009973&_v=j83&z=1741624810
Request Chain 143
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&time=1595678702458 HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D749%26url%3Dhttps%253A%252F%252Fwww.bankinfosecurity.com%252Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576%26time%3D1595678702458%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&time=1595678702458&liSync=true
Request Chain 149
  • https://dpm.demdex.net/ibs:dpid=22052&dpuuid=3611936580515135583&redir= HTTP 302
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=3611936580515135583&redir=
Request Chain 150
  • https://idsync.rlcdn.com/395886.gif?partner_uid=3611936580515135583 HTTP 307
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTMzYxMTkzNjU4MDUxNTEzNTU4MxAAGg0I7r_w-AUSBQjoBxAAQgBKAA HTTP 307
  • https://ml314.com/csync.ashx?fp=4306fe0f9af72eabaac8fa6078487983a5802e114112ec5c99615371f55ee23ef4cb09cee1a4f8eb&person_id=3611936580515135583&eid=50082
Request Chain 151
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=b8e5e3a9-4cd2-4e5f-b5b8-d1c2dd8e8467 HTTP 302
  • https://ml314.com/csync.ashx?fp=b8e5e3a9-4cd2-4e5f-b5b8-d1c2dd8e8467&person_id=3611936580515135583&eid=53819
Request Chain 152
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3611936580515135583 HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3611936580515135583 HTTP 302
  • https://ml314.com/csync.ashx?fp=5fed130b1f2f7f1b2092290de243e7b2&eid=50146&person_id=3611936580515135583
Request Chain 153
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif HTTP 302
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif
Request Chain 205
  • https://pixel-a.basis.net/iap/64ead273d1f41aa7 HTTP 301
  • https://pixel.sitescout.com/iap/64ead273d1f41aa7

211 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
www.bankinfosecurity.com/
369 KB
53 KB
Document
General
Full URL
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
7cacff6e09cc65519d0db89371995cb348350945ea2e9f8cd683b54c27331235

Request headers

Host
www.bankinfosecurity.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:04:59 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Content-Encoding
gzip
Vary
Accept-Encoding
Set-Cookie
PHPSESSID=68bt35od2tabs01r1f513tkp9r; expires=Sat, 25-Jul-2020 16:04:59 GMT; Max-Age=14400; path=/
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
jquery-ui.min.css
www.bankinfosecurity.com/css-responsive/vendor/
25 KB
5 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/jquery-ui.min.css?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
fc54c09a7a71615ec35a22ed20afa4034588986ed88c3fc184b2c0bc637c33fb

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:04:59 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
4896
mediaelementplayer-updated.css
www.bankinfosecurity.com/css-responsive/vendor/
11 KB
3 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/mediaelementplayer-updated.css?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
1a0bbdba57f90a60fef89419fc940d8eae55c5b0d12ecbadde2beaef32ab2d90

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:04:59 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
2622
css
fonts.googleapis.com/
25 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
d3fb385aad2757e720c0e49ca0b807172ff255ad2dc2bf4b1998e632297800a9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 11:12:07 GMT
server
ESF
date
Sat, 25 Jul 2020 12:04:59 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 25 Jul 2020 12:04:59 GMT
main.css
www.bankinfosecurity.com/css-responsive/
231 KB
42 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/main.css?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
ba45c4b9710b1386b82a4354f829ee2f201e70742a2e646ffbedfa889e43d41f

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:04:59 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
43006
prettyPhoto.css
www.bankinfosecurity.com/css-responsive/
21 KB
3 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/prettyPhoto.css?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
7d0bada0d9b66aa1ca8eb906bb9736ca96e3859e9c05287a8f0cf5ffa9ff8760

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:04:59 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
2840
bis-hdr.desktop.r2.css
www.bankinfosecurity.com/css-responsive/vendor/
8 KB
2 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/bis-hdr.desktop.r2.css?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
eefc2533a82b69fab9b19b9e316bb606e70d17d61b57f9ea841b26c59624bc20

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:04:59 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
1956
bis-hdr.mobile.r2.css
www.bankinfosecurity.com/css-responsive/vendor/
9 KB
2 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/bis-hdr.mobile.r2.css?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
77c36fad51d04a56e55d1d454094c4312c3b11443f42b456c3f5082d66696be1

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:04:59 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
2133
font-awesome.min.css
www.bankinfosecurity.com/css-responsive/vendor/
22 KB
5 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/font-awesome.min.css?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
93f466f6b1a81c848140e51c839a5372034ab22182601e86dd86947ad3a7fe94

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:04:59 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
5049
jquery.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
91 KB
33 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
eccabf5cc7613433c3ddc71ff34391ae850d304d3aceb5666868c4947134f3b5

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:04:59 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
33094
modernizr.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
0
0
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/modernizr.js?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 12:05:00 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Keep-Alive
timeout=5, max=99
Expires
Thu, 19 Nov 1981 08:52:00 GMT
bootstrap.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
35 KB
9 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/bootstrap.min.js?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
3fede2d0c0a8c93b0c5d0ab0c38289a5743bb88720255b8298c520d2e3d90939

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
9328
jquery.validate.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
21 KB
7 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.validate.min.js?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
e51831d751ef667b1f703a47bb05802b681e6a30816f5cce0d56c3552a4eaa31

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
6689
mediaelement-and-player-updated.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
154 KB
38 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/mediaelement-and-player-updated.min.js?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
4e7304371ef9bcaea396e8928a9647f8306c296b9195c8763848d70c7f6f1390

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
38476
tinymce.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
295 KB
101 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/tinymce.min.js?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
247d04c4d14c60a79c16245a74a792a662f9e7adf784d68edd4520a35ec90251

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
jquery.validate.bootstrap.popover.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
2 KB
1 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.validate.bootstrap.popover.js?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
04d304d7ee49ac157f146382a46f02a666279bd7f29074f50e863b88f2affae9

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
926
jquery.placeholder.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
2 KB
1 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.placeholder.js?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
256a489beea4a14eca458f6e5436758f1fcb8dd34034d3c36dd21b22a5841f3b

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
922
jquery-ui.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
222 KB
60 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery-ui.min.js?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
78cf63898c91ce3b95e37bc53e07adba5c2ee705ff28c2dd1dd784173c264ad1

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
61345
crypt_des.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
9 KB
3 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/crypt_des.js?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
aed1d71b7280c09f06dc1f8e87795f9d89f7a1a8ab1af32ff8c92037ddeed6ee

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
2857
addthis_widget.js
s7.addthis.com/js/250/
353 KB
114 KB
Script
General
Full URL
https://s7.addthis.com/js/250/addthis_widget.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.248.44 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-44.deploy.static.akamaitechnologies.com
Software
nginx/1.15.8 /
Resource Hash
eb12a261a24e54883613710a4c12f4d9205f634ca1a29d1df07f90105a93e746
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=15724800; includeSubDomains
content-encoding
gzip
last-modified
Thu, 04 Jun 2020 15:49:19 GMT
server
nginx/1.15.8
etag
"5ed917ff-5834c"
vary
Accept-Encoding
x-distribution
99
content-type
application/javascript
status
200
cache-control
public, max-age=600
date
Sat, 25 Jul 2020 12:05:00 GMT
x-host
s7.addthis.com
content-length
116324
headerlogo-bis.png
www.bankinfosecurity.com/images-responsive/logos/
2 KB
2 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images-responsive/logos/headerlogo-bis.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
ea3325c2094d82033ce9583d4180194fb82729dfae65b62925831a88a6838d7c

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
1682
nsa-cisa-warn-threats-to-us-critical-infrastructure-showcase_image-8-a-14699.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
219 KB
220 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/nsa-cisa-warn-threats-to-us-critical-infrastructure-showcase_image-8-a-14699.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e1c9accef81dc62a6ebe1d132b9ae23842df41c43383458996461d540809cfcf

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Last-Modified
Fri, 24 Jul 2020 18:03:07 GMT
X-Trans-Id
tx315620995ecd4113b8aa2-005f1b29f8dfw1
ETag
33a267f2affc3052b648de6db2436585
Content-Type
image/jpeg
X-Timestamp
1595613786.92171
Cache-Control
public, max-age=23402
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
224589
Expires
Sat, 25 Jul 2020 18:35:02 GMT
how-criminals-are-using-ppe-as-money-laundering-tool-showcase_image-10-a-14698.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
27 KB
27 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/how-criminals-are-using-ppe-as-money-laundering-tool-showcase_image-10-a-14698.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6f8163e09ba08628830b4ccdccca4575aa911890b05ab6ce05c39f8ea0a35425

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Last-Modified
Fri, 24 Jul 2020 16:59:43 GMT
X-Trans-Id
tx639374104e644765b6dc9-005f1b17cedfw1
ETag
963c315db63a1ba142d31217373feb81
Content-Type
image/jpeg
X-Timestamp
1595609982.02200
Cache-Control
public, max-age=18770
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
27378
Expires
Sat, 25 Jul 2020 17:17:50 GMT
covid-19-impact-uncontrolled-spread-showcase_image-5-a-14694.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
53 KB
53 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/covid-19-impact-uncontrolled-spread-showcase_image-5-a-14694.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
961cae7c129fa75c5f3e4cb08d5007460a9c9e8cbe3cce04dc2fa41f4a0c8554

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Last-Modified
Fri, 24 Jul 2020 08:30:41 GMT
X-Trans-Id
txd8e2c4d6253f4a1b8b970-005f1ad555dfw1
ETag
4b2630bcfaa3212660ee443bc2210d94
Content-Type
image/jpeg
X-Timestamp
1595579440.19871
Cache-Control
public, max-age=1844
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
53895
Expires
Sat, 25 Jul 2020 12:35:44 GMT
could-large-scale-iiot-failures-be-on-horizon-showcase_image-7-a-14686.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
96 KB
97 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/could-large-scale-iiot-failures-be-on-horizon-showcase_image-7-a-14686.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a5808ad6a04760e2162441aaf9a7e32e0eab20d501b5da8007d56c98056f1ba0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Fri, 24 Jul 2020 02:59:34 GMT
X-Trans-Id
tx42585fa97d1a4d8089ef6-005f1ad571dfw1
ETag
a803e42df9a2b551d5dc56758711eb3f
Content-Type
image/jpeg
X-Timestamp
1595559573.80873
Cache-Control
public, max-age=1723
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
98645
Expires
Sat, 25 Jul 2020 12:33:44 GMT
celebrity-twitter-hack-what-happened-showcase_image-1-i-4732.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
76 KB
76 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/celebrity-twitter-hack-what-happened-showcase_image-1-i-4732.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b1f2d0e271c0663f8826078dcf6730812892131c5c56d0845e8f3b98494a55ca

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Last-Modified
Thu, 23 Jul 2020 21:20:00 GMT
X-Trans-Id
tx706a0fd3f682439e9cb29-005f1a9aa2dfw1
ETag
e08fea74e11b2882303f0d582e93ae8e
Content-Type
image/jpeg
X-Timestamp
1595539199.98879
Cache-Control
public, max-age=64958
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
77457
Expires
Sun, 26 Jul 2020 06:07:38 GMT
security-analysis-us-outmaneuvers-uk-on-huawei-question-showcase_image-4-i-4730.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
154 KB
155 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-analysis-us-outmaneuvers-uk-on-huawei-question-showcase_image-4-i-4730.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
def3e032ce15c2f9f4c21b08e56e20d99779fad27f9088db599f62738e5d8a4d

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Last-Modified
Thu, 16 Jul 2020 18:05:32 GMT
X-Trans-Id
txf8572f0c27374c078b03b-005f114ac2dfw1
ETag
81246d21c8adafe8185673bf46421f23
Content-Type
image/jpeg
X-Timestamp
1594922731.32618
Cache-Control
public, max-age=17801
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
157827
Expires
Sat, 25 Jul 2020 17:01:41 GMT
covid-19-contact-tracing-app-privacy-concerns-showcase_image-4-i-4731.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
42 KB
42 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-contact-tracing-app-privacy-concerns-showcase_image-4-i-4731.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
bd848b96c8baafa5856535df53748cbf995f50edf60b149cd0ced474ca6a978e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Last-Modified
Thu, 16 Jul 2020 19:24:32 GMT
X-Trans-Id
txeed98a2899e14c2cb70fc-005f11e6e2dfw1
ETag
5ae9633a943ef68e9be56b47133afabc
Content-Type
image/jpeg
X-Timestamp
1594927471.67661
Cache-Control
public, max-age=49256
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43066
Expires
Sun, 26 Jul 2020 01:45:56 GMT
key-digital-payment-identity-management-issues-showcase_image-2-i-4729.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
93 KB
94 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/key-digital-payment-identity-management-issues-showcase_image-2-i-4729.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
667790927d4884fc2d68b6e1764f4e047ddb2090131e05ad04d1b6047f433ef7

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Last-Modified
Wed, 15 Jul 2020 14:32:34 GMT
X-Trans-Id
tx4aedb64ca55f4b9d993af-005f0f1cbedfw1
ETag
8a77734105a2f473c2d4d45f51191a60
Content-Type
image/jpeg
X-Timestamp
1594823553.48272
Cache-Control
public, max-age=21134
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95500
Expires
Sat, 25 Jul 2020 17:57:14 GMT
twitter-crypto-scammers-werent-first-to-crack-showcase_image-5-p-2918.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
62 KB
62 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/twitter-crypto-scammers-werent-first-to-crack-showcase_image-5-p-2918.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a73ead944e15b04886e543308dd33fbb2bb3dbba5231ef541eef7541af2a6df9

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Wed, 22 Jul 2020 13:51:06 GMT
X-Trans-Id
txfafa7101f27f41549448e-005f185604dfw1
ETag
681b492a327b0906264dedac32f36cdc
Content-Type
image/jpeg
X-Timestamp
1595425865.11779
Cache-Control
public, max-age=73883
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
63156
Expires
Sun, 26 Jul 2020 08:36:24 GMT
britains-5g-policy-failure-no-trusted-huawei-alternates-showcase_image-8-p-2917.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
108 KB
109 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/britains-5g-policy-failure-no-trusted-huawei-alternates-showcase_image-8-p-2917.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1a4348c0cc0a649baee8b02e01211089d5e04c692817a63c47116b088c03c3cc

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Wed, 15 Jul 2020 11:36:03 GMT
X-Trans-Id
txf77dace670254d3fb09f7-005f0ef59adfw1
ETag
ed931666b50c99c55e8f1d67278918c0
Content-Type
image/jpeg
X-Timestamp
1594812962.02024
Cache-Control
public, max-age=17805
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
110781
Expires
Sat, 25 Jul 2020 17:01:46 GMT
the-cats-meow-petnet-perils-consumer-iot-showcase_image-1-p-2915.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
128 KB
128 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/the-cats-meow-petnet-perils-consumer-iot-showcase_image-1-p-2915.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6720bc1fe77f9cf2967fea5f1d11794dd3da2291fe17b585ddac0c0237a90cac

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Mon, 13 Jul 2020 03:08:04 GMT
X-Trans-Id
txb07cbc1fe8054f33b1190-005f0c6225dfw1
ETag
b52e37234e1d697ea2797958ff05fcac
Content-Type
image/jpeg
X-Timestamp
1594609683.66450
Cache-Control
public, max-age=9290
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
130694
Expires
Sat, 25 Jul 2020 14:39:51 GMT
no-invisible-god-inside-fxmsps-opsec-fail-showcase_image-9-p-2916.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
82 KB
83 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/no-invisible-god-inside-fxmsps-opsec-fail-showcase_image-9-p-2916.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d736ec91f3682f7d3ab7f85ba61bf31f118bb3c914885d8890004ee5616e3385

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Mon, 13 Jul 2020 13:04:20 GMT
X-Trans-Id
txa9dacebc33f2441d84c7b-005f0c7aa0dfw1
ETag
929fc8848ed48812324014b9b39dfec9
Content-Type
image/jpeg
X-Timestamp
1594645459.62755
Cache-Control
public, max-age=18631
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
84461
Expires
Sat, 25 Jul 2020 17:15:32 GMT
analysis-occs-decision-on-banks-cryptocurrency-showcase_image-3-a-14691.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
34 KB
34 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/analysis-occs-decision-on-banks-cryptocurrency-showcase_image-3-a-14691.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
893feb7420037aa56a303806c651a9649938beba34743e0510d132db2e13c99c

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Thu, 23 Jul 2020 19:28:43 GMT
X-Trans-Id
txb832a25d5e2a491aa6147-005f19e924dfw1
ETag
0e8c400522647a1d0f47d68c827bcd8d
Content-Type
image/jpeg
X-Timestamp
1595532522.24566
Cache-Control
public, max-age=19286
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
34542
Expires
Sat, 25 Jul 2020 17:26:27 GMT
managing-itot-convergence-risk-showcase_image-8-a-14643.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
27 KB
27 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/managing-itot-convergence-risk-showcase_image-8-a-14643.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
152e9b2ccea80e23db38a47c13fcd0b132ff403d9758c698d5afb66566a51b25

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Fri, 17 Jul 2020 14:58:32 GMT
X-Trans-Id
tx2d179b7e4c5c41479aca3-005f19a3dedfw1
ETag
b8cdb9953ee02bf7dabafd2b41241670
Content-Type
image/jpeg
X-Timestamp
1594997911.97658
Cache-Control
public, max-age=9705
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
27189
Expires
Sat, 25 Jul 2020 14:46:46 GMT
live-webinar-on-line-privacy-security-seamless-patient-experience-showcase_image-3-w-2539.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
66 KB
67 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-on-line-privacy-security-seamless-patient-experience-showcase_image-3-w-2539.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c3d76392ef3f9a467c13e1a91d2c710372b9501a38c94b18e5d070c79eff16c3

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Wed, 08 Jul 2020 20:25:42 GMT
X-Trans-Id
txeaf3a83b616d4fe89bfeb-005f18721bdfw1
ETag
4dea2ac18153b21ecb4f2a4ad3717739
Content-Type
image/jpeg
X-Timestamp
1594239941.17352
Cache-Control
public, max-age=1180
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
67973
Expires
Sat, 25 Jul 2020 12:24:41 GMT
live-webinar-3-things-to-consider-when-building-secure-identity-based-perimeter-showcase_image-2-w-2465.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
100 KB
101 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-3-things-to-consider-when-building-secure-identity-based-perimeter-showcase_image-2-w-2465.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
aa8d0e59eac163825d167855dfb420a265ff91df05d9196add29a3f68ebdad13

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Wed, 27 May 2020 19:30:24 GMT
X-Trans-Id
tx40eb9ade29ee48868df9b-005f16bf7cdfw1
ETag
9b206c615a0178068be0f5d27c92659d
Content-Type
image/jpeg
X-Timestamp
1590607823.82810
Cache-Control
public, max-age=55328
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
102553
Expires
Sun, 26 Jul 2020 03:27:09 GMT
live-webinar-redefining-endpoint-security-three-ways-to-maximize-operational-efficiency-showcase_image-2-w-2550.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
127 KB
128 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-redefining-endpoint-security-three-ways-to-maximize-operational-efficiency-showcase_image-2-w-2550.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b0af90c2d12963bd630eccfa71bfe80b8a2b66088df44b276a81656dec94f402

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Mon, 20 Jul 2020 20:49:49 GMT
X-Trans-Id
tx254c9783f81d466b86b61-005f177ddfdfw1
ETag
9f0980f45fe7d3babbb01396bf7dd0d7
Content-Type
image/jpeg
X-Timestamp
1595278188.62091
Cache-Control
public, max-age=28251
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
130214
Expires
Sat, 25 Jul 2020 19:55:52 GMT
work-from-anywhere-mission-critical-workforce-needs-dedicated-portable-secure-connectivity-showcase_image-3-w-2548.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
100 KB
101 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/work-from-anywhere-mission-critical-workforce-needs-dedicated-portable-secure-connectivity-showcase_image-3-w-2548.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
aa8d0e59eac163825d167855dfb420a265ff91df05d9196add29a3f68ebdad13

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Fri, 17 Jul 2020 17:59:12 GMT
X-Trans-Id
tx0ddef56fc5364effab519-005f170f16dfw1
ETag
9b206c615a0178068be0f5d27c92659d
Content-Type
image/jpeg
X-Timestamp
1595008751.41205
Cache-Control
public, max-age=67725
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
102553
Expires
Sun, 26 Jul 2020 06:53:46 GMT
live-webinar-rise-machines-state-unmanaged-iot-device-security-showcase_image-2-w-2502.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
129 KB
129 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-rise-machines-state-unmanaged-iot-device-security-showcase_image-2-w-2502.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f819134b317d8fc086aca3265159b39381784c56fd29512542fc6c55fb4c7d74

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Tue, 16 Jun 2020 20:03:17 GMT
X-Trans-Id
txa3462c4e790948208fcc4-005f0984f3dfw1
ETag
78c3ef13e372999ad58a4856ed25a94a
Content-Type
image/jpeg
X-Timestamp
1592337796.98292
Cache-Control
public, max-age=55407
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
132121
Expires
Sun, 26 Jul 2020 03:28:28 GMT
live-webinar-3-mistakes-that-could-ruin-your-multi-cloud-strategy-showcase_image-8-w-2491.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
38 KB
39 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-3-mistakes-that-could-ruin-your-multi-cloud-strategy-showcase_image-8-w-2491.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
923153c4ea1a7de9b0a936536091e8c191eb05adf5b79338945d0bef0fcbcdea

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Thu, 11 Jun 2020 15:53:20 GMT
X-Trans-Id
txc468ab8e29ec4f6a9ebd3-005f1bd726dfw1
ETag
708d851bdfb1b32b0f859e727848a4f2
Content-Type
image/jpeg
X-Timestamp
1591890799.53337
Cache-Control
public, max-age=67719
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
39277
Expires
Sun, 26 Jul 2020 06:53:40 GMT
live-webinar-exposed-environments-cyber-ai-insider-threats-showcase_image-3-w-2540.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
84 KB
84 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-exposed-environments-cyber-ai-insider-threats-showcase_image-3-w-2540.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
52ee89d110520b977224c94026f5c06b2cf874598dd3b59c738980f43a33aae9

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Mon, 13 Jul 2020 21:22:50 GMT
X-Trans-Id
tx75973cc6ab6b4d3d882cf-005f15e33ddfw1
ETag
e48ae8333b3bce6359349aa372baf6bd
Content-Type
image/jpeg
X-Timestamp
1594675369.03869
Cache-Control
public, max-age=1208
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
85917
Expires
Sat, 25 Jul 2020 12:25:09 GMT
live-webinar-8-ways-to-tackle-biggest-access-related-information-security-challenges-in-financial-services-showcase_image-7-w-2514.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
98 KB
98 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-8-ways-to-tackle-biggest-access-related-information-security-challenges-in-financial-services-showcase_image-7-w-2514.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ee44668bb58e135de33ef50ebabb98f6251dba5149d2368d247d8754cc7d5d18

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Mon, 22 Jun 2020 16:06:11 GMT
X-Trans-Id
tx5247f35b15a54bab966e2-005f003413dfw1
ETag
96664496ee6115609fcc8ca4fa68dd27
Content-Type
image/jpeg
X-Timestamp
1592841970.43529
Cache-Control
public, max-age=55303
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
100085
Expires
Sun, 26 Jul 2020 03:26:44 GMT
david-matthews-largeImage-7-a-1190.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
28 KB
29 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/david-matthews-largeImage-7-a-1190.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ec11491ce5dc818c4c79c8817360556805f33ee684311376e0096cb531c5f072

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Mon, 16 Feb 2015 22:15:45 GMT
X-Trans-Id
txb579661c3d134c239e86c-005f174144dfw1
ETag
2f2fcddfb1998de60df652d449a61268
Content-Type
image/jpeg
X-Timestamp
1424124944.69925
Cache-Control
public, max-age=3829
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
29145
Expires
Sat, 25 Jul 2020 13:08:50 GMT
larry-clinton-largeImage-10-a-1620.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
43 KB
43 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/larry-clinton-largeImage-10-a-1620.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a1483056e797c34ae2e7416a95bfce804f416e3e9e5ab209bf41404b32deb64f

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Fri, 13 May 2016 19:48:52 GMT
X-Trans-Id
txf8e7f1ceea7d4937b9a0b-005f135dffdfw1
ETag
479137551c1977920cfca2a77eaa9d0e
Content-Type
image/jpeg
X-Timestamp
1463168931.82096
Cache-Control
public, max-age=16208
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43740
Expires
Sat, 25 Jul 2020 16:35:09 GMT
shawn-tuma-largeImage-5-a-2240.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
38 KB
38 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/shawn-tuma-largeImage-5-a-2240.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
5589a2e8eb40b1184e7d77519c26b8012541b1df4935467ff32291ef36a94718

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Tue, 27 Feb 2018 22:08:59 GMT
X-Trans-Id
txb98179ea669a4888ab112-005f055e64dfw1
ETag
ecbfe414d81008eb83e99e321a80e05e
Content-Type
image/jpeg
X-Timestamp
1519769338.42724
Cache-Control
public, max-age=41852
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
38941
Expires
Sat, 25 Jul 2020 23:42:33 GMT
gray-taylor-largeImage-9-a-1204.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
45 KB
46 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/gray-taylor-largeImage-9-a-1204.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c589a9aa2b90347b435ac3e026e9bb6cc43b107cdcf31c077680d492515c3c9e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Thu, 05 Mar 2015 17:44:48 GMT
X-Trans-Id
txdbcc2e71891a47f6bb53f-005f1a7ef1dfw1
ETag
d257326c9dafbb32b8b197d2d117f313
Content-Type
image/jpeg
X-Timestamp
1425577487.10836
Cache-Control
public, max-age=77261
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
46218
Expires
Sun, 26 Jul 2020 09:32:42 GMT
3-ways-behavioral-biometrics-spot-criminals-protect-customers-logo-4-w-6456.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
63 KB
63 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/3-ways-behavioral-biometrics-spot-criminals-protect-customers-logo-4-w-6456.JPG
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
38d6ea5491bc3771a5a5e7e11c694c38504a21f4b07f4dddc07da2112c508579

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Fri, 24 Jul 2020 15:58:31 GMT
X-Trans-Id
txf71d2d4823884aed9305c-005f1b0c93dfw1
ETag
7a0a9d3d9062af016a2600588422c495
Content-Type
image/jpeg
X-Timestamp
1595606310.04448
Cache-Control
public, max-age=15895
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
64125
Expires
Sat, 25 Jul 2020 16:29:56 GMT
five-lessons-learned-from-pivot-to-distributed-workforce-logo-3-w-6448.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
57 KB
57 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/five-lessons-learned-from-pivot-to-distributed-workforce-logo-3-w-6448.JPG
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4534645ae98e76c12275643cb28cbd22e255aae7b2fcdc4e905347489f99cd69

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Thu, 23 Jul 2020 17:37:55 GMT
X-Trans-Id
txa0587c3c1f7e4fec8b67b-005f19de97dfw1
ETag
fb89f68fa601e1ca64279500747dd621
Content-Type
image/jpeg
X-Timestamp
1595525874.03944
Cache-Control
public, max-age=17134
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
58447
Expires
Sat, 25 Jul 2020 16:50:35 GMT
email-fraud-landscape-summer-2020-pdf-2-w-6444.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
251 KB
251 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/email-fraud-landscape-summer-2020-pdf-2-w-6444.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c8c525defd4291da149b4a8cd93654a194403a87f9b500de4868394dd40a894e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Wed, 22 Jul 2020 17:18:07 GMT
X-Trans-Id
tx4b2cca8e0b724d9db2de6-005f19ec69dfw1
ETag
ec9e83911442298221f33931a6a2250d
Content-Type
image/jpeg
X-Timestamp
1595438286.24832
Cache-Control
public, max-age=20559
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
256780
Expires
Sat, 25 Jul 2020 17:47:40 GMT
multi-factor-authentication-evaluation-guide-logo-6-w-6437.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
24 KB
24 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/multi-factor-authentication-evaluation-guide-logo-6-w-6437.JPG
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
bc400f59ff1bfb460bc1f3969b132423f1328d942edbdc1651b0147557580613

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Fri, 17 Jul 2020 20:11:35 GMT
X-Trans-Id
tx4dfa455f6f3346d0841e1-005f170557dfw1
ETag
2c9c8e658238c62a017c34fe46715fad
Content-Type
image/jpeg
X-Timestamp
1595016694.78536
Cache-Control
public, max-age=64857
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
24686
Expires
Sun, 26 Jul 2020 06:05:58 GMT
combatting-cybercrime-pdf-9-h-103.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
358 KB
358 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/combatting-cybercrime-pdf-9-h-103.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7ff5b98c09ec9d2af43d4108160ea0455f91f415f83031cc79fbe24a3a765bb8

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Tue, 26 Nov 2019 19:37:47 GMT
X-Trans-Id
tx817ae584a6c0434bb6e03-005f12b382dfw1
ETag
11a3adb400c0ff282a505428b1d7be73
Content-Type
image/jpeg
X-Timestamp
1574797066.57975
Cache-Control
public, max-age=20501
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
366322
Expires
Sat, 25 Jul 2020 17:46:42 GMT
top-canadian-cyber-threats-expected-in-2020-logo-9-h-102.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
76 KB
77 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/top-canadian-cyber-threats-expected-in-2020-logo-9-h-102.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
eb9ec684a7198fded61e248eaff2d28d0c9f8a15dfee8d9afff66aa6ff200461

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Mon, 28 Oct 2019 13:57:45 GMT
X-Trans-Id
txdfb6e237dbed47d3b393f-005eb8eaa5dfw1
ETag
69913c61181f1fc9d730d6c8298e55c4
Content-Type
image/jpeg
X-Timestamp
1572271064.63410
Cache-Control
public, max-age=22750
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
78320
Expires
Sat, 25 Jul 2020 18:24:11 GMT
leveraging-new-technologies-in-fraud-investigations-logo-7-h-101.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
197 KB
198 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/leveraging-new-technologies-in-fraud-investigations-logo-7-h-101.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c70242480ad0a0ecc7c305d659f1fdb3a9cb1eb480927b46f8bd62d33ed0f8b2

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Tue, 15 Oct 2019 14:06:53 GMT
X-Trans-Id
tx386a5bb1886e403f8273d-005f1bd726dfw1
ETag
e3e068e355cdbfaa15e88b627d7ebc55
Content-Type
image/jpeg
X-Timestamp
1571148412.42493
Cache-Control
public, max-age=67769
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
202154
Expires
Sun, 26 Jul 2020 06:54:30 GMT
collaboration-avoiding-operational-conflicts-taking-on-new-roles-logo-10-h-100.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
87 KB
88 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/collaboration-avoiding-operational-conflicts-taking-on-new-roles-logo-10-h-100.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4c57a77761f2639985b760e69c5bbaffceb6100559dcf3296d3cc96ea6a0d305

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Wed, 02 Oct 2019 13:41:41 GMT
X-Trans-Id
tx51c65d379db049f295cc2-005f12b382dfw1
ETag
36c70127fa172aa8ce8cd235fddf4c97
Content-Type
image/jpeg
X-Timestamp
1570023700.81183
Cache-Control
public, max-age=46393
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
89481
Expires
Sun, 26 Jul 2020 00:58:14 GMT
securing-telemedicine-future-remote-healthcare-showcase_image-4-s-82.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
78 KB
78 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/securing-telemedicine-future-remote-healthcare-showcase_image-4-s-82.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
88c5a42e7fbc0839487147414a88531996b455a15cfc7d43dbc0102e55490f89

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Fri, 19 Jun 2020 20:27:30 GMT
X-Trans-Id
tx4964de3a64e948988ed8e-005f0984f3dfw1
ETag
277c051b9980d6d67e9279ed59b4b968
Content-Type
image/jpeg
X-Timestamp
1592598449.94175
Cache-Control
public, max-age=42645
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
79854
Expires
Sat, 25 Jul 2020 23:55:46 GMT
managing-identity-governance-data-breach-risks-todays-remote-workforce-showcase_image-7-s-80.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
87 KB
87 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/managing-identity-governance-data-breach-risks-todays-remote-workforce-showcase_image-7-s-80.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
dc13abd25a627a2481bced8a69e5daace0cac7eeb2ee19e7bc5b16852adc4279

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Fri, 24 Apr 2020 20:49:35 GMT
X-Trans-Id
txee68ea5d2fdb420aac02c-005f129548dfw1
ETag
798bc33a31e70aade019309a9fa16e27
Content-Type
image/jpeg
X-Timestamp
1587761374.72132
Cache-Control
public, max-age=24920
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88866
Expires
Sat, 25 Jul 2020 19:00:21 GMT
taking-pulse-government-cybersecurity-2020-showcase_image-4-s-77.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
95 KB
95 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/taking-pulse-government-cybersecurity-2020-showcase_image-4-s-77.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f12bfcfe32a118f715dbfbd7c13833f73ed857e42dae19f8ef24fc8b473840af

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Mon, 23 Mar 2020 21:52:35 GMT
X-Trans-Id
tx1178fc87e0c1480e8477f-005f0dc15adfw1
ETag
4af1e925902f765709fbac19d76f9149
Content-Type
image/jpeg
X-Timestamp
1585000354.21724
Cache-Control
public, max-age=28185
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
97383
Expires
Sat, 25 Jul 2020 19:54:46 GMT
2020-faces-fraud-survey-showcase_image-4-s-75.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
82 KB
83 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/2020-faces-fraud-survey-showcase_image-4-s-75.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3d7510063e1b2e52048eb4de8e364e2d5516dcb3dfa3b30feab3e4c10d785726

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Thu, 21 Nov 2019 17:08:18 GMT
X-Trans-Id
tx855927e27ec84fde99622-005f1bd726dfw1
ETag
6435f83ec3a957ed676e16f2c26353cf
Content-Type
image/jpeg
X-Timestamp
1574356097.60397
Cache-Control
public, max-age=67716
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
84215
Expires
Sun, 26 Jul 2020 06:53:37 GMT
your-cloud-strategy-needs-data-strategy-pdf-1-w-6436.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
141 KB
141 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/your-cloud-strategy-needs-data-strategy-pdf-1-w-6436.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
abdfde4e90b2c1559cdf4eef5bc79b7d60e9351e81fa5e8366dcc70e4aece5f2

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Fri, 17 Jul 2020 06:27:52 GMT
X-Trans-Id
tx280b929d6fb944a5bc74d-005f17b4d2dfw1
ETag
81ab811870549594a0f94c24f997f7b4
Content-Type
image/jpeg
X-Timestamp
1594967271.68017
Cache-Control
public, max-age=31270
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
144129
Expires
Sat, 25 Jul 2020 20:46:11 GMT
empty_menu_image.png
www.bankinfosecurity.com/images/navigation/generic/
5 KB
4 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images/navigation/generic/empty_menu_image.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
69278fe35261286939e10f3832f461f9bf6addf267ffe0134e26be3d313dbd7d

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=93
Content-Length
3692
redefining-mobile-security-and-works-showcase_image-7-w-2273.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
187 KB
187 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/redefining-mobile-security-and-works-showcase_image-7-w-2273.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f5f24ffc5d931243a6e2818cac716ed061b7cf0065aead0b1ab77e8c2af890cb

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Mon, 16 Dec 2019 14:31:16 GMT
X-Trans-Id
txeba53b672c31445391ebd-005f07f8bfdfw1
ETag
0361dfeccb1a59b88690bb5349e1ca4a
Content-Type
image/jpeg
X-Timestamp
1576506675.18748
Cache-Control
public, max-age=76286
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
191395
Expires
Sun, 26 Jul 2020 09:16:27 GMT
ethics-ml-ai-showcase_image-5-w-2274.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
172 KB
172 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/ethics-ml-ai-showcase_image-5-w-2274.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7bcd31cd48941d1287630c9f1f852616cf59a1d86e3456ebee40bb2ea9519e78

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Mon, 16 Dec 2019 14:40:21 GMT
X-Trans-Id
txfc5e4fb4c9de420888fdd-005f06300adfw1
ETag
3f868326180ec04482c8f7f7026be9ca
Content-Type
image/jpeg
X-Timestamp
1576507220.38776
Cache-Control
public, max-age=70380
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
175715
Expires
Sun, 26 Jul 2020 07:38:01 GMT
ai-disruption-cybersecurity-showcase_image-9-w-2261.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
163 KB
164 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/ai-disruption-cybersecurity-showcase_image-9-w-2261.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
652663d1ec2a8aed95a736ce7166461c7ab50b432012166b69af6c042eb88668

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Wed, 04 Dec 2019 21:13:21 GMT
X-Trans-Id
tx02d315253ed14d52afd03-005f1c1feddfw1
ETag
045e870b53fcee3be51a01108b1d0ac2
Content-Type
image/jpeg
X-Timestamp
1575494000.53666
Cache-Control
public, max-age=86392
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
167114
Expires
Sun, 26 Jul 2020 12:04:53 GMT
captured-longevity-stolen-data-until-its-sold-on-underground-showcase_image-9-w-2246.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
185 KB
185 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/captured-longevity-stolen-data-until-its-sold-on-underground-showcase_image-9-w-2246.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2ca9b994161012bc02b2e552e5a2f5a32eb10776b4821c05dc42ca561038fa7e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Wed, 04 Dec 2019 21:40:21 GMT
X-Trans-Id
txefacb1f2c3df4b5c822eb-005f1c1feddfw1
ETag
62953df982611b38c60a7054b159b4a8
Content-Type
image/jpeg
X-Timestamp
1575495620.11909
Cache-Control
public, max-age=86372
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
189437
Expires
Sun, 26 Jul 2020 12:04:33 GMT
best-practices-for-implementing-comprehensive-identity-governance-solution-showcase_image-7-w-2126.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
158 KB
158 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/best-practices-for-implementing-comprehensive-identity-governance-solution-showcase_image-7-w-2126.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9cfda57bf5032c33579ba5213ea3f6f04ae76eddf8169ccc03b65dad46387700

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Wed, 21 Aug 2019 16:07:31 GMT
X-Trans-Id
tx38942196d77245139f698-005f130755dfw1
ETag
ac5ec7485b98a4e425694526cac66c60
Content-Type
image/jpeg
X-Timestamp
1566403650.23177
Cache-Control
public, max-age=38893
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
161648
Expires
Sat, 25 Jul 2020 22:53:14 GMT
reducing-risk-now-showcase_image-7-w-2052.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
134 KB
134 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/reducing-risk-now-showcase_image-7-w-2052.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
971f0c03a1e63271a19b7de81d084c6acf81e7506dae8b31a0c6587c6ddf6a34

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Fri, 28 Jun 2019 20:15:01 GMT
X-Trans-Id
tx82e1dd6804be4946a8195-005f16be57dfw1
ETag
79f8120d6bfab756d31e5f38dbdd523c
Content-Type
image/jpeg
X-Timestamp
1561752900.06505
Cache-Control
public, max-age=65804
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
136753
Expires
Sun, 26 Jul 2020 06:21:45 GMT
preventing-insider-threat-protecting-your-patient-clinical-data-while-managing-risk-showcase_image-3-w-1989.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
139 KB
139 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/preventing-insider-threat-protecting-your-patient-clinical-data-while-managing-risk-showcase_image-3-w-1989.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
236ad875a601265ceb33879364d2f9122a257b610e21334a46b0ca33454e4307

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Fri, 28 Jun 2019 20:30:40 GMT
X-Trans-Id
txa2536523ae794e79aac7e-005f1c1feedfw1
ETag
e8e31602e0084c4577817eb9534cf306
Content-Type
image/jpeg
X-Timestamp
1561753839.76116
Cache-Control
public, max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
142116
Expires
Sun, 26 Jul 2020 12:05:02 GMT
identity-access-management-so-many-breaches-so-many-stolen-identities-showcase_image-10-w-1963.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
163 KB
163 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/identity-access-management-so-many-breaches-so-many-stolen-identities-showcase_image-10-w-1963.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
136f3157d0bad42f6fa86a91c85ab4efa23741eda709287f5ea93afdb94728ff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Mon, 01 Jul 2019 14:00:07 GMT
X-Trans-Id
txcb9967bb7b524b3080668-005f14360edfw1
ETag
ae36a8c355f1bad9bc0b48ec1e0ddfb4
Content-Type
image/jpeg
X-Timestamp
1561989606.35058
Cache-Control
public, max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
166650
Expires
Sun, 26 Jul 2020 12:05:02 GMT
todays-trends-in-e-commerce-fraud-showcase_image-4-a-13927.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
69 KB
70 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/todays-trends-in-e-commerce-fraud-showcase_image-4-a-13927.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
073ce3168634ada329dac67b06abf8e481474d636b512e6b558cc779d00e8fab

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Wed, 11 Mar 2020 18:40:32 GMT
X-Trans-Id
tx20e5a703d3cd4b93bc715-005e8cb62bdfw1
ETag
b710debdf96f2b48a22aa4a8f63dc7d4
Content-Type
image/jpeg
X-Timestamp
1583952031.64606
Cache-Control
public, max-age=9733
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
70886
Expires
Sat, 25 Jul 2020 14:47:14 GMT
achieving-true-predictive-security-analytics-showcase_image-2-a-13878.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
54 KB
55 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/achieving-true-predictive-security-analytics-showcase_image-2-a-13878.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
199cd24e6b0d526eb0c06060d87dee6425d302456b0a2cb3015778f6401c476d

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Wed, 04 Mar 2020 21:51:00 GMT
X-Trans-Id
tx99d3d8f5ccaf460a8ac63-005e8c980adfw1
ETag
3cd4bf863b88b9c29a24cef0ad690ce1
Content-Type
image/jpeg
X-Timestamp
1583358659.31089
Cache-Control
public, max-age=21023
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
55733
Expires
Sat, 25 Jul 2020 17:55:24 GMT
tackling-challenges-around-dwell-times-visibility-showcase_image-8-a-13884.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
59 KB
59 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/tackling-challenges-around-dwell-times-visibility-showcase_image-8-a-13884.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3e7547a62e6d182a13a336293cc60a80152ad60e7cc2ae1d2aa6c1539eeeb2d3

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Thu, 05 Mar 2020 16:04:36 GMT
X-Trans-Id
tx0508ba5a40dc401a8f991-005e7d0afedfw1
ETag
f159c9867556eec8a5360d3493db29ad
Content-Type
image/jpeg
X-Timestamp
1583424275.63523
Cache-Control
public, max-age=64306
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
60191
Expires
Sun, 26 Jul 2020 05:56:47 GMT
best-rsa-conference-2020-showcase_image-1-a-14011.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
100 KB
101 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/best-rsa-conference-2020-showcase_image-1-a-14011.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8d24db7742c1a5864fcef9b95b39da9f4bdce218cd525cbd2a6c1233a9cb020e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Wed, 25 Mar 2020 19:33:42 GMT
X-Trans-Id
txecdb42fc3d174100aad59-005e7bbc6cdfw1
ETag
5509cbbd99ddd348f3533b4b8f6a0da9
Content-Type
image/jpeg
X-Timestamp
1585164821.83821
Cache-Control
public, max-age=36447
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
102596
Expires
Sat, 25 Jul 2020 22:12:28 GMT
infosec-europe-2019-compendium-imageFile-2-a-12739.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
89 KB
89 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/infosec-europe-2019-compendium-imageFile-2-a-12739.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4546d13ea9bae9935dcd23f61d215a528120a53479bf51e372de3420029ed535

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Fri, 05 Jul 2019 20:13:34 GMT
X-Trans-Id
tx187f1b47fcd742ffae5d6-005dce2177dfw1
ETag
f9dab7917669551bb50361c2dcd43aa7
Content-Type
image/jpeg
X-Timestamp
1562357613.59432
Cache-Control
public, max-age=48808
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
91187
Expires
Sun, 26 Jul 2020 01:38:29 GMT
improving-iot-risk-management-showcase_image-10-a-12689.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
60 KB
61 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/improving-iot-risk-management-showcase_image-10-a-12689.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6ec9288103b5919c36e28909faf04364cdf19cf7687e234663d0d9daab65a3c0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Fri, 28 Jun 2019 14:04:32 GMT
X-Trans-Id
txa25b89fa123e4074a03a9-005e32bf70dfw1
ETag
7f5fdd9cf37f980ea13c12c231815e13
Content-Type
image/jpeg
X-Timestamp
1561730671.53151
Cache-Control
public, max-age=51130
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
61807
Expires
Sun, 26 Jul 2020 02:17:11 GMT
gdpr-where-do-we-go-from-here-showcase_image-1-a-12681.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
62 KB
62 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/gdpr-where-do-we-go-from-here-showcase_image-1-a-12681.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8bc7f122cae9e9efd75cd58076d06fb057d8f50abf07ffc1716e17d87682b9cf

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Tue, 25 Jun 2019 19:30:48 GMT
X-Trans-Id
tx206234ed2ea84901bed15-005eae4eb4dfw1
ETag
bba47bed092092a1c82b09a86a3a0e40
Content-Type
image/jpeg
X-Timestamp
1561491047.60933
Cache-Control
public, max-age=64893
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
63007
Expires
Sun, 26 Jul 2020 06:06:34 GMT
reinventing-application-security-showcase_image-10-a-12671.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
53 KB
53 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/reinventing-application-security-showcase_image-10-a-12671.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4179815331b1b050e45da1ccf1d1a8cb50904e1cbb92228b32d55d545d4aaf7c

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Tue, 25 Jun 2019 19:54:35 GMT
X-Trans-Id
tx3160f3f4b0fd427aba3c8-005eae8d41dfw1
ETag
89521d60b07d7e85acabbf0301821f45
Content-Type
image/jpeg
X-Timestamp
1561492474.52472
Cache-Control
public, max-age=60945
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
54026
Expires
Sun, 26 Jul 2020 05:00:46 GMT
microsoft-seize-domains-used-for-covid-19-phishing-scam-showcase_image-5-a-14576.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
36 KB
36 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-showcase_image-5-a-14576.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
68906cd39d5ed01a1be4e2c51b494139fc10c87072508064cf8c5aa9f204f86f

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Last-Modified
Tue, 07 Jul 2020 21:52:35 GMT
X-Trans-Id
tx48baa067871c46538f991-005f1c179ddfw1
ETag
3c06a0508803376fc75769f61bebabf7
Content-Type
image/jpeg
X-Timestamp
1594158754.77155
Cache-Control
public, max-age=84203
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
36422
Expires
Sun, 26 Jul 2020 11:28:23 GMT
msftcovid19court1.jpg
dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com/files/images_articles/
35 KB
35 KB
Image
General
Full URL
https://dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com/files/images_articles/msftcovid19court1.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4c5b225e97dee98d058aee5b00ca0a8093f9d14981f29a83b96a1c0812929034

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Tue, 07 Jul 2020 21:48:51 GMT
X-Trans-Id
tx40e72ffb86b547bc8ac3d-005f1c1feedfw1
ETag
886b8581f87406ab1bde424aa61610a8
Content-Type
image/jpeg
X-Timestamp
1594158530.59059
Cache-Control
public, max-age=259200
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
35420
Expires
Tue, 28 Jul 2020 12:05:02 GMT
doug-olenick-largeImage-6-a-3402.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
48 KB
48 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/doug-olenick-largeImage-6-a-3402.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fc1c5d5032a8d6333bf213c6edaf837136d231139437a7d440eb1ff338e714c4

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Tue, 19 May 2020 17:36:33 GMT
X-Trans-Id
tx3111dd8ed1324de184ce7-005eefa836dfw1
ETag
cfe1f47775f601d3b7674e8d503b0732
Content-Type
image/jpeg
X-Timestamp
1589909792.69710
Cache-Control
public, max-age=14970
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
49042
Expires
Sat, 25 Jul 2020 16:14:32 GMT
live-webinar-5-critical-security-privacy-lessons-from-ccpa-litigation-showcase_image-9-w-2456.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
198 KB
199 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-5-critical-security-privacy-lessons-from-ccpa-litigation-showcase_image-9-w-2456.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
bd2bd6fba5970f41e929b46199cfcc58f7ce4bc822936a71ea4c098405392281

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Tue, 26 May 2020 16:05:02 GMT
X-Trans-Id
txd88ba95c13e54dc5ac2c5-005f1bf3d8dfw1
ETag
8c931f615989ad0eed420f88ee3960a1
Content-Type
image/jpeg
X-Timestamp
1590509101.37432
Cache-Control
public, max-age=75096
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
202978
Expires
Sun, 26 Jul 2020 08:56:38 GMT
pulse-flash-report-5-insights-covid-19-in-contact-center-logo-9-w-6172.png
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
119 KB
120 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/pulse-flash-report-5-insights-covid-19-in-contact-center-logo-9-w-6172.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
14aa68cb13a7265c4929e5ac951a6fe482a2593e225771d0fe0fe64ec91e36cd

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Fri, 01 May 2020 12:58:52 GMT
X-Trans-Id
txf4c7ad2ddf6a4a20b3ddf-005f04257cdfw1
ETag
1f2aa92f6ce1d3356dcd17e3d34235df
Content-Type
image/png
X-Timestamp
1588337931.66256
Cache-Control
public, max-age=58986
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
122148
Expires
Sun, 26 Jul 2020 04:28:08 GMT
live-webinar-your-brand-being-used-as-bait-you-just-dont-know-yet-showcase_image-2-w-2500.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
54 KB
54 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-your-brand-being-used-as-bait-you-just-dont-know-yet-showcase_image-2-w-2500.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2f2242cdeee9d69d43d17283693563996b21774839b9d8904d025be7646ed074

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Mon, 22 Jun 2020 12:45:55 GMT
X-Trans-Id
tx91b1b093edf841dfbc1b1-005f12b380dfw1
ETag
dd5c34d044f15e3338fb45b3a530de20
Content-Type
image/jpeg
X-Timestamp
1592829954.18572
Cache-Control
public, max-age=71740
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
55179
Expires
Sun, 26 Jul 2020 08:00:42 GMT
2020-cyberthreat-defense-report-pdf-7-w-6407.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
388 KB
389 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/2020-cyberthreat-defense-report-pdf-7-w-6407.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
dc789e45538a91acaacf8348f77c3911d14530268f421579f2647f0aacaa447e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Wed, 08 Jul 2020 16:07:34 GMT
X-Trans-Id
tx09640c8831e7487eb34dc-005f15c6d9dfw1
ETag
2e226f27bf25917f21bb3f7a92903c3a
Content-Type
image/jpeg
X-Timestamp
1594224453.27661
Cache-Control
public, max-age=69188
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
397657
Expires
Sun, 26 Jul 2020 07:18:10 GMT
protecting-your-assets-from-cryptomining-malware-logo-5-w-6086.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
127 KB
128 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/protecting-your-assets-from-cryptomining-malware-logo-5-w-6086.JPG
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
29ef5d9f730f72e21eb410e5dc2c78d6667013bdeb0b24c0a8ddc9d096942104

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Wed, 08 Apr 2020 20:25:36 GMT
X-Trans-Id
tx42bb21c185f1433b94e89-005f052514dfw1
ETag
262c593f6e3dad89a873e6562acf8153
Content-Type
image/jpeg
X-Timestamp
1586377535.41166
Cache-Control
public, max-age=14990
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
130378
Expires
Sat, 25 Jul 2020 16:14:52 GMT
new-threats-in-age-dynamic-workforce-imageFile-8-a-14528.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
131 KB
131 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/new-threats-in-age-dynamic-workforce-imageFile-8-a-14528.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
eafcb483ff20c27cb22dae72233ea16e4155ebeb42dedc302380bae489d79910

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Mon, 29 Jun 2020 21:20:46 GMT
X-Trans-Id
tx87b45a45ba4545bfbfb86-005f0a8f55dfw1
ETag
c1d7db277486afc281c01984479698df
Content-Type
image/jpeg
X-Timestamp
1593465645.21335
Cache-Control
public, max-age=32635
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
133691
Expires
Sat, 25 Jul 2020 21:08:57 GMT
nhs-england-provides-6800-agile-workers-secured-mobile-devices-logo-6-w-6117.PNG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
127 KB
127 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/nhs-england-provides-6800-agile-workers-secured-mobile-devices-logo-6-w-6117.PNG
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2b6262d9dac17680ad0add461b0ce9d008e91ac17c906a6012d49e5b18142d1c

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Mon, 20 Apr 2020 13:57:56 GMT
X-Trans-Id
tx5242fc0cdf6248a2b54c7-005f063b92dfw1
ETag
b99b286fd57a541fcf42874595b314ed
Content-Type
image/png
X-Timestamp
1587391075.98608
Cache-Control
public, max-age=10297
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
129835
Expires
Sat, 25 Jul 2020 14:56:39 GMT
2021-cybersecurity-odyssey-showcase_image-1-a-14244.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
54 KB
55 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/2021-cybersecurity-odyssey-showcase_image-1-a-14244.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4cc0a94fe285d89f90a1b94a8c02d6bc86025c50859d20cab31a621e2ebb677f

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Thu, 07 May 2020 19:44:50 GMT
X-Trans-Id
tx9109215a0eed4eb9a5138-005ee31f7fdfw1
ETag
7303dc2c8f8ad4a8c8e3d12f88842b44
Content-Type
image/jpeg
X-Timestamp
1588880689.41373
Cache-Control
public, max-age=34100
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
55645
Expires
Sat, 25 Jul 2020 21:33:22 GMT
beware-other-virus-spread-coronavirus-themed-malware-showcase_image-1-a-14110.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
134 KB
135 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/beware-other-virus-spread-coronavirus-themed-malware-showcase_image-1-a-14110.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d9da61cbf2665aed71c6d5c6d58282fa9ca941d488718bf16fc49f819fa2bbf2

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Last-Modified
Mon, 13 Apr 2020 19:01:01 GMT
X-Trans-Id
txcd3234a40505400d9611c-005f0e927edfw1
ETag
80a930491aade24aa861bf009e0dd85a
Content-Type
image/jpeg
X-Timestamp
1586804460.99060
Cache-Control
public, max-age=12274
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
137417
Expires
Sat, 25 Jul 2020 15:29:34 GMT
live-webinar-combating-cyber-fraud-best-practices-for-increasing-visibility-automating-threat-response-showcase_image-2-w-2394.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
103 KB
103 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-combating-cyber-fraud-best-practices-for-increasing-visibility-automating-threat-response-showcase_image-2-w-2394.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
246bdd23927d3219e3a9142f94cef4d994e0d38002292476aac1b23b526b5ef9

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Fri, 08 May 2020 15:55:46 GMT
X-Trans-Id
tx21b5db7741514968ad8cc-005f17f286dfw1
ETag
70c6ff2c24015e9abb873b47bfe0e4ef
Content-Type
image/jpeg
X-Timestamp
1588953345.99575
Cache-Control
public, max-age=70396
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
105392
Expires
Sun, 26 Jul 2020 07:38:17 GMT
covid-19-beyond-will-workfrom-home-explosion-revolutionize-enterprise-security-architecture-pdf-5-w-6408.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
163 KB
163 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/covid-19-beyond-will-workfrom-home-explosion-revolutionize-enterprise-security-architecture-pdf-5-w-6408.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
27a67d208bdacc3eee628eec1fe1bcda5ebcce45661bb766800a9ba2c93959dd

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Wed, 08 Jul 2020 16:19:13 GMT
X-Trans-Id
tx9b2317ecfdfd47e885e41-005f15c6d9dfw1
ETag
13bc7927b0b8707d387bfa4ff1d0e5f0
Content-Type
image/jpeg
X-Timestamp
1594225152.18734
Cache-Control
public, max-age=80338
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
166577
Expires
Sun, 26 Jul 2020 10:23:59 GMT
live-webinar-post-pandemic-new-normal-rethink-rebuild-cyber-security-11-am-aest-i-1-pm-nzst-showcase_image-10-w-2518.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
438 KB
439 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-post-pandemic-new-normal-rethink-rebuild-cyber-security-11-am-aest-i-1-pm-nzst-showcase_image-10-w-2518.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ba0e38f69748fd14bc36a4f0a3986c5ebade7edf684e38a4f64247d19060886a

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Mon, 29 Jun 2020 10:16:58 GMT
X-Trans-Id
tx9832487c03db40c6ab24e-005f16bf4adfw1
ETag
d40d459e4361dd680bcefcfdeff3a770
Content-Type
image/jpeg
X-Timestamp
1593425817.82658
Cache-Control
public, max-age=74985
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
448648
Expires
Sun, 26 Jul 2020 08:54:46 GMT
live-webinar-five-things-you-need-to-know-about-new-ccpa-regulations-showcase_image-5-w-2362.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
129 KB
130 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-five-things-you-need-to-know-about-new-ccpa-regulations-showcase_image-5-w-2362.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
53cf8d9d31033ec080746606303e7d935adb6d66169ad8c3a5f090f06e3afb43

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Last-Modified
Thu, 02 Apr 2020 13:39:55 GMT
X-Trans-Id
txd67971e82b9542d981f4f-005f12ae33dfw1
ETag
8eeaf151358a7535c35e7ef49d928b1e
Content-Type
image/jpeg
X-Timestamp
1585834794.02020
Cache-Control
public, max-age=38701
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
132376
Expires
Sat, 25 Jul 2020 22:50:02 GMT
1-million-rewards-offered-for-help-in-finding-sec-hackers-showcase_image-4-a-14695.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
49 KB
49 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/1-million-rewards-offered-for-help-in-finding-sec-hackers-showcase_image-4-a-14695.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3447a5471d04db5d613e1d31b2e8bd9801a3ceb3c611efdfaff532703f9cf70a

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Fri, 24 Jul 2020 14:26:10 GMT
X-Trans-Id
tx8bb94d3f43914f388d88c-005f1af68edfw1
ETag
aab86542e1d506cc4b1ef8f3c47abbf3
Content-Type
image/jpeg
X-Timestamp
1595600769.68161
Cache-Control
public, max-age=10261
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
49731
Expires
Sat, 25 Jul 2020 14:56:03 GMT
coordinating-disclosures-medical-device-vulnerabilities-showcase_image-9-i-4728.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
37 KB
37 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coordinating-disclosures-medical-device-vulnerabilities-showcase_image-9-i-4728.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7136b2d75ce910970eca268a0b23968710daae9989719e2edfd3d76406171129

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Fri, 10 Jul 2020 18:22:39 GMT
X-Trans-Id
tx7933400835764f6bb4987-005f08bb08dfw1
ETag
ea6a5f042d53564ed48389b88df876c4
Content-Type
image/jpeg
X-Timestamp
1594405358.20219
Cache-Control
public, max-age=13649
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
37451
Expires
Sat, 25 Jul 2020 15:52:31 GMT
analysis-monitoring-risks-posed-by-remote-workers-showcase_image-2-i-4727.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
128 KB
129 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-monitoring-risks-posed-by-remote-workers-showcase_image-2-i-4727.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
106f63140e591f71994ba5a86cfccf8b336911e254ed2c685eba40c233e2bddc

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Thu, 09 Jul 2020 20:23:39 GMT
X-Trans-Id
tx56d3410e6b9e4d0eb84be-005f082b08dfw1
ETag
59a030c9ca5adf19dcf30022234eff90
Content-Type
image/jpeg
X-Timestamp
1594326218.39610
Cache-Control
public, max-age=31689
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
131562
Expires
Sat, 25 Jul 2020 20:53:11 GMT
crowley-showcase_image-2-i-4725.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
51 KB
52 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/crowley-showcase_image-2-i-4725.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
11d1b1d35a1dd90caaf8811f17dd4b2d56f88305d43820330c914893176c2a58

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Tue, 07 Jul 2020 18:33:46 GMT
X-Trans-Id
tx36736532dbd346ddb263b-005f04c8bfdfw1
ETag
9a3665dad301a5e1d3602cacf8524e2e
Content-Type
image/jpeg
X-Timestamp
1594146825.06861
Cache-Control
public, max-age=30683
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
52616
Expires
Sat, 25 Jul 2020 20:36:25 GMT
medical-devices-mitigating-cyber-risks-showcase_image-5-i-4733.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
42 KB
43 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-devices-mitigating-cyber-risks-showcase_image-5-i-4733.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fa292343a77c2e20d0f25f4142adac9438b21ae0b44606a980ae0ef3ae814256

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Fri, 24 Jul 2020 16:59:57 GMT
X-Trans-Id
txaa0882bfb40b403da52bf-005f1b1b75dfw1
ETag
bf8ef5149938058fd3c774d0429d1d48
Content-Type
image/jpeg
X-Timestamp
1595609996.71059
Cache-Control
public, max-age=19778
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43457
Expires
Sat, 25 Jul 2020 17:34:40 GMT
sizing-up-security-challenges-for-telecom-companies-showcase_image-7-i-4724.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
283 KB
283 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sizing-up-security-challenges-for-telecom-companies-showcase_image-7-i-4724.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
bd2e639a1fe61ffcd81a3b611791e73bbcaebbc0c3cce8b3e9a7c3ec8b895211

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Fri, 03 Jul 2020 08:15:53 GMT
X-Trans-Id
tx623af2a81e6c41e4b7962-005efef5dfdfw1
ETag
6af97ba50478ff38eb7ab54a2c23dd07
Content-Type
image/jpeg
X-Timestamp
1593764152.31456
Cache-Control
public, max-age=14720
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
289898
Expires
Sat, 25 Jul 2020 16:10:22 GMT
digital-ids-progress-report-showcase_image-5-i-4722.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
56 KB
57 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-ids-progress-report-showcase_image-5-i-4722.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
214f0ced4aa41206009c814aaf3607f7b7546818c0678b29ca47cc893495bf9d

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Thu, 02 Jul 2020 21:04:21 GMT
X-Trans-Id
tx264555490b364c9ba1b59-005f0b2986dfw1
ETag
a5fc5b3d71891aa1e4b019a48c6cfb3d
Content-Type
image/jpeg
X-Timestamp
1593723860.19254
Cache-Control
public, max-age=16264
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
57619
Expires
Sat, 25 Jul 2020 16:36:06 GMT
logo-ismg-with-text.png
www.bankinfosecurity.com/images-responsive/
4 KB
4 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images-responsive/logo-ismg-with-text.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
4e2db1bef009e01901b4083a153f1607301428277a76f508e659dc2849cefa04

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=92
Content-Length
4175
logo-ismg-print.png
www.bankinfosecurity.com/images-responsive/
5 KB
6 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images-responsive/logo-ismg-print.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
5133e2e1a213ca44a8adb1f42f103a2d2e495849dfa4d42bf67c04fcc962e577

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
5598
ondemand-preview-w-255.jpg
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
56 KB
57 KB
Image
General
Full URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3059f92e36a564c5cbcedc195f764e3c55c8cf919c84129c5f202870e7026b61

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Fri, 05 Jul 2013 12:55:26 GMT
X-Trans-Id
txd312a450dfc64de583403-005f1c1feedfw1
ETag
7aece0902995efedc289b7c24037434b
Content-Type
image/jpeg
X-Timestamp
1373028925.94439
Cache-Control
public, max-age=900
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
57633
Expires
Sat, 25 Jul 2020 12:20:02 GMT
ron-ross-smallImage-a-558.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
10 KB
11 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/ron-ross-smallImage-a-558.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
92.122.252.220 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a92-122-252-220.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9c8bb391a723e088d163b560afa73f709c42a69df5647c4fefce9d16e4226895

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Last-Modified
Fri, 01 Nov 2013 13:09:25 GMT
X-Trans-Id
txe134507a795d4807a2f99-005ef6f0c5dfw1
ETag
fac8c56390d084c4f1dfaa9b24a58c33
Content-Type
image/jpeg
X-Timestamp
1383311364.81114
Cache-Control
public, max-age=31771
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
10640
Expires
Sat, 25 Jul 2020 20:54:33 GMT
ismg-user-ip
worker.ismgcorp.com/
14 B
408 B
XHR
General
Full URL
https://worker.ismgcorp.com/ismg-user-ip
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1595678699.1495
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.130.251.6 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
c0eb8b872c933e0aba3c3f9751b64f549ff611e3b194ffa1163e5eb78c7fa5ad

Request headers

Accept
*/*
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, private
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Content-Length
34
gpt.js
www.googletagservices.com/tag/js/
48 KB
17 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c5e5742593fb85b25251acdb96a2f0d31ee17b2eb8b6b8c737714ea1efc56a11
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"581 / 536 of 1000 / last-modified: 1595628830"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
16533
x-xss-protection
0
expires
Sat, 25 Jul 2020 12:05:02 GMT
munchkin.js
munchkin.marketo.net/
1 KB
1 KB
Script
General
Full URL
https://munchkin.marketo.net/munchkin.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1595678699.1495
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
88.221.60.75 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
AkamaiNetStorage /
Resource Hash
e33257e40a5420d325cbdd826a42403d63e4fa3c32efb3d7a4b3596aa0541a64

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Content-Encoding
gzip
Last-Modified
Fri, 10 Jul 2020 02:50:40 GMT
Server
AkamaiNetStorage
ETag
"bc06a6fbc5f82b85379e5482b06ad372:1594349440.875338"
Vary
Accept-Encoding
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
760
gtm.js
www.googletagmanager.com/
536 KB
41 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-T6KM3T
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
edfbed6757c288d5e4c7a45c8886159cdb5e29dbd142d18007ed5a91f36043db
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:02 GMT
content-encoding
br
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
41640
x-xss-protection
0
expires
Sat, 25 Jul 2020 12:05:02 GMT
gtm.js
www.googletagmanager.com/
58 KB
23 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-T8C2JFW
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
025635cd10d157105f4ddeeb45686a4300388e2b0c10ebefcd29f93b5025681c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:02 GMT
content-encoding
br
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
23524
x-xss-protection
0
expires
Sat, 25 Jul 2020 12:05:02 GMT
mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
54c64f3c66372027154f01fc9f24b4e25fdfe405b70d1994c79abbc2576ff775
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.bankinfosecurity.com

Response headers

date
Thu, 11 Jun 2020 13:03:24 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:49 GMT
server
sffe
age
3798096
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9132
x-xss-protection
0
expires
Fri, 11 Jun 2021 13:03:24 GMT
mem5YaGs126MiZpBA-UN_r8OUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN_r8OUuhpKKSTjw.woff2
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5e261f7e11c39ff6f4c8fe884e5c9de2fa15f29085a1adefdd36603ef2e23c00
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.bankinfosecurity.com

Response headers

date
Thu, 09 Jul 2020 00:04:34 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:37 GMT
server
sffe
age
1425626
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9016
x-xss-protection
0
expires
Fri, 09 Jul 2021 00:04:34 GMT
fontawesome-webfont.woff
www.bankinfosecurity.com/css-responsive/fonts/
43 KB
44 KB
Font
General
Full URL
https://www.bankinfosecurity.com/css-responsive/fonts/fontawesome-webfont.woff?v=4.2.0
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
0fd28fece9ebd606b8b071460ebd3fc2ed7bc7a66ef91c8834f11dfacab4a849

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.bankinfosecurity.com/css-responsive/vendor/font-awesome.min.css?s=1595678699.1495
Origin
https://www.bankinfosecurity.com

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Last-Modified
Fri, 24 Jul 2020 17:05:18 GMT
Server
Apache
ETag
"ad90-5ab32fa406237"
Content-Type
application/font-woff
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
44432
main.js
www.bankinfosecurity.com/javascripts-responsive/
41 KB
10 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/main.js?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
703a0faa9e0cc9f4261b1a3a121ab4ddf5ffc4a7da1d483c47bbc122ad114606

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
9704
media-transcript-navigation.js
www.bankinfosecurity.com/javascripts-responsive/
26 KB
7 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/media-transcript-navigation.js?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
ae3c472ff47a96820c1acdf9574b231a88f62a006b84d320eb313af40f32f2db

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
6519
bis-hdr.r1.js
www.bankinfosecurity.com/javascripts-responsive/
1 KB
766 B
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/bis-hdr.r1.js?s=1595678699.1495
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
4c92262ff23b2116bad93fc1e36f1a597dc713ad8b3cd03d56f8e49bec4cb186

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:00 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
455
jquery.browser.js
www.bankinfosecurity.com/javascripts-responsive/
2 KB
1 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/jquery.browser.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
bbe0aa82dca8a36f677fb17025c3baa011d355bd7cb42d4aacea1b0265855d6e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
1022
jquery.prettyPhoto.js
www.bankinfosecurity.com/javascripts-responsive/
24 KB
7 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/jquery.prettyPhoto.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
1edbdbe7dd4c59e2fef20ef8dc4615a18d116fdf43daf018dce46a93e6cb153e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:01 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
6459
mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b8e23a845bc6b7fd417d29182e0e38d353e64b5e12e06bb1de2b5ce063db1dcc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.bankinfosecurity.com

Response headers

date
Tue, 14 Jul 2020 16:17:11 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:44 GMT
server
sffe
age
935269
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9180
x-xss-protection
0
expires
Wed, 14 Jul 2021 16:17:11 GMT
mem5YaGs126MiZpBA-UN7rgOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN7rgOUuhpKKSTjw.woff2
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a48a6e4b14fe55f750c0a3dfb5a6f4941bdc06af0aa542b90de25c30c2b4625c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.bankinfosecurity.com

Response headers

date
Tue, 14 Jul 2020 15:32:55 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:31:11 GMT
server
sffe
age
937925
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9080
x-xss-protection
0
expires
Wed, 14 Jul 2021 15:32:55 GMT
memnYaGs126MiZpBA-UFUKWyV9hrIqOxjaPX.woff2
fonts.gstatic.com/s/opensans/v17/
10 KB
10 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/memnYaGs126MiZpBA-UFUKWyV9hrIqOxjaPX.woff2
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
41c93545a4e2a1a46bca581d80fec8c8da014e13b310c65d694e4af30c7da9bd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.bankinfosecurity.com

Response headers

date
Wed, 08 Jul 2020 21:51:53 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:56 GMT
server
sffe
age
1433587
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9744
x-xss-protection
0
expires
Thu, 08 Jul 2021 21:51:53 GMT
moatframe.js
z.moatads.com/addthismoatframe568911941483/
2 KB
1 KB
Script
General
Full URL
https://z.moatads.com/addthismoatframe568911941483/moatframe.js
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/250/addthis_widget.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.64 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
05090f9390f5bc0cd23fe5f432037cc92d7cbce1ced9bfe8faf3d1c9abae85cd

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:02 GMT
content-encoding
gzip
last-modified
Fri, 08 Nov 2019 20:13:52 GMT
server
AmazonS3
x-amz-request-id
CD83941857724976
etag
"f14b4e1f799b14f798a195f43cf58376"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=17275
accept-ranges
bytes
content-length
948
x-amz-id-2
0ZTpgIpnUMxQCBXeH9ew/82I9oq7GJ2Gfze78bXzMcqS1BRoWTIwh8fvZ+vN96IwbFGZ6f5C0Hk=
ondemand-preview-w-255.mp4
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
0
0

embed.js
bankinfosecurity.disqus.com/
70 KB
23 KB
Script
General
Full URL
https://bankinfosecurity.disqus.com/embed.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.134 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
openresty /
Resource Hash
7dfe7477de0bfcd82eaa2bb9376e73560e77dd0c01b17ab36cd4eee6e557ca8f
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Content-Encoding
gzip
Server
openresty
Age
0
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
23006
analytics.js
www.google-analytics.com/
45 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
fd361b57998c76f86335afa28b8a62527d88a8200fb5c428d6f0fff73383e955
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 04 Jun 2020 23:38:14 GMT
server
Golfe2
age
6563
date
Sat, 25 Jul 2020 10:15:39 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18469
expires
Sat, 25 Jul 2020 12:15:39 GMT
tag.aspx
ml314.com/
26 KB
12 KB
Script
General
Full URL
https://ml314.com/tag.aspx?2562020
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.240.148.251 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
c293a28e23c66b27bd04bc1742f3aab0ebf6c382961c1e83140f035a08ea5e5d

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Content-Encoding
gzip
Last-Modified
Sat, 25 Jul 2020 06:58:55 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=68032
Connection
keep-alive
Content-Length
11932
Expires
Sun, 26 Jul 2020 06:58:55 GMT
insight.min.js
sjs.bizographics.com/
3 KB
2 KB
Script
General
Full URL
https://sjs.bizographics.com/insight.min.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:10c:399::3adf , Ascension Island, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
Software
/
Resource Hash
41dd5e421fe221a7d2921d6fa2b36e8b01a9f2c054aaef5fad866fe896c1d1e0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 07 Oct 2019 16:41:31 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=77992
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1576
livechat.ashx
chatserver.comm100.com/
990 B
934 B
Script
General
Full URL
https://chatserver.comm100.com/livechat.ashx?siteId=92035
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.4.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
935ce461fd2a13af7c4a5aa08a854b747628072f74fcbedd515adee98bc8d86c

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:02 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
server
cloudflare
x-aspnet-version
4.0.30319
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
status
200
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
cache-control
no-cache, no-store
cf-ray
5b85bf32abce7628-ARN
content-length
516
cf-request-id
042775d3a400007628ae1c7200000001
2682.js
dnn506yrbagrg.cloudfront.net/pages/scripts/0021/
309 B
822 B
Script
General
Full URL
https://dnn506yrbagrg.cloudfront.net/pages/scripts/0021/2682.js?443244
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.208.128 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6caf904d3dfc096ae3b4e40aed43181686bdf1bac4722b3dd2a775ab6d2a9992

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 03 Mar 2020 19:31:54 GMT
Via
1.1 7549433a09d06354ea864d169b689e51.cloudfront.net (CloudFront)
Connection
keep-alive
Last-Modified
Tue, 03 Mar 2020 19:14:28 GMT
Server
AmazonS3
Age
12414788
ETag
"53b0291ca3900aca920ad48e9790c1b7"
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Cache-Control
max-age=31536000
X-Amz-Cf-Pop
FRA53-C1
Accept-Ranges
bytes
Content-Length
309
X-Amz-Cf-Id
vHvqABeqdI5jyhDxAYMR7jaU0AgF7d7bjRVL1ZOvo2MXLnKmvK6IRA==
sh.f48a1a04fe8dbf021b4cda1d.html
s7.addthis.com/static/ Frame AC74
0
0

ajax.php
www.bankinfosecurity.com/
4 KB
1 KB
XHR
General
Full URL
https://www.bankinfosecurity.com/ajax.php?json=twitterWidget
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1595678699.1495
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
dd1a0c3957ea3359a0eff3c5b24c140cc2040748365fbee3840e854168a82fa9

Request headers

Accept
text/html, */*; q=0.01
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 12:05:01 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Keep-Alive
timeout=5, max=95
Expires
Thu, 19 Nov 1981 08:52:00 GMT
_ate.track.config_resp
v1.addthisedge.com/live/boost/ra-4fd21f2b39b17192/
166 B
325 B
Script
General
Full URL
https://v1.addthisedge.com/live/boost/ra-4fd21f2b39b17192/_ate.track.config_resp
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/250/addthis_widget.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.36.164 , France, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
Software
/
Resource Hash
4cf8b4da854cac70fb514c2d255e93904353bda1fcc7229de2f59d5971d83028

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:02 GMT
content-encoding
gzip
etag
659743217
vary
Accept-Encoding
content-type
application/javascript;charset=utf-8
status
200
cache-control
public, max-age=60, s-maxage=86400
content-disposition
attachment; filename=1.txt
content-length
154
300lo.json
m.addthis.com/live/red_lojson/
89 B
249 B
Script
General
Full URL
https://m.addthis.com/live/red_lojson/300lo.json?si=5f1c1fecf9d8b982&bkl=0&bl=1&pdt=1077&sid=5f1c1fecf9d8b982&pub=ra-4fd21f2b39b17192&rev=v8.28.7-wp&ln=en&pc=men&cb=0&ab=-&dp=www.bankinfosecurity.com&fp=microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&fr=&of=0&pd=0&irt=0&vcl=0&md=0&ct=1&tct=0&abt=0&cdn=0&pi=1&rb=0&gen=100&chr=UTF-8&mk=Microsoft%2Cphishing%2Cemail%2CCOVID-19%2Cfederal%20court&colc=1595678701148&jsl=1&uvs=5f1c1fec9a3f75ab000&skipb=1&callback=addthis.cbs.jsonp__46520678389660740
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/250/addthis_widget.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.36.164 , France, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
Software
/
Resource Hash
dc2d1aa949bbc32bd13e2db3df4571c6b2c5e189a574f8b842a74058e55f16f2

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Sat, 25 Jul 2020 12:05:02 GMT
cache-control
max-age=0, no-cache, no-store, no-transform
content-disposition
attachment; filename=1.txt
content-length
89
content-type
application/javascript;charset=utf-8
sh.f48a1a04fe8dbf021b4cda1d.html
s7.addthis.com/static/ Frame C201
0
0
Document
General
Full URL
https://s7.addthis.com/static/sh.f48a1a04fe8dbf021b4cda1d.html
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/250/addthis_widget.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.248.44 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-44.deploy.static.akamaitechnologies.com
Software
nginx/1.15.8 /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

:method
GET
:authority
s7.addthis.com
:scheme
https
:path
/static/sh.f48a1a04fe8dbf021b4cda1d.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576

Response headers

status
200
server
nginx/1.15.8
content-type
text/html
last-modified
Mon, 09 Sep 2019 15:34:57 GMT
etag
W/"5d767121-1115f"
timing-allow-origin
*
cache-control
public, max-age=86313600
p3p
CP="NON ADM OUR DEV IND COM STA"
strict-transport-security
max-age=15724800; includeSubDomains
content-encoding
gzip
content-length
25412
date
Sat, 25 Jul 2020 12:05:01 GMT
vary
Accept-Encoding
x-host
s7.addthis.com
ondemand-preview-w-255.mp4
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
3 MB
0
Media
General
Full URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.mp4
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Range
bytes=0-

Response headers

Date
Sat, 25 Jul 2020 12:05:03 GMT
Last-Modified
Fri, 05 Jul 2013 12:56:36 GMT
X-Trans-Id
tx0246bc4313a047d8a5f5a-005efc6834dfw1
ETag
e5d65b36cc2f1ee7de6cc53cd6609280
Content-Type
video/mp4
Content-Range
bytes 0-10621769/10621770
X-Timestamp
1373028995.98411
Cache-Control
public, max-age=895
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
10621770
Expires
Sat, 25 Jul 2020 12:19:58 GMT
-dXK84AV_normal.png
pbs.twimg.com/profile_images/1211697674325508098/
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1211697674325508098/-dXK84AV_normal.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41AE) /
Resource Hash
0886568fed92f6c812aabb3aa8052d5b6611e3a0949b7bec52e88f07305d558d
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:02 GMT
x-content-type-options
nosniff
age
431061
x-cache
HIT
status
200
content-length
4771
x-response-time
111
surrogate-key
profile_images profile_images/bucket/8 profile_images/1211697674325508098
last-modified
Mon, 30 Dec 2019 17:14:52 GMT
server
ECS (fcn/41AE)
strict-transport-security
max-age=631138519
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
ed89d6fb7e6153d2325de21933a4cbd4
accept-ranges
bytes
4solOPoF_normal.jpg
pbs.twimg.com/profile_images/1059801888001089536/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1059801888001089536/4solOPoF_normal.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4198) /
Resource Hash
3d79ffcff1851b8de0f784a4ccd83459e2025dca889c5f3c6e583144ea83ac9c
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:02 GMT
x-content-type-options
nosniff
age
209355
x-cache
HIT
status
200
content-length
2035
x-response-time
116
surrogate-key
profile_images profile_images/bucket/4 profile_images/1059801888001089536
last-modified
Tue, 06 Nov 2018 13:35:14 GMT
server
ECS (fcn/4198)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
9d85d768e7c9d4e2854a74dd1149e381
accept-ranges
bytes
2682.js
script.crazyegg.com/pages/scripts/0021/
1 KB
1 KB
Script
General
Full URL
https://script.crazyegg.com/pages/scripts/0021/2682.js
Requested by
Host: dnn506yrbagrg.cloudfront.net
URL: https://dnn506yrbagrg.cloudfront.net/pages/scripts/0021/2682.js?443244
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9408 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1e77bab3ad8f9f1b3b5ae0c91adc45c5efe0a0adb091107c8bae2df942c38b28

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:02 GMT
content-encoding
gzip
cf-cache-status
HIT
ce-version
11.1.68
age
170726
cf-polished
origSize=1484
status
200
cf-request-id
042775d3fb0000c2d1e62bb200000001
last-modified
Thu, 23 Jul 2020 12:39:36 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
access-control-expose-headers
CE-Version
cache-control
max-age=300
cf-ray
5b85bf33284bc2d1-FRA
cf-bgj
minify
ajax.php
www.bankinfosecurity.com/
5 B
388 B
XHR
General
Full URL
https://www.bankinfosecurity.com/ajax.php?json=notificationCookies&action=getNotifications
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1595678699.1495
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
fcbcf165908dd18a9e49f7ff27810176db8e9f63b4352213741664245224f8aa

Request headers

Accept
*/*
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 12:05:01 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Keep-Alive
timeout=5, max=94
Expires
Thu, 19 Nov 1981 08:52:00 GMT
integrator.js
adservice.google.de/adsid/
109 B
829 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.bankinfosecurity.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 12:05:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
320 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.bankinfosecurity.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 12:05:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
pubads_impl_2020072001.js
securepubads.g.doubleclick.net/gpt/
253 KB
90 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
31e539be75870ad6cec377525eb196ea9fbc423ea53d68c03b2c94b96701bc47
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 20 Jul 2020 13:10:24 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
91349
x-xss-protection
0
expires
Sat, 25 Jul 2020 12:05:02 GMT
collect
www.google-analytics.com/r/
35 B
98 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j83&a=677957424&t=pageview&_s=1&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&ul=en-us&de=UTF-8&dt=Microsoft%20Seizes%20Domains%20Used%20for%20COVID-19%20Phishing%20Scam&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAEAB~&jid=66988763&gjid=1696755869&cid=1950358036.1595678702&tid=UA-212197-2&_gid=1147450682.1595678702&_r=1&z=1910470538
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 12:05:02 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
stats.g.doubleclick.net/r/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j83&a=677957424&t=pageview&_s=1&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&ul=en-u...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-212197-36&cid=1950358036.1595678702&jid=1980743201&_gid=1147450682.1595678702&gjid=1239009973&_v=j83&z=1741624810
35 B
421 B
Image
General
Full URL
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-212197-36&cid=1950358036.1595678702&jid=1980743201&_gid=1147450682.1595678702&gjid=1239009973&_v=j83&z=1741624810
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c0a::9b Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Sat, 25 Jul 2020 12:05:02 GMT
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 12:05:02 GMT
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
302
location
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-212197-36&cid=1950358036.1595678702&jid=1980743201&_gid=1147450682.1595678702&gjid=1239009973&_v=j83&z=1741624810
content-type
text/html; charset=UTF-8
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
419
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
119 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j83&a=677957424&t=event&_s=2&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&ul=en-us&de=UTF-8&dt=Microsoft%20Seizes%20Domains%20Used%20for%20COVID-19%20Phishing%20Scam&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=dailyemailupdates&ea=impression&el=&_u=IEDAAEAB~&jid=&gjid=&cid=1950358036.1595678702&tid=UA-212197-2&_gid=1147450682.1595678702&z=1181925872
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jul 2020 04:37:05 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
804477
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
collect
px.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&time=1595678702458
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D749%26url%3Dhttps%253A%252F%252Fwww.bankinfosecurity.com%252Fmicrosoft-seize-doma...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&time=1595678702458&liSync=true
0
41 B
Image
General
Full URL
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&time=1595678702458&liSync=true
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9105 , Ireland, ASN14413 (LINKEDIN, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:02 GMT
server
Play
linkedin-action
1
x-li-fabric
prod-lva1
status
200
x-li-proto
http/2
x-li-pop
prod-efr5
content-type
application/javascript
content-length
0
x-li-uuid
JNFHd1P9JBZgk9P9XCsAAA==

Redirect headers

content-security-policy
default-src *; connect-src 'self' https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob: https://accounts.google.com/gsi/status https://linkedin.sc.omtrdc.net/b/ss/ static.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com media.licdn.com media-exp1.licdn.com media-exp2.licdn.com media-exp3.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/insight.min.js platform.linkedin.com platform-akam.linkedin.com platform-ecst.linkedin.com platform-azur.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
x-content-type-options
nosniff
nel
{"report_to":"network-errors","max_age":1296000,"success_fraction":0.00066,"failure_fraction":1,"include_subdomains":true}
linkedin-action
1
status
302
content-length
0
x-li-uuid
u6MPc1P9JBYQdx/O3ioAAA==
pragma
no-cache
x-li-pop
afd-prod-edc2
x-msedge-ref
Ref A: 3B7839D656EE4B629A7E1E349FE45565 Ref B: FRAEDGE1118 Ref C: 2020-07-25T12:05:02Z
x-frame-options
sameorigin
date
Sat, 25 Jul 2020 12:05:02 GMT
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
strict-transport-security
max-age=2592000
report-to
{"group":"network-errors","max_age":2592000,"endpoints":[{"url":"https://www.linkedin.com/li/rep"}],"include_subdomains":true}
x-li-fabric
prod-lva1
location
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&time=1595678702458&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
munchkin.js
munchkin.marketo.net/158/
11 KB
5 KB
Script
General
Full URL
https://munchkin.marketo.net/158/munchkin.js
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
88.221.60.75 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
AkamaiNetStorage /
Resource Hash
5f967fd41346c0fc1b9b44fa69c52bf1e754420c59c8017cefb0a14a764cafa4

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Content-Encoding
gzip
Last-Modified
Tue, 28 Jan 2020 03:01:21 GMT
Server
AkamaiNetStorage
ETag
"67df7eb9e9e68638308f14367dddec10:1580180481"
Vary
Accept-Encoding
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR", policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Cache-Control
max-age=8640000
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
4686
Expires
Mon, 02 Nov 2020 12:05:02 GMT
utsync.ashx
ml314.com/
644 B
1 KB
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=57819&ct=js&pi=&fp=&clid=&if=0&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&pv=1595678702691_06cbl9jg4&bl=en-us&cb=6930785&return=&ht=&d=&dc=&si=1595678702691_06cbl9jg4&cid=&s=1600x1200&rp=
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?2562020
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.240.148.251 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
7439030258b016484ae48de628ac6c85d366df37a3e3f02f8d2d231b42200a40

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 12:05:02 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
468
Expires
0
ud.ashx
in.ml314.com/
20 B
481 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=2562020
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?2562020
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.84.119.213 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:03 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public
Connection
keep-alive
Content-Length
138
Expires
Sun, 26 Jul 2020 12:05:03 GMT
visitWebPage
051-zxi-237.mktoresp.com/webevents/
2 B
304 B
XHR
General
Full URL
https://051-zxi-237.mktoresp.com/webevents/visitWebPage?_mchNc=1595678702755&_mchCn=&_mchId=051-ZXI-237&_mchTk=_mch-bankinfosecurity.com-1595678702754-14816&_mchHo=www.bankinfosecurity.com&_mchPo=&_mchRu=%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&_mchPc=https%3A&_mchVr=158&_mchEcid=&_mchHa=&_mchRe=&_mchQp=
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/158/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.28.147.68 , United States, ASN53580 (MARKETO, US),
Reverse DNS
Software
akka-http/10.1.11 /
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sat, 25 Jul 2020 12:05:03 GMT
Content-Encoding
gzip
Server
akka-http/10.1.11
Transfer-Encoding
chunked
X-Request-Id
b7909f6a-e05a-48e0-847f-f01b99029ba6
Content-Type
text/plain; charset=UTF-8
visitWebPage
051-zxi-237.mktoresp.com/webevents/
2 B
304 B
XHR
General
Full URL
https://051-zxi-237.mktoresp.com/webevents/visitWebPage?_mchNc=1595678702756&_mchRu=%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&_mchQp=cat%3D413%26cat%3D562%26cat%3D416%26cat%3D409%26cat%3D93%26cat%3D320%26cat%3D423%26cat%3D435%26assetID%3D14576%26assetType%3Darticle%26key%3Dmicrosoft%26key%3Dphishing%26key%3Demail%26key%3Dcovid-19%26key%3Dfederal%20court%26key%3D&_mchId=051-ZXI-237&_mchTk=_mch-bankinfosecurity.com-1595678702754-14816&_mchHo=www.bankinfosecurity.com&_mchPo=&_mchPc=https%3A&_mchVr=158&_mchEcid=&_mchRe=undefined
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/158/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.28.147.68 , United States, ASN53580 (MARKETO, US),
Reverse DNS
Software
akka-http/10.1.11 /
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sat, 25 Jul 2020 12:05:03 GMT
Content-Encoding
gzip
Server
akka-http/10.1.11
Transfer-Encoding
chunked
X-Request-Id
46286d45-8e32-46b8-8e36-dcf9aa9a53b4
Content-Type
text/plain; charset=UTF-8
demconf.jpg
dpm.demdex.net/
Redirect Chain
  • https://dpm.demdex.net/ibs:dpid=22052&dpuuid=3611936580515135583&redir=
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=3611936580515135583&redir=
42 B
915 B
Image
General
Full URL
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=3611936580515135583&redir=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.171.8 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v075-0d5dc0d95.edge-irl1.demdex.com 5.74.0.20200706134429 1ms (+0ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-TID
lsMiqofiTts=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-TID
/g2nik05T74=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Location
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=3611936580515135583&redir=
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://idsync.rlcdn.com/395886.gif?partner_uid=3611936580515135583
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTMzYxMTkzNjU4MDUxNTEzNTU4MxAAGg0I7r_w-AUSBQjoBxAAQgBKAA
  • https://ml314.com/csync.ashx?fp=4306fe0f9af72eabaac8fa6078487983a5802e114112ec5c99615371f55ee23ef4cb09cee1a4f8eb&person_id=3611936580515135583&eid=50082
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=4306fe0f9af72eabaac8fa6078487983a5802e114112ec5c99615371f55ee23ef4cb09cee1a4f8eb&person_id=3611936580515135583&eid=50082
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.240.148.251 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:03 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sun, 26 Jul 2020 08:05:03 GMT

Redirect headers

date
Sat, 25 Jul 2020 12:05:03 GMT
via
1.1 google
status
307
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
location
https://ml314.com/csync.ashx?fp=4306fe0f9af72eabaac8fa6078487983a5802e114112ec5c99615371f55ee23ef4cb09cee1a4f8eb&person_id=3611936580515135583&eid=50082
cache-control
no-cache, no-store
timing-allow-origin
*
alt-svc
clear
content-length
0
csync.ashx
ml314.com/
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=b8e5e3a9-4cd2-4e5f-b5b8-d1c2dd8e8467
  • https://ml314.com/csync.ashx?fp=b8e5e3a9-4cd2-4e5f-b5b8-d1c2dd8e8467&person_id=3611936580515135583&eid=53819
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=b8e5e3a9-4cd2-4e5f-b5b8-d1c2dd8e8467&person_id=3611936580515135583&eid=53819
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.240.148.251 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:02 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sun, 26 Jul 2020 08:05:03 GMT

Redirect headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 12:05:02 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Location
https://ml314.com/csync.ashx?fp=b8e5e3a9-4cd2-4e5f-b5b8-d1c2dd8e8467&person_id=3611936580515135583&eid=53819
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
0,Sun, 26 Jul 2020 08:05:03 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3611936580515135583
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3611936580515135583
  • https://ml314.com/csync.ashx?fp=5fed130b1f2f7f1b2092290de243e7b2&eid=50146&person_id=3611936580515135583
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=5fed130b1f2f7f1b2092290de243e7b2&eid=50146&person_id=3611936580515135583
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.240.148.251 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:03 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sun, 26 Jul 2020 08:05:03 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 12:05:03 GMT
status
302
p3p
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
location
https://ml314.com/csync.ashx?fp=5fed130b1f2f7f1b2092290de243e7b2&eid=50146&person_id=3611936580515135583
cache-control
no-cache
x-server
10.45.5.91
content-length
0
expires
0
/
ps.eyeota.net/pixel/bounce/
Redirect Chain
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif
0
344 B
Image
General
Full URL
https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
3.122.214.165 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:03 GMT
Content-Length
0
P3P
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR SAMo BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR", policyref="http://ps.eyeota.net/w3c/p3p.xml"

Redirect headers

Location
/pixel/bounce/?pid=r8hrb20&t=gif
Date
Sat, 25 Jul 2020 12:05:03 GMT
Content-Length
0
P3P
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR SAMo BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR", policyref="http://ps.eyeota.net/w3c/p3p.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR SAMo BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR", policyref="http://ps.eyeota.net/w3c/p3p.xml"
lounge.6525595c7a9874fa10bd041275e40f17.css
c.disquscdn.com/next/embed/styles/
0
22 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.6525595c7a9874fa10bd041275e40f17.css
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a813 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
324217
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
22092
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Mon, 20 Jul 2020 23:36:39 GMT
server
cloudflare
etag
"5f162a87-564c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-request-id
042775d51c0000062dc8a1d200000001
accept-ranges
bytes
cf-ray
5b85bf34f8c5062d-FRA
expires
Wed, 21 Jul 2021 18:01:24 GMT
common.bundle.f9de3d662c5d03c937747411c45f2ea2.js
c.disquscdn.com/next/embed/
0
88 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.f9de3d662c5d03c937747411c45f2ea2.js
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a813 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
324217
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
89946
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Mon, 20 Jul 2020 23:36:39 GMT
server
cloudflare
etag
"5f162a87-15f5a"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-request-id
042775d5380000062dc8a1e200000001
accept-ranges
bytes
cf-ray
5b85bf352940062d-FRA
expires
Wed, 21 Jul 2021 18:01:24 GMT
lounge.bundle.c32f18973ccddcdedfa44f2602cdb867.js
c.disquscdn.com/next/embed/
0
113 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.c32f18973ccddcdedfa44f2602cdb867.js
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a813 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
140245
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
115356
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Thu, 23 Jul 2020 20:57:22 GMT
server
cloudflare
etag
"5f19f9b2-1c29c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-request-id
042775d5380000062dc8a1f200000001
accept-ranges
bytes
cf-ray
5b85bf352943062d-FRA
expires
Fri, 23 Jul 2021 21:07:37 GMT
config.js
disqus.com/next/
0
7 KB
Other
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.192.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:03 GMT
X-Content-Type-Options
nosniff
Content-Type
application/javascript; charset=UTF-8
Server
nginx
Age
56
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
6275
X-XSS-Protection
1; mode=block
ads
securepubads.g.doubleclick.net/gampad/
145 KB
24 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2815525001828513&correlator=1730186680772116&output=ldjh&impl=fifs&adsid=NT&eid=21066031%2C21066532&vrg=2020072001&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200725&iu_parts=4444691%2CBIS_TOP_728x90%2CBIS_MID_RB_300x250%2CBIS_MID_RB_2_300x250%2CBIS_MID_RB_3_300x250%2CBIS_MID_RB_300x600%2CBIS_MID_L_180x150%2CBIS_MID_R_180x150%2CBIS_MID2_L_180x150%2CBIS_MID2_R_180x150%2CBIS_TEXT_1%2CBIS_TEXT_2%2CBIS_BOTTOM_728x90%2CBIS_MID_728x90%2CBIS_Interstitial%2CBIS_TOP_320x50%2CBIS_BOTTOM_320x50%2CBIS_MID_320x50%2CBIS_CAT_LOGO&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3%2C%2F0%2F4%2C%2F0%2F5%2C%2F0%2F6%2C%2F0%2F7%2C%2F0%2F8%2C%2F0%2F9%2C%2F0%2F10%2C%2F0%2F11%2C%2F0%2F12%2C%2F0%2F13%2C%2F0%2F14%2C%2F0%2F15%2C%2F0%2F16%2C%2F0%2F17%2C%2F0%2F18&prev_iu_szs=728x90%2C300x250%2C300x250%2C300x250%2C300x600%2C180x150%2C180x150%2C180x150%2C180x150%2C280x70%2C280x70%2C728x90%2C728x90%2C640x480%2C320x50%2C320x50%2C320x50%2C216x54&cust_params=category%3D%255B413%252C562%252C416%252C409%252C93%252C320%252C423%252C435%255D%26gated%3Dn&cookie_enabled=1&bc=31&abxe=1&lmt=1595678702&dt=1595678702883&dlt=1595678699502&idt=3352&frm=20&biw=1600&bih=1200&oid=3&adxs=615%2C1025%2C1025%2C-9%2C1010%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C15%2C-9%2C-9%2C-12245933%2C-12245933%2C-9%2C-12245933&adys=71%2C587%2C4065%2C-9%2C2152%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C4416%2C-9%2C-9%2C-12245933%2C-12245933%2C-9%2C-12245933&adks=606436291%2C592806581%2C4037182823%2C700692632%2C585369811%2C2214922354%2C1142555781%2C3687202745%2C1536889060%2C1397140349%2C824892936%2C1158310571%2C1554130010%2C3082656849%2C1657167512%2C3519266287%2C3120678580%2C3463778582&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9%7Ca%7Cb%7Cc%7Cd%7Ce%7Cf%7Cg%7Ch%7Ci&ifi=1&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&dssz=72&icsg=3298533878783&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=800x90%7C360x0%7C360x0%7C0x-1%7C390x595%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C1600x90%7C0x-1%7C0x-1%7C0x0%7C0x0%7C0x-1%7C780x4053&msz=770x90%7C360x250%7C360x250%7C0x-1%7C390x600%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C1570x90%7C0x-1%7C0x-1%7C0x0%7C0x0%7C0x-1%7C236x64&ga_vid=1950358036.1595678702&ga_sid=1595678703&ga_hid=677957424&fws=0%2C0%2C0%2C2%2C0%2C2%2C2%2C2%2C2%2C2%2C2%2C0%2C2%2C2%2C128%2C128%2C2%2C128&ohw=0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36b45447694459c6906c1718f2e4d7dbf2a443969c4a530868786de7d6e84fa0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:03 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
23762
x-xss-protection
0
google-lineitem-id
5374156995,5374156995,5374156995,5419002435,5374156995,-2,-2,-2,-2,-2,-2,5374156995,5374156995,5360991556,-2,-2,-2,-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138311858058,138311858010,138311858019,138316731935,138312228070,-2,-2,-2,-2,-2,-2,138311857974,138312227827,138310646542,-2,-2,-2,-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.bankinfosecurity.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
fcf61c9f2c53987e8f6061928a962663.safeframe.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://fcf61c9f2c53987e8f6061928a962663.safeframe.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

bundle.968756fbcfe01603c32c1e0d9b0b9ab9.js
vue.comm100.com/js/ Frame 511A
1002 KB
243 KB
Script
General
Full URL
https://vue.comm100.com/js/bundle.968756fbcfe01603c32c1e0d9b0b9ab9.js
Requested by
Host: chatserver.comm100.com
URL: https://chatserver.comm100.com/livechat.ashx?siteId=92035
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.4.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
d50ab4a607a1f79f62fb5b036f32b3bd702174c30e6829901a557d929d5b7566

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:03 GMT
content-encoding
gzip
cf-cache-status
HIT
age
5028159
x-powered-by
ASP.NET
status
200
content-length
248279
cf-request-id
042775d5a600007628ae1d2200000001
last-modified
Mon, 25 May 2020 22:19:32 GMT
server
cloudflare
etag
"0b25c90e232d61:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
5b85bf35dcfb7628-ARN
/
disqus.com/embed/comments/ Frame 880C
0
0
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&t_d=Microsoft%20Seizes%20Domains%20Used%20for%20COVID-19%20Phishing%20Scam&t_t=Microsoft%20Seizes%20Domains%20Used%20for%20COVID-19%20Phishing%20Scam&s_o=default
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.192.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ https://apis.google.com https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ 'unsafe-inline' https://com-disqus.netmng.com:* https://www.google.com/recaptcha/ https://cf.ignitionone.com:* https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
disqus.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576

Response headers

Connection
keep-alive
Content-Length
2700
Server
nginx
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ https://apis.google.com https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ 'unsafe-inline' https://com-disqus.netmng.com:* https://www.google.com/recaptcha/ https://cf.ignitionone.com:* https://disqus.com
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Timing-Allow-Origin
*
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Type
text/html; charset=utf-8
Last-Modified
Wed, 08 Jul 2020 00:27:00 GMT
ETag
W/"lounge:view:8114956664.cd3d4b4451f130382a9ce7bd4a4ad5ab.2"
Content-Encoding
gzip
Date
Sat, 25 Jul 2020 12:05:03 GMT
Age
0
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
amp4ads-v0.js
cdn.ampproject.org/rtv/012007102309000/ Frame 0AE8
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1d719a7b7ef17ad476a644a196c6130ed955f5ab06f7bac34632f44d4772bfe5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
10887
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57400
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:03:36 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"83969d63ffc70a02"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:03:36 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012007102309000/v0/ Frame 0AE8
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
10884
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:03:39 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:03:39 GMT
truncated
/ Frame 0AE8
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
dc49443119fc3bd2bccc5f83fb8d72a71ed424e38acd3b79f1f68b25df30fc2b

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/012007102309000/ Frame 1906
206 KB
57 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1d719a7b7ef17ad476a644a196c6130ed955f5ab06f7bac34632f44d4772bfe5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
10887
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57400
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:03:36 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"83969d63ffc70a02"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:03:36 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012007102309000/v0/ Frame 1906
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
10884
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:03:39 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:03:39 GMT
truncated
/ Frame 1906
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
bc0d7c09f5b6ccd79d7ae59e0ee269ce7a57c613dcdb9b47db7d34179f85640e

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/012007102309000/ Frame 95BF
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1d719a7b7ef17ad476a644a196c6130ed955f5ab06f7bac34632f44d4772bfe5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
10887
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57400
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:03:36 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"83969d63ffc70a02"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:03:36 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012007102309000/v0/ Frame 95BF
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
10884
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:03:39 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:03:39 GMT
truncated
/ Frame 95BF
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1bf76777478f4f13226648fc670323caaa51e6b12097784d30e07659b3dc3736

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
7023985773770768296
tpc.googlesyndication.com/simgad/ Frame 0AE8
26 KB
27 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7023985773770768296
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e49126b9c1de5a40b95eedc51611737f54d1ec8f63292467e12a797128a9c82c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 21 Jul 2020 16:49:25 GMT
x-content-type-options
nosniff
age
328538
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
27018
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:35 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 21 Jul 2021 16:49:25 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 0AE8
0
314 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsstTqCNMOeIyE4gFV3LGA8tJnKn_P6ZVgdf65r0SzKaz4BDTSGMozPW00elZhEQazva9nbqBdaHQWu2MfWxLCjtUaSiJC3urh3oFp02F1eroHxQmXWfsdZ2Z86mWRWWctc1T07VLMqbHLc262C3THqVIE5QrfQMaRbACTYRJ5UW583VhD4cx6BJeCBTz6OvaCdA8aKXT7bRmpWx9leLw4scfH3kqrRDg9U3502_2F6M13pdhh91dmILH3CwShgGiczZ-SKIFY_pSevR98GvZu0&sai=AMfl-YR5Uooo2WpP9Bwg5jWjte-IYrER0sQ2ZbzaN7MA02InHh_zLTybHwSY_6e37NQVIAQT3xlLHQ4Xglz43zEmm_00L4cuWg9SE1rOtY13YuJXBUQmy1WAEkJPwGm7TG6N&sig=Cg0ArKJSzIDnP6nJ2u3WEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 12:05:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 25 Jul 2020 12:05:03 GMT
1446018992864035693
tpc.googlesyndication.com/simgad/ Frame 1906
30 KB
30 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/1446018992864035693
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4d3fcbef254dcbd91c92b13ec741c0dcfc592fa256e234e53f27ba7e1a3052a7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 05:34:54 GMT
x-content-type-options
nosniff
age
196209
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
31010
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:53 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 23 Jul 2021 05:34:54 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 1906
0
272 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstMCiSwbjP7ADzv-Q2q4etUnH4RK8cViAwUCTIdbX6ty4LwVy-9kxi5XXetPcwctqKo_BAicvK-quOwQsYvACfSveAIAvFNZjNrc3PDR8BhjaE32UM8ClOG8GYEt6Q0-C3wC-01iLPjk4D77ZhKiFr9oznlDE3cBPSq6KQbI3KFLHNLDZOR3zZ8CmP0eX95jRqdau8oz6Cn3WdG7w66qNxYWBXkrKwqwLT4aJP7KIhbyhdzrvGI7mGEwm1VJx9VWRtabuA9HLZvDpm4oxObbA30GGSp&sai=AMfl-YQmxekss9joyfZs7t3OcfkIFmzftZdyp9KINrth5NpXSHGw3KdyUSFeFFNvEgTBspt22Rp-YLlLRVQvpXDB_D2rAM6Y8ml2JlFf-VYgAad3pYZBoVMHbkit_VmYzQnu&sig=Cg0ArKJSzMGmhe8nF5qxEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 12:05:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 25 Jul 2020 12:05:03 GMT
1446018992864035693
tpc.googlesyndication.com/simgad/ Frame 95BF
30 KB
30 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/1446018992864035693
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4d3fcbef254dcbd91c92b13ec741c0dcfc592fa256e234e53f27ba7e1a3052a7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 05:34:54 GMT
x-content-type-options
nosniff
age
196209
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
31010
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:53 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 23 Jul 2021 05:34:54 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 95BF
0
273 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssamQsd-1LkMv_Ec9H3aEAB_8Smi8W4-xRUpYX5Dv2yo-YUyVejEkK-QIjy0Am-dTtzM4Qfq0BTZEGJWgo6EnVLhyuTI3iWH33gPbxVa6hl8UaE2AE7c0QW7K0pGgS2YJBKLHjNC-gGWaMSX9DOVHniN3LzgPH67onzXueexqqzeONF-MB5zA7sCAOXO7nfH17DnsK0SRJOurfWa9ik-Q3er1CA_hwZ0pVy-j8yXtF5y8U4qs150Cupmwz_Ztm6IPrZEvKMszNT2aOp4lNQy58dgyZbAfE&sai=AMfl-YTgTCu2SegdLd_0wMChoDmpako1Lp3VRgl1MPOkvb3bOvYnoy1XvDb5AXsqVhrL44R4gAW2VTYdGUcPOHeXsfQ5SRCXyEX6j3H_PEebIR-zSIMdwNEAAjn764Dvorv_&sig=Cg0ArKJSzGBDVA-3jpxCEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 12:05:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 25 Jul 2020 12:05:03 GMT
l
www.google.com/ads/measurement/ Frame 95BF
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaQzgPgjfg0pF06ZDNMklQW2VQByauwrjKb8A-R7Sni_TPz4oEduwN_pMfv-wrCYvMB3eRNZ
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

amp4ads-v0.js
cdn.ampproject.org/rtv/012007102309000/ Frame CBF5
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1d719a7b7ef17ad476a644a196c6130ed955f5ab06f7bac34632f44d4772bfe5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
10887
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57400
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:03:36 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"83969d63ffc70a02"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:03:36 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012007102309000/v0/ Frame CBF5
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
10884
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:03:39 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:03:39 GMT
truncated
/ Frame CBF5
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c12a7f149722f95f777d2a18fbf6c5c7f45fc2a860b2b6b94d48e261b87d0cd0

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/012007102309000/ Frame F0C2
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1d719a7b7ef17ad476a644a196c6130ed955f5ab06f7bac34632f44d4772bfe5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
10887
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57400
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:03:36 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"83969d63ffc70a02"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:03:36 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012007102309000/v0/ Frame F0C2
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
10884
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:03:39 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:03:39 GMT
7023985773770768296
tpc.googlesyndication.com/simgad/ Frame F0C2
26 KB
26 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7023985773770768296
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e49126b9c1de5a40b95eedc51611737f54d1ec8f63292467e12a797128a9c82c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 21 Jul 2020 16:49:25 GMT
x-content-type-options
nosniff
age
328538
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
27018
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:35 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 21 Jul 2021 16:49:25 GMT
truncated
/ Frame F0C2
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9b84097d8412a8f21d113055e30f8eb5ece80716e874dee6b5a77518d469584a

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
13894270929831550705
tpc.googlesyndication.com/simgad/ Frame CBF5
60 KB
60 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/13894270929831550705
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
57addda2c635118ad02c1fbe74324d03d5dee2a1561c42e0b9c35f5c18e64f62
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 12 Jun 2020 20:54:23 GMT
x-content-type-options
nosniff
age
3683440
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
61388
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:13 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 12 Jun 2021 20:54:23 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame CBF5
0
273 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssyCR-bg_7kipYK8Qcx7nT0cP4RyQ1Km_C3hH2CXDgiUy2ZSgBTqF9tdXQHpi5GhwhVRCGlICBib_2GficpAzQm0yQhaK2pghh5ii3uYDfQNVrsF1DkYf2g8pg_a8M9L5uLwVn5Qg7mbLawk_7hK1_UcXrx6eEjsRWM1FDjEr0F37j6o17WG5HfZjNi-z8z4wh8zi7Bb_bQMzeIGfbs536toTCk8S3-THJycRwblVCpYBU9L3Lx0qxdKNv-R1LEL1rS9P6YqTiHR8FbbEiL3vZoYUfh&sai=AMfl-YTVUmsVvho7wmSeLeB6tH84drLCvEBAhR58vgemmNBwB_4iOCnbbmUfuy1ZN6EmHPNjkiRamIpTfsmGrQ_lJW3Nj7PxSG2IRs6njKDMUwQHrIbyG5rmHiV9Nu6xknnA&sig=Cg0ArKJSzOFZHaJ3sx5PEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 12:05:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 25 Jul 2020 12:05:03 GMT
l
www.google.com/ads/measurement/ Frame CBF5
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaTghaPHT9c9Fc0rvebnEMj-sNxpRfMOjuAAnbucg5-JBvhze_b6d34U1mkjNO4RUdzn0sCA
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

view
securepubads.g.doubleclick.net/pcs/ Frame F0C2
0
271 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvFiW0I3QaqVeex3FPITzau0F0Nfw0XNoe5IYcJQSDvAgCR_PKUIhaLw2t8Xa1Q2AsJ1WaWM5hqThMFNBkGnGDjBgoGYNgsZ5pgRSuSm6mGU3oImfxAFHwNFNYfePPUculrbyNvdxspLBl4DJGszogMWbbl1QCjWmyAiNA2l1c673s00Az4YL1ZLQP7h72CpXM1Uq-NCdAe_UBZUkQZnCe23dZekM6m019GJNhYhZyAKo-RjQ3QHt1GtlunXtreQaLSZVCzqsEWuu_FfCWZkfGLnr8&sai=AMfl-YSROKC5wtuBLBPblfWCGgR4rKJrWXuXMUYdsnY32dteRREXzOEf10mniVx-QnJ3igqUUtOl-LhPkjOyaSMX0bj6qtLQahiEz2XKFe1ohvscV3EZvu3HYZoDTd112nqi&sig=Cg0ArKJSzAUE1T53McutEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 12:05:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 25 Jul 2020 12:05:03 GMT
l
www.google.com/ads/measurement/ Frame F0C2
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaRIXpwcqsqJYbDQfDfgjkZN7nNeHIqKAAIJ6MId-yD7PkE9FqonPWs_kukTszec1Ol960_S
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

visitor.ashx
chatserver3.comm100.com/ Frame 511A
996 B
885 B
XHR
General
Full URL
https://chatserver3.comm100.com/visitor.ashx?siteId=92035
Requested by
Host: vue.comm100.com
URL: https://vue.comm100.com/js/bundle.968756fbcfe01603c32c1e0d9b0b9ab9.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.4.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
985c91121dcc18ab51c9cebfb81414a1745cb42c0b694f8dfa21b529d9d62ef4

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Sat, 25 Jul 2020 12:05:04 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
x-aspnet-version
4.0.30319
x-powered-by
ASP.NET
p3p
CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
status
200
content-length
544
cf-request-id
042775d6f600007628ae1da200000001
x-robots-tag
noindex, nofollow
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
content-type
text/json; charset=utf-8
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
private
access-control-allow-credentials
true
cf-ray
5b85bf37fdb37628-ARN
access-control-allow-headers
Content-type,api-key,Authorization,X-Requested-With
1446018992864035693
tpc.googlesyndication.com/simgad/ Frame 1906
30 KB
30 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/1446018992864035693
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4d3fcbef254dcbd91c92b13ec741c0dcfc592fa256e234e53f27ba7e1a3052a7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 05:34:54 GMT
x-content-type-options
nosniff
age
196209
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
31010
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:53 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 23 Jul 2021 05:34:54 GMT
7023985773770768296
tpc.googlesyndication.com/simgad/ Frame 0AE8
26 KB
26 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7023985773770768296
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e49126b9c1de5a40b95eedc51611737f54d1ec8f63292467e12a797128a9c82c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 21 Jul 2020 16:49:25 GMT
x-content-type-options
nosniff
age
328538
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
27018
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:35 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 21 Jul 2021 16:49:25 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 1906
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstT9Wi28gK1KewRPjRV3b3a-BptTZXq-sAoZBMd9gs9sMUu4Lh3vn4d9lXvU_5FZlagddQbxb0lodSio_UfqSYKU3XYhZOkyzjGpU047qK-RHyfTWERZzzgCuGMi8yqY6a7ByoQOhj50e7TEU8MwBCfeZSx5it0Oj781BBxTKRvXrAUHaP15Jb5iSUJAxu1XdaCO-4aXgVfprFLGqO6tMAsc2xLAYlCaOLbLzmTiYDJjlHina8JMo70C5hWzuKEYEDmcQLab2q8QYG30wIdeMkUp1hwBT8&sai=AMfl-YTW-Swd2Lfu8f4DFeqygBLJCfHg5Y4Dv-ESDh0-T6C-c-9uVIGkOpD9If8FAgR-6EOwL2ZydRYzJkz3LX1SEGj5IDwrjZAh4oMlWxJjW5KjZdh07IpdwwU8unf5aIqh&sig=Cg0ArKJSzLSS2cTHKJhZEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 12:05:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
1446018992864035693
tpc.googlesyndication.com/simgad/ Frame 95BF
30 KB
30 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/1446018992864035693
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4d3fcbef254dcbd91c92b13ec741c0dcfc592fa256e234e53f27ba7e1a3052a7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 05:34:54 GMT
x-content-type-options
nosniff
age
196209
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
31010
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:53 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 23 Jul 2021 05:34:54 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 0AE8
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssY6w88mdaJx-mgc_TtCeHcQSuksADPCpdnJxeSuNIq-3uxNaU0_mKUARt6RBtyBsiGg6esj9p7h_5FsWSn2FL5XXBtHjLgyxLLlD7JQRs3WdgfHB5swJ2Xi8CRg5LqInpglt6EwIcyh8XGj80kYOzSuiotA7W3pKBjXMP2FC9lrAWSvLd74s1QGzWB32YdqzzEHzaA7jFKLIcy6CS3avGfgPSuO_Opo6O_m8dkMQ7nM0-3L9ednep_d4I0SDsnmCfAeNIMIpl1oCPhbe2AEz_t2A&sai=AMfl-YRGmZh1iSFr1e47GhYTYceCMh_m3HQj61mHZKmLs97QC80X1q3to70tkk2H8neCcaF39Z6HbwV1XMQ5EW1lDRjiiQQVns-KJqDKzAfcC3aj3XOZ-_a1pkpNoSzzY3mA&sig=Cg0ArKJSzPrfm6RacoWZEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 12:05:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
view
securepubads.g.doubleclick.net/pcs/ Frame 95BF
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssJK9KZDQtxNTq-kCRavQ63JJABMeobysg5Pbvc5rR6nx-0i54nPDlGAZdE4CygMua3k3U_uGlg9zY6LiCzF73gzfh9hxY2tpaDMStbzrjAaobJDzcMHTL6nxo_gT1R_2FfwMpwe-8HCr5lr3f9LdEsieKWzzZuyeJ_E6fJOuvUPn_T9E2_bujt59bxAMxzLpDB2sn_atyfo9kyVPe3b4td1fJfsyUGTA9p8QcBA57O0mK5FRGJkw5INdRzVaEEgcGAAMcNjyjj8kinaowZurX15DG5O34_XQ&sai=AMfl-YQn4n_LHHEc-0lWwVvbaiaHKcqqjhPyXiRSHhWXwQNk4ox8qqLyelSQxEJeJ-6tPfLzMKxqADFzySdoFXLxIv_oXTGgOhIJgtZOOBrL6hLD5RKWVyKfJSduK_Tev3xg&sig=Cg0ArKJSzKmTi9Oy3H4qEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 12:05:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
13894270929831550705
tpc.googlesyndication.com/simgad/ Frame CBF5
60 KB
60 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/13894270929831550705
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
57addda2c635118ad02c1fbe74324d03d5dee2a1561c42e0b9c35f5c18e64f62
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 12 Jun 2020 20:54:23 GMT
x-content-type-options
nosniff
age
3683440
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
61388
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:13 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 12 Jun 2021 20:54:23 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame CBF5
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssc9zMtnwydXJ4Y96_wxTttaD1XOid1MO21cTRnZd3kFQ3aHXCTrTPNBrayCWaOOA4F9smg5fq_lBYqV6ZJy2XWEU3jzqa8-yGMVS4gLK4K6-r1nlkOqmSSGYemVTAGbfrqK7B_J82X2oCDgkp_4Wbgj7EU3scyGW5UePSXbs8bIdUwUH9rm4bn1jSC8njc-DuUPDexg28N2ZUlPkUTFf3ZqL_7mbkPvWMfCk_IHsxSzwlXjfo4azKmOPCkI-NunVmoyX1bJXbGQ63zd7pfp6LZ00brYoA&sai=AMfl-YTRhqb-nyK2dRIbOwe5dSW8WwC8bS7oaqz5U_3isqnwAoY-laSlWdOJLDgbmvNryvr7Pxp9bo3Of7Z-vBCbdk4mG0H8W-U-JelNqwNEpda1vgPL2KQasbhUNrgDrGVk&sig=Cg0ArKJSzGRec6YY4_SeEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 12:05:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
7023985773770768296
tpc.googlesyndication.com/simgad/ Frame F0C2
26 KB
26 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7023985773770768296
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e49126b9c1de5a40b95eedc51611737f54d1ec8f63292467e12a797128a9c82c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 21 Jul 2020 16:49:25 GMT
x-content-type-options
nosniff
age
328538
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
27018
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:35 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 21 Jul 2021 16:49:25 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame F0C2
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvocR5uTSIx9aGhbcLeSBvn3WfId18r5STKBlsWLY-TJ2UmxQEQ35Wy0TeKmDrH1AIoTIsrTr96_ddlm1g0MCwY0e56wLYiGY5dZWofhyvR_DqkpvZVoPX_OavK_GdO0_CZ7s6ttjCIRlmdp79lrVpfG-SsYOx20oCu-uwBnMMpsH24ru6clpssqweKPf_uQxXuiOl7H1HUHyE5VyrlWrn9uC6HnsusLApLfNMUzop8FPJxorWJmWQ043kzl6FV25_WyHx4mGKWu7bSCnrzKX3uiXnF3g&sai=AMfl-YSiTLk1xRV51WJOf1Wvg2H5dd-gfGtald5HkkLhrAh32zbg1dIjDA8wbO-cP6tvXUvB2sM3FOkcWYUqdFw9i6V9iASmJ8HybGcRfh4aTrPyFJE8UOq8-XZ9STq2yeJg&sig=Cg0ArKJSzKyUsdPuJtgJEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 12:05:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
bis-hdr.desktop.r2.js
www.bankinfosecurity.com/javascripts-responsive/
2 KB
906 B
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/bis-hdr.desktop.r2.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
a952a44375a3d8c869e96f85505fcbae076f4226021f08676a1b4627152252d0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 12:05:04 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=93
Content-Length
595
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
6 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020072001&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
3a1b179c5457efc99d86cde4d756b40e3921161282320609445691cd6ec405de
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 12:05:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
5776
x-xss-protection
0
up.js
cdn01.basis.net/assets/
1 KB
950 B
Script
General
Full URL
https://cdn01.basis.net/assets/up.js?um=1
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-T6KM3T
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
178.79.227.76 , Italy, ASN22822 (LLNW, US),
Reverse DNS
Software
AC1.1 /
Resource Hash
6d810862e66c6beb7963f98524bee4231cd6ae1a41a2c8389ea49c31976180f8

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:04 GMT
content-encoding
gzip
last-modified
Wed, 13 Nov 2019 19:28:15 GMT
server
AC1.1
age
427110
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
737
x-llid
6229ef670bdb54cc2da284f13ea436b9
64ead273d1f41aa7
pixel.sitescout.com/iap/
Redirect Chain
  • https://pixel-a.basis.net/iap/64ead273d1f41aa7
  • https://pixel.sitescout.com/iap/64ead273d1f41aa7
0
191 B
Image
General
Full URL
https://pixel.sitescout.com/iap/64ead273d1f41aa7
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
66.155.71.149 Southampton, United Kingdom, ASN13768 (COGECO-PEER1, CA),
Reverse DNS
Software
AC1.1 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
204
pragma
no-cache
date
Sat, 25 Jul 2020 12:05:03 GMT
cache-control
max-age=0,no-cache,no-store
expires
Tue, 11 Oct 1977 12:34:56 GMT
server
AC1.1
p3p
CP="NON DEVa PSAa PSDa OUR NOR NAV",policyref="/w3c/p3p.xml"

Redirect headers

status
301
content-length
0
location
https://pixel.sitescout.com/iap/64ead273d1f41aa7
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
6 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
08f50e9e70388c99977ca13b6af3a49f8f48c83e79230d51ea72a56c0735bd0c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1591403518460474"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5540
x-xss-protection
0
expires
Sat, 25 Jul 2020 12:05:04 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/210/ Frame 7FBC
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/210/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/210/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
4590
date
Sat, 25 Jul 2020 11:54:10 GMT
expires
Sun, 25 Jul 2021 11:54:10 GMT
last-modified
Wed, 26 Feb 2020 19:47:50 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
654
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
visitor.ashx
chatserver3.comm100.com/ Frame 511A
992 B
861 B
XHR
General
Full URL
https://chatserver3.comm100.com/visitor.ashx?siteId=92035
Requested by
Host: vue.comm100.com
URL: https://vue.comm100.com/js/bundle.968756fbcfe01603c32c1e0d9b0b9ab9.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.4.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
8f38251ffca0c839818bb832c8967ade647b383b32191a86f432550367c86d7e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Sat, 25 Jul 2020 12:05:04 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
x-aspnet-version
4.0.30319
x-powered-by
ASP.NET
p3p
CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
status
200
content-length
575
cf-request-id
042775da0800007628ae1f6200000001
x-robots-tag
noindex, nofollow
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
content-type
text/json; charset=utf-8
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
private
access-control-allow-credentials
true
cf-ray
5b85bf3cdf187628-ARN
access-control-allow-headers
Content-type,api-key,Authorization,X-Requested-With
gen_204
pagead2.googlesyndication.com/pagead/
0
216 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=210&t=2&li=gpt_2020072001&jk=2815525001828513&bg=!AwClABhYD3DEkBMLR-UCAAAAQVIAAAANmQGPIALyK9LTZ335vyIkiyI3hjhAeY9ZpA1n2q160ZhUOzs3LwiNpVSINce0AWRzrORH4sfGwCa5j7Le8ZmK6TTk0mI3XOkbP4wSYubYyUIHa9nIzko8W3lXYr6TgfJFQeuZN_lCjhcBKFPtjwd_9WdPIzngDdXYmkS2ZJUaI7oeDRjFxSgr0M8OqBy3y1h-ttK7ib63BWiVi-SbsY9_ZU8LxkfimBHoDSbjYnHUGLwN2kyKvN02JD6vtJvrRr_6Z2CeejUATuDPFI39BC03aUXFr9oftHsZDzpMM8-boQftM0H8k6ShPMdTKH9owyOhDM9BPpZ4STwgS4IESSNAX47YNkX3CO9naRJ6po2kRL_KkbPcnydXQ74BN_ltGpQSxFQ_lUptwffG6fDGv7Ms2I2K84-nuV-wBu-_M2Btqbk08mBbLHOodYsCH0ucr9A6YvWlnrPzJn3b_JSc6UaOJS2sJYJn8Mx3_EKoaxhtXrnAckYenKjudS0r5pgKqToHpb97IV9RKJiIJU6U2u1wF47D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 12:05:04 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 1906
42 B
112 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvw8W0nX6kmFitH41eB5kO4CGjjw_yYT0cPEVFuMvJeG5-mIfbeNi7MB2lTyROsckY7ILgfmYLNG1hH-v8iCp6sAxgN9xNtcFQZ8kYaZr0&sig=Cg0ArKJSzA2L-jH9DDuvEAE&id=ampim&o=1040,587&d=300,250&ss=1600,1200&bs=1600,1200&mcvt=1001&mtos=0,0,1001,1001,1001&tos=0,0,1001,0,0&tfs=229&tls=1230&g=100&h=100&tt=1230&r=v&avms=ampa&adk=592806581
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 12:05:04 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
asyncPixelSync
pixel.sitescout.com/dmp/ Frame DF08
0
0
Document
General
Full URL
https://pixel.sitescout.com/dmp/asyncPixelSync
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
66.155.71.149 Southampton, United Kingdom, ASN13768 (COGECO-PEER1, CA),
Reverse DNS
Software
AC1.1 /
Resource Hash

Request headers

:method
GET
:authority
pixel.sitescout.com
:scheme
https
:path
/dmp/asyncPixelSync
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576

Response headers

status
204
cache-control
max-age=0,no-cache,no-store
pragma
no-cache
expires
Tue, 11 Oct 1977 12:34:56 GMT
p3p
CP="NON DEVa PSAa PSDa OUR NOR NAV",policyref="/w3c/p3p.xml"
date
Sat, 25 Jul 2020 12:05:03 GMT
server
AC1.1
dabbb58b17f5118e
pixel.sitescout.com/up/
43 B
267 B
Image
General
Full URL
https://pixel.sitescout.com/up/dabbb58b17f5118e?cntr_url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
66.155.71.149 Southampton, United Kingdom, ASN13768 (COGECO-PEER1, CA),
Reverse DNS
Software
AC1.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 12:05:04 GMT
server
AC1.1
p3p
CP="NON DEVa PSAa PSDa OUR NOR NAV",policyref="/w3c/p3p.xml"
status
200
cache-control
max-age=0,no-cache,no-store
content-type
image/gif
content-length
43
expires
Tue, 11 Oct 1977 12:34:56 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 0AE8
42 B
107 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsujVF2lvZVbaDCkLFZLlA1BmW9sayV4os_cjjGYMpmNKWPDPkHWpCNTqjdZPHnbnUI_Row8DGysiGIPQwXYH9f2aBAwN3Za1iAmdFzJEsM&sig=Cg0ArKJSzHid4dQI11VEEAE&id=ampim&o=636,71&d=728,90&ss=1600,1200&bs=1600,1200&mcvt=1000&mtos=0,0,1000,1000,1000&tos=0,0,1000,0,0&tfs=171&tls=1171&g=100&h=100&tt=1172&r=v&avms=ampa&adk=606436291
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 12:05:04 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
campaign.ashx
chatserver3.comm100.com/ Frame 511A
6 KB
3 KB
XHR
General
Full URL
https://chatserver3.comm100.com/campaign.ashx?siteId=92035&campaignId=1275&lastUpdateTime=75567E86D28614B61879350BF24B10CF3D5F2F97D558627059BACCEACEA691D0
Requested by
Host: vue.comm100.com
URL: https://vue.comm100.com/js/bundle.968756fbcfe01603c32c1e0d9b0b9ab9.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.4.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
75567e86d28614b61879350bf24b10cf3d5f2f97d558627059bacceacea691d0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 12:05:05 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
x-aspnet-version
4.0.30319
x-powered-by
ASP.NET
status
200
content-length
2617
cf-request-id
042775dd490000cad44f2c4200000001
x-robots-tag
noindex, nofollow
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/json; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000
cf-ray
5b85bf4209c4cad4-ARN
access-control-allow-headers
Content-type,api-key,Authorization,X-Requested-With

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.mp4
Domain
s7.addthis.com
URL
https://s7.addthis.com/static/sh.f48a1a04fe8dbf021b4cda1d.html

Verdicts & Comments Add Verdict or Comment

184 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery object| jQuery191042848947354693134 object| mejs function| MediaElement object| HtmlMediaElement function| onYouTubePlayerAPIReady function| DefaultPlayer function| MediaElementPlayer number| mce-data-1ee2tpcqf object| tinyMCE object| tinymce function| des function| des_createKeys function| stringToHex function| hexToString function| readCookie function| disqus_config object| googletag object| top_banner_display object| dataLayer function| importScript function| cleanExistingScript function| refreshJavascript function| atwpjp string| _atd function| _euc function| _duc object| _atc string| _atr object| addthis string| addthis_pub function| emdot object| _ate object| _adr object| addthis_conf function| addthis_open function| addthis_close function| addthis_sendto string| base_url string| base_url_auto string| ssl_base string| services_url string| includes_url object| video_intro object| audio_data boolean| rsa_page boolean| ceo_page boolean| interview_page boolean| article_page boolean| is_gatedasset number| videoAskLoginTime number| videoStart boolean| identified_user boolean| display_videologin string| current_page string| session_id boolean| user_is_acq object| login_reload_pages object| scrollTopPages string| popup_to_open string| marketo_contact_identification_ajax object| all_states object| all_countries_with_states string| webinar_auto_click_register string| webinar_auto_click_register_slot string| __family__ boolean| exclude_pre_roll object| user_email number| ENTER_KEY object| article_video_caption_id object| highlight number| show_subtitles_speakers string| caption_speakers string| register_source boolean| player_is_running undefined| opened_modal undefined| do_hashchange function| closeCookieTerms function| uncheckGroupInputs function| submitFormPopup function| setMembershipPrices function| updatePriceBox function| forgotPassword function| generateHash2w function| login function| register function| pagination function| scrollTO function| showAlert function| assetPrequalSubmit function| addToBriefcase function| toggleDdlsByValue function| populateStates function| registerFormShowErrors function| recordLead function| initAudio function| initVideos function| initVideoScrolling function| resizeVideoPlayer function| removePlayerFromSidebar function| togglePrePostTime function| jumpSlide function| initVideoEvents function| URLToObj function| timedPopUpCount function| initAutoPopups function| initAJAXpopups function| checkClassicPopupPrequalErrors function| submitPopupAction function| saveToMyJobs function| initEmailSubscriptionsValidation function| emailSubscriptionsUncheckAll function| showPopupOnDemand function| sendAssetEmail function| runStrikesOnMKTLeadIdentification function| mediaMetadataNavigation number| width function| isMobile boolean| isDesktop function| addClassToMenuItem function| addClassToDropDown function| removeClassFromMenuItem function| removeClassFromDropDown function| clearDropDowns function| showDropDown function| hideDropDown function| showDropDown2 function| hideDropDown2 string| disqus_shortname string| disqus_url string| GoogleAnalyticsObject function| ga object| _ml function| CE_READY string| _bizo_data_partner_id object| Comm100API object| comm100_chatButton object| comm100_lc object| comm100_s number| top_banner_display_interval object| jQBrowser boolean| pp_alreadyInitialized boolean| doresize object| scroll_pos string| url boolean| hashtag object| addthis_share object| addthis_config boolean| notifications object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| google_tag_manager object| google_tag_data object| gaplugins object| gaGlobal object| gaData function| lintrk boolean| _already_called_lintrk function| mktoMunchkinFunction object| Munchkin function| mktoMunchkin boolean| __@@##MUH object| CE2 object| MunchkinTracker object| oattr object| DISQUS number| google_srt function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter undefined| google_measure_js_timing number| __google_ad_urls_id number| google_unique_id object| ampInaboxPositionObserver object| ampInaboxFrameOverlayManager object| GoogleGcLKhOms function| showSearch function| hideSearch object| google_image_requests object| cntrUpTag

14 Cookies

Domain/Path Name / Value
.disqus.com/ Name: disqus_unique
Value: 57prjbeq11npt
.addthis.com/ Name: uvc
Value: 1%7C30
www.bankinfosecurity.com/ Name: PHPSESSID
Value: uobud5sd6762qrccjidfhdrbeh
.bankinfosecurity.com/ Name: _gat_newTracker
Value: 1
disqus.com/ Name: __jid
Value: 57pv12gljjcif
.bankinfosecurity.com/ Name: _gat
Value: 1
.addthis.com/ Name: loc
Value: MDAwMDBFVVNFMFQyMzkxMTk1MTEzMDAwMDBDSA==
www.bankinfosecurity.com/ Name: __atuvs
Value: 5f1c1fec9a3f75ab000
.bankinfosecurity.com/ Name: _ga
Value: GA1.2.1950358036.1595678702
.bankinfosecurity.com/ Name: _gid
Value: GA1.2.1147450682.1595678702
www.bankinfosecurity.com/ Name: visitorip
Value: 165.231.142.36
.bankinfosecurity.com/ Name: __gads
Value: ID=ce356bc3351e57af-224304b09fb600b6:T=1595678702:S=ALNI_MZTmRRlQKr9w94aG-sGjWf0O81eAQ
.bankinfosecurity.com/ Name: _mkto_trk
Value: id:051-ZXI-237&token:_mch-bankinfosecurity.com-1595678702754-14816
www.bankinfosecurity.com/ Name: __atuvc
Value: 1%7C30

11 Console Messages

Source Level URL
Text
console-api debug URL: https://munchkin.marketo.net/158/munchkin.js(Line 22)
Message:
Munchkin.init("%s") options: 051-ZXI-237 [object Object]
console-api info URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
console-api info URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
console-api info URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
console-api info URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
console-api info URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
console-api warning URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 21)
Message:
[amp-analytics/transport] Response unparseable or failed to send image request https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstT9Wi28gK1KewRPjRV3b3a-BptTZXq-sAoZBMd9gs9sMUu4Lh3vn4d9lXvU_5FZlagddQbxb0lodSio_UfqSYKU3XYhZOkyzjGpU047qK-RHyfTWERZzzgCuGMi8yqY6a7ByoQOhj50e7TEU8MwBCfeZSx5it0Oj781BBxTKRvXrAUHaP15Jb5iSUJAxu1XdaCO-4aXgVfprFLGqO6tMAsc2xLAYlCaOLbLzmTiYDJjlHina8JMo70C5hWzuKEYEDmcQLab2q8QYG30wIdeMkUp1hwBT8&sai=AMfl-YTW-Swd2Lfu8f4DFeqygBLJCfHg5Y4Dv-ESDh0-T6C-c-9uVIGkOpD9If8FAgR-6EOwL2ZydRYzJkz3LX1SEGj5IDwrjZAh4oMlWxJjW5KjZdh07IpdwwU8unf5aIqh&sig=Cg0ArKJSzLSS2cTHKJhZEAE&adurl=
console-api warning URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 21)
Message:
[amp-analytics/transport] Response unparseable or failed to send image request https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssY6w88mdaJx-mgc_TtCeHcQSuksADPCpdnJxeSuNIq-3uxNaU0_mKUARt6RBtyBsiGg6esj9p7h_5FsWSn2FL5XXBtHjLgyxLLlD7JQRs3WdgfHB5swJ2Xi8CRg5LqInpglt6EwIcyh8XGj80kYOzSuiotA7W3pKBjXMP2FC9lrAWSvLd74s1QGzWB32YdqzzEHzaA7jFKLIcy6CS3avGfgPSuO_Opo6O_m8dkMQ7nM0-3L9ednep_d4I0SDsnmCfAeNIMIpl1oCPhbe2AEz_t2A&sai=AMfl-YRGmZh1iSFr1e47GhYTYceCMh_m3HQj61mHZKmLs97QC80X1q3to70tkk2H8neCcaF39Z6HbwV1XMQ5EW1lDRjiiQQVns-KJqDKzAfcC3aj3XOZ-_a1pkpNoSzzY3mA&sig=Cg0ArKJSzPrfm6RacoWZEAE&adurl=
console-api warning URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 21)
Message:
[amp-analytics/transport] Response unparseable or failed to send image request https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssJK9KZDQtxNTq-kCRavQ63JJABMeobysg5Pbvc5rR6nx-0i54nPDlGAZdE4CygMua3k3U_uGlg9zY6LiCzF73gzfh9hxY2tpaDMStbzrjAaobJDzcMHTL6nxo_gT1R_2FfwMpwe-8HCr5lr3f9LdEsieKWzzZuyeJ_E6fJOuvUPn_T9E2_bujt59bxAMxzLpDB2sn_atyfo9kyVPe3b4td1fJfsyUGTA9p8QcBA57O0mK5FRGJkw5INdRzVaEEgcGAAMcNjyjj8kinaowZurX15DG5O34_XQ&sai=AMfl-YQn4n_LHHEc-0lWwVvbaiaHKcqqjhPyXiRSHhWXwQNk4ox8qqLyelSQxEJeJ-6tPfLzMKxqADFzySdoFXLxIv_oXTGgOhIJgtZOOBrL6hLD5RKWVyKfJSduK_Tev3xg&sig=Cg0ArKJSzKmTi9Oy3H4qEAE&adurl=
console-api warning URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 21)
Message:
[amp-analytics/transport] Response unparseable or failed to send image request https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssc9zMtnwydXJ4Y96_wxTttaD1XOid1MO21cTRnZd3kFQ3aHXCTrTPNBrayCWaOOA4F9smg5fq_lBYqV6ZJy2XWEU3jzqa8-yGMVS4gLK4K6-r1nlkOqmSSGYemVTAGbfrqK7B_J82X2oCDgkp_4Wbgj7EU3scyGW5UePSXbs8bIdUwUH9rm4bn1jSC8njc-DuUPDexg28N2ZUlPkUTFf3ZqL_7mbkPvWMfCk_IHsxSzwlXjfo4azKmOPCkI-NunVmoyX1bJXbGQ63zd7pfp6LZ00brYoA&sai=AMfl-YTRhqb-nyK2dRIbOwe5dSW8WwC8bS7oaqz5U_3isqnwAoY-laSlWdOJLDgbmvNryvr7Pxp9bo3Of7Z-vBCbdk4mG0H8W-U-JelNqwNEpda1vgPL2KQasbhUNrgDrGVk&sig=Cg0ArKJSzGRec6YY4_SeEAE&adurl=
console-api warning URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 21)
Message:
[amp-analytics/transport] Response unparseable or failed to send image request https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvocR5uTSIx9aGhbcLeSBvn3WfId18r5STKBlsWLY-TJ2UmxQEQ35Wy0TeKmDrH1AIoTIsrTr96_ddlm1g0MCwY0e56wLYiGY5dZWofhyvR_DqkpvZVoPX_OavK_GdO0_CZ7s6ttjCIRlmdp79lrVpfG-SsYOx20oCu-uwBnMMpsH24ru6clpssqweKPf_uQxXuiOl7H1HUHyE5VyrlWrn9uC6HnsusLApLfNMUzop8FPJxorWJmWQ043kzl6FV25_WyHx4mGKWu7bSCnrzKX3uiXnF3g&sai=AMfl-YSiTLk1xRV51WJOf1Wvg2H5dd-gfGtald5HkkLhrAh32zbg1dIjDA8wbO-cP6tvXUvB2sM3FOkcWYUqdFw9i6V9iASmJ8HybGcRfh4aTrPyFJE8UOq8-XZ9STq2yeJg&sig=Cg0ArKJSzKyUsdPuJtgJEAE&adurl=

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com
051-zxi-237.mktoresp.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com
adservice.google.com
adservice.google.de
bankinfosecurity.disqus.com
c.disquscdn.com
cdn.ampproject.org
cdn01.basis.net
chatserver.comm100.com
chatserver3.comm100.com
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com
dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com
disqus.com
dnn506yrbagrg.cloudfront.net
dpm.demdex.net
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com
fcf61c9f2c53987e8f6061928a962663.safeframe.googlesyndication.com
fonts.googleapis.com
fonts.gstatic.com
idsync.rlcdn.com
in.ml314.com
m.addthis.com
match.adsrvr.org
ml314.com
munchkin.marketo.net
pagead2.googlesyndication.com
pbs.twimg.com
pixel-a.basis.net
pixel.sitescout.com
ps.eyeota.net
px.ads.linkedin.com
s7.addthis.com
script.crazyegg.com
securepubads.g.doubleclick.net
sjs.bizographics.com
stats.g.doubleclick.net
sync.crwdcntrl.net
tpc.googlesyndication.com
v1.addthisedge.com
vue.comm100.com
worker.ismgcorp.com
www.bankinfosecurity.com
www.google-analytics.com
www.google.com
www.googletagmanager.com
www.googletagservices.com
www.linkedin.com
z.moatads.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
s7.addthis.com
104.130.251.6
104.20.4.43
143.204.208.128
151.101.112.134
151.101.192.134
172.217.16.130
178.79.227.76
192.28.147.68
2.21.36.164
23.210.248.44
2606:2800:134:1a0d:1429:742:782:b6
2606:4700::6812:a813
2606:4700::6813:9408
2620:1ec:21::14
2a00:1450:4001:800::2001
2a00:1450:4001:800::200a
2a00:1450:4001:801::2004
2a00:1450:4001:80b::2008
2a00:1450:4001:816::2001
2a00:1450:4001:816::200e
2a00:1450:4001:818::2003
2a00:1450:4001:81c::2002
2a00:1450:4001:825::2002
2a00:1450:400c:c0a::9b
2a02:26f0:10c:399::3adf
2a05:f500:10:101::b93f:9105
3.122.214.165
34.240.148.251
35.244.245.222
50.56.167.254
52.18.161.147
52.48.248.240
54.194.171.8
54.84.119.213
66.155.71.149
72.247.224.209
72.247.226.64
88.221.60.75
92.122.252.220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