URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Submission: On July 25 via api from CA

Summary

This website contacted 38 IPs in 9 countries across 34 domains to perform 214 HTTP transactions. The main IP is 50.56.167.254, located in San Antonio, United States and belongs to RMH-14, US. The main domain is www.bankinfosecurity.com.
TLS certificate: Issued by Go Daddy Secure Certificate Authority... on April 16th 2020. Valid for: a year.
This is the only time www.bankinfosecurity.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
30 50.56.167.254 33070 (RMH-14)
1 2a00:1450:400... 15169 (GOOGLE)
3 23.210.248.44 16625 (AKAMAI-AS)
33 23.210.249.12 16625 (AKAMAI-AS)
50 72.247.224.209 16625 (AKAMAI-AS)
1 104.130.251.6 33070 (RMH-14)
2 2a00:1450:400... 15169 (GOOGLE)
2 88.221.60.75 16625 (AKAMAI-AS)
2 2a00:1450:400... 15169 (GOOGLE)
5 2a00:1450:400... 15169 (GOOGLE)
1 72.247.226.64 16625 (AKAMAI-AS)
1 151.101.112.134 54113 (FASTLY)
1 4 2a00:1450:400... 15169 (GOOGLE)
5 34.253.133.202 16509 (AMAZON-02)
1 2a02:26f0:10c... 20940 (AKAMAI-ASN1)
4 104.20.5.43 13335 (CLOUDFLAR...)
1 143.204.208.151 16509 (AMAZON-02)
1 2.21.36.164 20940 (AKAMAI-ASN1)
1 2606:4700::68... 13335 (CLOUDFLAR...)
4 2606:2800:134... 15133 (EDGECAST)
5 2a00:1450:400... 15169 (GOOGLE)
12 172.217.16.130 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2 2a05:f500:10:... 14413 (LINKEDIN)
1 1 2620:1ec:21::14 8068 (MICROSOFT...)
2 192.28.147.68 53580 (MARKETO)
1 3.215.10.43 14618 (AMAZON-AES)
1 2 34.243.136.226 16509 (AMAZON-02)
2 2 35.244.245.222 15169 (GOOGLE)
2 2 52.18.161.147 16509 (AMAZON-02)
2 2 52.211.146.59 16509 (AMAZON-02)
1 2 3.125.70.222 16509 (AMAZON-02)
3 2606:4700::68... 13335 (CLOUDFLAR...)
2 151.101.192.134 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
13 2a00:1450:400... 15169 (GOOGLE)
10 2a00:1450:400... 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
1 178.79.227.167 22822 (LLNW)
1 4 66.155.71.25 13768 (COGECO-PEER1)
1 104.20.4.43 13335 (CLOUDFLAR...)
214 38
Apex Domain
Subdomains
Transfer
83 rackcdn.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com
dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
8 MB
30 bankinfosecurity.com
www.bankinfosecurity.com
453 KB
18 googlesyndication.com
430c7e165989420d4243e166687674f7.safeframe.googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
359 KB
13 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
105 KB
10 ampproject.org
cdn.ampproject.org
426 KB
6 ml314.com
ml314.com
in.ml314.com
15 KB
5 comm100.com
chatserver.comm100.com
vue.comm100.com
chatserver3.comm100.com
249 KB
5 gstatic.com
fonts.gstatic.com
46 KB
4 google.com
adservice.google.com
www.google.com
168 B
4 twimg.com
pbs.twimg.com
8 KB
4 google-analytics.com
www.google-analytics.com
18 KB
3 sitescout.com
pixel.sitescout.com
458 B
3 disquscdn.com
c.disquscdn.com
223 KB
3 linkedin.com
px.ads.linkedin.com
www.linkedin.com
3 KB
3 disqus.com
bankinfosecurity.disqus.com
disqus.com
30 KB
3 addthis.com
s7.addthis.com
m.addthis.com
114 KB
2 basis.net
cdn01.basis.net
pixel-a.basis.net
1018 B
2 eyeota.net
ps.eyeota.net
1 KB
2 crwdcntrl.net
sync.crwdcntrl.net
1003 B
2 adsrvr.org
match.adsrvr.org
927 B
2 rlcdn.com
idsync.rlcdn.com
778 B
2 demdex.net
dpm.demdex.net
2 KB
2 mktoresp.com
051-zxi-237.mktoresp.com
608 B
2 googletagmanager.com
www.googletagmanager.com
64 KB
2 marketo.net
munchkin.marketo.net
6 KB
1 google.de
adservice.google.de
168 B
1 crazyegg.com
script.crazyegg.com
1 KB
1 addthisedge.com
v1.addthisedge.com
325 B
1 cloudfront.net
dnn506yrbagrg.cloudfront.net
822 B
1 bizographics.com
sjs.bizographics.com
2 KB
1 moatads.com
z.moatads.com
1 KB
1 googletagservices.com
www.googletagservices.com
16 KB
1 ismgcorp.com
worker.ismgcorp.com
405 B
1 googleapis.com
fonts.googleapis.com
1 KB
214 34
Domain Requested by
30 www.bankinfosecurity.com www.bankinfosecurity.com
19 75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com www.bankinfosecurity.com
19 130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com www.bankinfosecurity.com
13 tpc.googlesyndication.com securepubads.g.doubleclick.net
www.bankinfosecurity.com
cdn.ampproject.org
tpc.googlesyndication.com
12 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
www.bankinfosecurity.com
10 cdn.ampproject.org securepubads.g.doubleclick.net
10 dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com www.bankinfosecurity.com
10 0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com www.bankinfosecurity.com
6 6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com www.bankinfosecurity.com
5 ml314.com www.bankinfosecurity.com
ml314.com
5 fonts.gstatic.com www.bankinfosecurity.com
4 pagead2.googlesyndication.com www.bankinfosecurity.com
securepubads.g.doubleclick.net
4 pbs.twimg.com www.bankinfosecurity.com
4 www.google-analytics.com 1 redirects www.bankinfosecurity.com
4 752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com www.bankinfosecurity.com
4 21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com www.bankinfosecurity.com
4 fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com www.bankinfosecurity.com
4 4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com www.bankinfosecurity.com
3 pixel.sitescout.com www.bankinfosecurity.com
3 chatserver3.comm100.com vue.comm100.com
3 www.google.com www.bankinfosecurity.com
3 c.disquscdn.com bankinfosecurity.disqus.com
2 disqus.com bankinfosecurity.disqus.com
2 ps.eyeota.net 1 redirects www.bankinfosecurity.com
2 sync.crwdcntrl.net 2 redirects
2 match.adsrvr.org 2 redirects
2 idsync.rlcdn.com 2 redirects
2 dpm.demdex.net 1 redirects www.bankinfosecurity.com
2 051-zxi-237.mktoresp.com munchkin.marketo.net
2 px.ads.linkedin.com 1 redirects www.bankinfosecurity.com
2 www.googletagmanager.com www.bankinfosecurity.com
2 munchkin.marketo.net www.bankinfosecurity.com
munchkin.marketo.net
2 f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com www.bankinfosecurity.com
2 s7.addthis.com www.bankinfosecurity.com
s7.addthis.com
1 pixel-a.basis.net 1 redirects
1 cdn01.basis.net www.googletagmanager.com
1 vue.comm100.com chatserver.comm100.com
1 430c7e165989420d4243e166687674f7.safeframe.googlesyndication.com securepubads.g.doubleclick.net
1 in.ml314.com ml314.com
1 www.linkedin.com 1 redirects
1 stats.g.doubleclick.net www.bankinfosecurity.com
1 adservice.google.com www.googletagservices.com
1 adservice.google.de www.googletagservices.com
1 script.crazyegg.com dnn506yrbagrg.cloudfront.net
1 m.addthis.com s7.addthis.com
1 v1.addthisedge.com s7.addthis.com
1 dnn506yrbagrg.cloudfront.net www.bankinfosecurity.com
1 chatserver.comm100.com www.bankinfosecurity.com
1 sjs.bizographics.com www.bankinfosecurity.com
1 bankinfosecurity.disqus.com www.bankinfosecurity.com
1 z.moatads.com s7.addthis.com
1 www.googletagservices.com www.bankinfosecurity.com
1 worker.ismgcorp.com www.bankinfosecurity.com
1 dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com www.bankinfosecurity.com
1 fonts.googleapis.com www.bankinfosecurity.com
214 55
Subject Issuer Validity Valid
ismg.io
Go Daddy Secure Certificate Authority - G2
2020-04-16 -
2021-07-26
a year crt.sh
upload.video.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
odc-prod-01.oracle.com
DigiCert Secure Site ECC CA-1
2020-07-22 -
2021-10-13
a year crt.sh
*.ssl.cf1.rackcdn.com
DigiCert SHA2 Secure Server CA
2020-04-19 -
2021-07-19
a year crt.sh
worker.ismgcorp.com
Go Daddy Secure Certificate Authority - G2
2020-02-13 -
2021-04-13
a year crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.marketo.net
DigiCert SHA2 Secure Server CA
2020-03-14 -
2021-04-13
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.gstatic.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
moatads.com
DigiCert SHA2 Secure Server CA
2020-01-17 -
2021-03-17
a year crt.sh
*.disqus.com
DigiCert SHA2 Secure Server CA
2020-04-20 -
2022-05-09
2 years crt.sh
*.ml314.com
Amazon
2020-02-17 -
2021-03-17
a year crt.sh
js.bizographics.com
DigiCert SHA2 Secure Server CA
2020-03-23 -
2022-03-28
2 years crt.sh
*.comm100.com
DigiCert SHA2 Secure Server CA
2020-02-12 -
2022-04-15
2 years crt.sh
*.cloudfront.net
DigiCert Global CA G2
2020-05-26 -
2021-04-21
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-06-09 -
2021-06-09
a year crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2019-11-12 -
2020-11-18
a year crt.sh
*.google.de
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
*.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2020-03-04 -
2020-09-04
6 months crt.sh
*.mktoresp.com
DigiCert SHA2 Secure Server CA
2020-01-17 -
2022-01-21
2 years crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
*.eyeota.net
Let's Encrypt Authority X3
2020-06-09 -
2020-09-07
3 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
misc-sni.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
www.google.com
GTS CA 1O1
2020-07-07 -
2020-09-29
3 months crt.sh
cdn01.basis.net
Sectigo RSA Domain Validation Secure Server CA
2019-06-13 -
2021-06-12
2 years crt.sh
*.sitescout.com
RapidSSL RSA CA 2018
2020-01-15 -
2022-02-02
2 years crt.sh

This page contains 12 frames:

Primary Page: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Frame ID: E2B1517553652A5B669265B466BDA002
Requests: 170 HTTP requests in this frame

Frame: https://s7.addthis.com/static/sh.f48a1a04fe8dbf021b4cda1d.html
Frame ID: C3BF46BE0F5F49A9A848712B65F547E8
Requests: 1 HTTP requests in this frame

Frame: https://s7.addthis.com/static/sh.f48a1a04fe8dbf021b4cda1d.html
Frame ID: EFC3E510E14629A81D00E6580AF8FED3
Requests: 1 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&t_d=Microsoft%20Seizes%20Domains%20Used%20for%20COVID-19%20Phishing%20Scam&t_t=Microsoft%20Seizes%20Domains%20Used%20for%20COVID-19%20Phishing%20Scam&s_o=default
Frame ID: D16C8D8343757D7E4E05C2EF802640B8
Requests: 1 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Frame ID: 63A8B4498961F54A139EB9DFA2C44780
Requests: 9 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Frame ID: 09C85A44247A3E80DDADF7CE58719166
Requests: 8 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Frame ID: 233FB1DD571B2CEE1104307518712CBA
Requests: 7 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Frame ID: 860383F527DD8DFBEDA4FE86A7E51D2F
Requests: 8 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Frame ID: 4E42FFE07346EE1896BED2D0D3743CE1
Requests: 8 HTTP requests in this frame

Frame: https://vue.comm100.com/js/bundle.968756fbcfe01603c32c1e0d9b0b9ab9.js
Frame ID: 9F270DF1527336C69A98EFA01BE695F9
Requests: 4 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/210/runner.html
Frame ID: 06C12FFE87AB55B1ED397FCC143AC258
Requests: 1 HTTP requests in this frame

Frame: https://pixel.sitescout.com/dmp/asyncPixelSync
Frame ID: 7AE7520A6AB52FD2CC8697320336422A
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

214
Requests

99 %
HTTPS

41 %
IPv6

34
Domains

55
Subdomains

38
IPs

9
Countries

10644 kB
Transfer

18077 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 144
  • https://www.google-analytics.com/r/collect?v=1&_v=j83&a=1868433254&t=pageview&_s=1&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&ul=en-us&de=UTF-8&dt=Microsoft%20Seizes%20Domains%20Used%20for%20COVID-19%20Phishing%20Scam&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEDAAEAB~&jid=2140583511&gjid=1178618580&cid=1477614901.1595685492&tid=UA-212197-36&_gid=68754820.1595685492&_r=1&z=654813028 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-212197-36&cid=1477614901.1595685492&jid=2140583511&_gid=68754820.1595685492&gjid=1178618580&_v=j83&z=654813028
Request Chain 146
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&time=1595685491928 HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D749%26url%3Dhttps%253A%252F%252Fwww.bankinfosecurity.com%252Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576%26time%3D1595685491928%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&time=1595685491928&liSync=true
Request Chain 152
  • https://dpm.demdex.net/ibs:dpid=22052&dpuuid=3611938403182968859&redir= HTTP 302
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=3611938403182968859&redir=
Request Chain 153
  • https://idsync.rlcdn.com/395886.gif?partner_uid=3611938403182968859 HTTP 307
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTMzYxMTkzODQwMzE4Mjk2ODg1ORAAGg0I9PTw-AUSBQjoBxAAQgBKAA HTTP 307
  • https://ml314.com/csync.ashx?fp=77fb3638555e4137db4400d38225f01bd2913409eaa5019334ee4db889eb01e5f4cb09cee1a4f8eb&person_id=3611938403182968859&eid=50082
Request Chain 154
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=03c7c36d-1512-4fac-8bf2-fc54e1ecd0d9
Request Chain 155
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3611938403182968859 HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3611938403182968859 HTTP 302
  • https://ml314.com/csync.ashx?fp=8f6d141d890d8df1de509c9172bed173&eid=50146&person_id=3611938403182968859
Request Chain 156
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif HTTP 302
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif
Request Chain 210
  • https://pixel-a.basis.net/iap/64ead273d1f41aa7 HTTP 301
  • https://pixel.sitescout.com/iap/64ead273d1f41aa7

214 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
www.bankinfosecurity.com/
370 KB
53 KB
Document
General
Full URL
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
a0297ab78e07ba2bbed675db2b5857ed1d1f876e7354dd005f61fed1bd9cf7da

Request headers

Host
www.bankinfosecurity.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Content-Encoding
gzip
Vary
Accept-Encoding
Set-Cookie
PHPSESSID=7dr5jkihr5kgo08mirphof7aeb; expires=Sat, 25-Jul-2020 17:58:09 GMT; Max-Age=14400; path=/
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
jquery-ui.min.css
www.bankinfosecurity.com/css-responsive/vendor/
25 KB
5 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/jquery-ui.min.css?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
fc54c09a7a71615ec35a22ed20afa4034588986ed88c3fc184b2c0bc637c33fb

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:09 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
4896
mediaelementplayer-updated.css
www.bankinfosecurity.com/css-responsive/vendor/
11 KB
3 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/mediaelementplayer-updated.css?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
1a0bbdba57f90a60fef89419fc940d8eae55c5b0d12ecbadde2beaef32ab2d90

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:09 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
2622
css
fonts.googleapis.com/
25 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
d3fb385aad2757e720c0e49ca0b807172ff255ad2dc2bf4b1998e632297800a9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 13:45:19 GMT
server
ESF
date
Sat, 25 Jul 2020 13:58:09 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 25 Jul 2020 13:58:09 GMT
main.css
www.bankinfosecurity.com/css-responsive/
231 KB
42 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/main.css?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
ba45c4b9710b1386b82a4354f829ee2f201e70742a2e646ffbedfa889e43d41f

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:09 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
43006
prettyPhoto.css
www.bankinfosecurity.com/css-responsive/
21 KB
3 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/prettyPhoto.css?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
7d0bada0d9b66aa1ca8eb906bb9736ca96e3859e9c05287a8f0cf5ffa9ff8760

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:09 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
2840
bis-hdr.desktop.r2.css
www.bankinfosecurity.com/css-responsive/vendor/
8 KB
2 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/bis-hdr.desktop.r2.css?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
eefc2533a82b69fab9b19b9e316bb606e70d17d61b57f9ea841b26c59624bc20

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:09 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
1956
bis-hdr.mobile.r2.css
www.bankinfosecurity.com/css-responsive/vendor/
9 KB
2 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/bis-hdr.mobile.r2.css?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
77c36fad51d04a56e55d1d454094c4312c3b11443f42b456c3f5082d66696be1

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:09 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
2133
font-awesome.min.css
www.bankinfosecurity.com/css-responsive/vendor/
22 KB
5 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/font-awesome.min.css?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
93f466f6b1a81c848140e51c839a5372034ab22182601e86dd86947ad3a7fe94

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:09 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
5049
jquery.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
91 KB
33 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
eccabf5cc7613433c3ddc71ff34391ae850d304d3aceb5666868c4947134f3b5

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:09 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
33094
modernizr.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
0
0
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/modernizr.js?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:58:09 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Keep-Alive
timeout=5, max=99
Expires
Thu, 19 Nov 1981 08:52:00 GMT
bootstrap.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
35 KB
9 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/bootstrap.min.js?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
3fede2d0c0a8c93b0c5d0ab0c38289a5743bb88720255b8298c520d2e3d90939

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:09 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
9328
jquery.validate.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
21 KB
7 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.validate.min.js?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
e51831d751ef667b1f703a47bb05802b681e6a30816f5cce0d56c3552a4eaa31

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:09 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
6689
mediaelement-and-player-updated.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
154 KB
38 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/mediaelement-and-player-updated.min.js?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
4e7304371ef9bcaea396e8928a9647f8306c296b9195c8763848d70c7f6f1390

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:09 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
38476
tinymce.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
295 KB
101 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/tinymce.min.js?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
247d04c4d14c60a79c16245a74a792a662f9e7adf784d68edd4520a35ec90251

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
jquery.validate.bootstrap.popover.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
2 KB
1 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.validate.bootstrap.popover.js?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
04d304d7ee49ac157f146382a46f02a666279bd7f29074f50e863b88f2affae9

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
926
jquery.placeholder.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
2 KB
1 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.placeholder.js?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
256a489beea4a14eca458f6e5436758f1fcb8dd34034d3c36dd21b22a5841f3b

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
922
jquery-ui.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
222 KB
60 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery-ui.min.js?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
78cf63898c91ce3b95e37bc53e07adba5c2ee705ff28c2dd1dd784173c264ad1

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
61345
crypt_des.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
9 KB
3 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/crypt_des.js?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
aed1d71b7280c09f06dc1f8e87795f9d89f7a1a8ab1af32ff8c92037ddeed6ee

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
2857
addthis_widget.js
s7.addthis.com/js/250/
353 KB
114 KB
Script
General
Full URL
https://s7.addthis.com/js/250/addthis_widget.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.248.44 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-44.deploy.static.akamaitechnologies.com
Software
nginx/1.15.8 /
Resource Hash
eb12a261a24e54883613710a4c12f4d9205f634ca1a29d1df07f90105a93e746
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=15724800; includeSubDomains
content-encoding
gzip
last-modified
Thu, 04 Jun 2020 15:49:19 GMT
server
nginx/1.15.8
etag
"5ed917ff-5834c"
vary
Accept-Encoding
x-distribution
99
content-type
application/javascript
status
200
cache-control
public, max-age=600
date
Sat, 25 Jul 2020 13:58:10 GMT
x-host
s7.addthis.com
content-length
116324
headerlogo-bis.png
www.bankinfosecurity.com/images-responsive/logos/
2 KB
2 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images-responsive/logos/headerlogo-bis.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
ea3325c2094d82033ce9583d4180194fb82729dfae65b62925831a88a6838d7c

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
1682
nsa-cisa-warn-threats-to-us-critical-infrastructure-showcase_image-8-a-14699.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
219 KB
220 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/nsa-cisa-warn-threats-to-us-critical-infrastructure-showcase_image-8-a-14699.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e1c9accef81dc62a6ebe1d132b9ae23842df41c43383458996461d540809cfcf

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Fri, 24 Jul 2020 18:03:07 GMT
X-Trans-Id
txec72499a3a02417ab432a-005f1b2a18dfw1
ETag
33a267f2affc3052b648de6db2436585
Content-Type
image/jpeg
X-Timestamp
1595613786.92171
Cache-Control
public, max-age=16702
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
224589
Expires
Sat, 25 Jul 2020 18:36:32 GMT
how-criminals-are-using-ppe-as-money-laundering-tool-showcase_image-10-a-14698.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
27 KB
27 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/how-criminals-are-using-ppe-as-money-laundering-tool-showcase_image-10-a-14698.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6f8163e09ba08628830b4ccdccca4575aa911890b05ab6ce05c39f8ea0a35425

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Fri, 24 Jul 2020 16:59:43 GMT
X-Trans-Id
tx5d08ba649e8d4e16b4281-005f1b186fdfw1
ETag
963c315db63a1ba142d31217373feb81
Content-Type
image/jpeg
X-Timestamp
1595609982.02200
Cache-Control
public, max-age=12135
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
27378
Expires
Sat, 25 Jul 2020 17:20:25 GMT
covid-19-impact-uncontrolled-spread-showcase_image-5-a-14694.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
53 KB
53 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/covid-19-impact-uncontrolled-spread-showcase_image-5-a-14694.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
961cae7c129fa75c5f3e4cb08d5007460a9c9e8cbe3cce04dc2fa41f4a0c8554

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Fri, 24 Jul 2020 08:30:41 GMT
X-Trans-Id
tx6972f9252fd84e70ba03f-005f1ad3d3dfw1
ETag
4b2630bcfaa3212660ee443bc2210d94
Content-Type
image/jpeg
X-Timestamp
1595579440.19871
Cache-Control
public, max-age=74574
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
53895
Expires
Sun, 26 Jul 2020 10:41:04 GMT
could-large-scale-iiot-failures-be-on-horizon-showcase_image-7-a-14686.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
96 KB
97 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/could-large-scale-iiot-failures-be-on-horizon-showcase_image-7-a-14686.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a5808ad6a04760e2162441aaf9a7e32e0eab20d501b5da8007d56c98056f1ba0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Fri, 24 Jul 2020 02:59:34 GMT
X-Trans-Id
tx6ad5c103d3034c83ac662-005f1ad1dfdfw1
ETag
a803e42df9a2b551d5dc56758711eb3f
Content-Type
image/jpeg
X-Timestamp
1595559573.80873
Cache-Control
public, max-age=73741
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
98645
Expires
Sun, 26 Jul 2020 10:27:11 GMT
celebrity-twitter-hack-what-happened-showcase_image-1-i-4732.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
76 KB
76 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/celebrity-twitter-hack-what-happened-showcase_image-1-i-4732.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b1f2d0e271c0663f8826078dcf6730812892131c5c56d0845e8f3b98494a55ca

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Thu, 23 Jul 2020 21:20:00 GMT
X-Trans-Id
tx199b0d9ff7744f8ab72ac-005f1a995bdfw1
ETag
e08fea74e11b2882303f0d582e93ae8e
Content-Type
image/jpeg
X-Timestamp
1595539199.98879
Cache-Control
public, max-age=61000
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
77457
Expires
Sun, 26 Jul 2020 06:54:50 GMT
security-analysis-us-outmaneuvers-uk-on-huawei-question-showcase_image-4-i-4730.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
154 KB
155 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/security-analysis-us-outmaneuvers-uk-on-huawei-question-showcase_image-4-i-4730.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
def3e032ce15c2f9f4c21b08e56e20d99779fad27f9088db599f62738e5d8a4d

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Thu, 16 Jul 2020 18:05:32 GMT
X-Trans-Id
txc9a67dac4fd34e0fac06a-005f1bd726dfw1
ETag
81246d21c8adafe8185673bf46421f23
Content-Type
image/jpeg
X-Timestamp
1594922731.32618
Cache-Control
public, max-age=60980
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
157827
Expires
Sun, 26 Jul 2020 06:54:30 GMT
covid-19-contact-tracing-app-privacy-concerns-showcase_image-4-i-4731.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
42 KB
42 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/covid-19-contact-tracing-app-privacy-concerns-showcase_image-4-i-4731.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
bd848b96c8baafa5856535df53748cbf995f50edf60b149cd0ced474ca6a978e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Thu, 16 Jul 2020 19:24:32 GMT
X-Trans-Id
tx791772636db24e1fb1db4-005f17f287dfw1
ETag
5ae9633a943ef68e9be56b47133afabc
Content-Type
image/jpeg
X-Timestamp
1594927471.67661
Cache-Control
public, max-age=60946
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43066
Expires
Sun, 26 Jul 2020 06:53:56 GMT
key-digital-payment-identity-management-issues-showcase_image-2-i-4729.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
93 KB
94 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/key-digital-payment-identity-management-issues-showcase_image-2-i-4729.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
667790927d4884fc2d68b6e1764f4e047ddb2090131e05ad04d1b6047f433ef7

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Wed, 15 Jul 2020 14:32:34 GMT
X-Trans-Id
txa9344852f21b4504948a2-005f1bd726dfw1
ETag
8a77734105a2f473c2d4d45f51191a60
Content-Type
image/jpeg
X-Timestamp
1594823553.48272
Cache-Control
public, max-age=60921
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95500
Expires
Sun, 26 Jul 2020 06:53:31 GMT
twitter-crypto-scammers-werent-first-to-crack-showcase_image-5-p-2918.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
62 KB
62 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/twitter-crypto-scammers-werent-first-to-crack-showcase_image-5-p-2918.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a73ead944e15b04886e543308dd33fbb2bb3dbba5231ef541eef7541af2a6df9

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Wed, 22 Jul 2020 13:51:06 GMT
X-Trans-Id
tx5e7fb9f62f844a79b564b-005f18560edfw1
ETag
681b492a327b0906264dedac32f36cdc
Content-Type
image/jpeg
X-Timestamp
1595425865.11779
Cache-Control
public, max-age=67535
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
63156
Expires
Sun, 26 Jul 2020 08:43:45 GMT
britains-5g-policy-failure-no-trusted-huawei-alternates-showcase_image-8-p-2917.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
108 KB
109 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/britains-5g-policy-failure-no-trusted-huawei-alternates-showcase_image-8-p-2917.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1a4348c0cc0a649baee8b02e01211089d5e04c692817a63c47116b088c03c3cc

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Wed, 15 Jul 2020 11:36:03 GMT
X-Trans-Id
txd6f8b0fef54b4cc091e03-005f0ef3a7dfw1
ETag
ed931666b50c99c55e8f1d67278918c0
Content-Type
image/jpeg
X-Timestamp
1594812962.02024
Cache-Control
public, max-age=11230
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
110781
Expires
Sat, 25 Jul 2020 17:05:20 GMT
the-cats-meow-petnet-perils-consumer-iot-showcase_image-1-p-2915.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
128 KB
128 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/the-cats-meow-petnet-perils-consumer-iot-showcase_image-1-p-2915.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6720bc1fe77f9cf2967fea5f1d11794dd3da2291fe17b585ddac0c0237a90cac

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Mon, 13 Jul 2020 03:08:04 GMT
X-Trans-Id
tx28150dd13b574fc0ba908-005f0c61e6dfw1
ETag
b52e37234e1d697ea2797958ff05fcac
Content-Type
image/jpeg
X-Timestamp
1594609683.66450
Cache-Control
public, max-age=65049
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
130694
Expires
Sun, 26 Jul 2020 08:02:19 GMT
no-invisible-god-inside-fxmsps-opsec-fail-showcase_image-9-p-2916.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
82 KB
83 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/no-invisible-god-inside-fxmsps-opsec-fail-showcase_image-9-p-2916.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d736ec91f3682f7d3ab7f85ba61bf31f118bb3c914885d8890004ee5616e3385

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Mon, 13 Jul 2020 13:04:20 GMT
X-Trans-Id
txd0877dd8219d436892abe-005f0c7a41dfw1
ETag
929fc8848ed48812324014b9b39dfec9
Content-Type
image/jpeg
X-Timestamp
1594645459.62755
Cache-Control
public, max-age=83565
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
84461
Expires
Sun, 26 Jul 2020 13:10:55 GMT
analysis-occs-decision-on-banks-cryptocurrency-showcase_image-3-a-14691.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
34 KB
34 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/analysis-occs-decision-on-banks-cryptocurrency-showcase_image-3-a-14691.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
893feb7420037aa56a303806c651a9649938beba34743e0510d132db2e13c99c

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Thu, 23 Jul 2020 19:28:43 GMT
X-Trans-Id
tx7eacc57b7bfb4e76943b9-005f19e99edfw1
ETag
0e8c400522647a1d0f47d68c827bcd8d
Content-Type
image/jpeg
X-Timestamp
1595532522.24566
Cache-Control
public, max-age=12499
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
34542
Expires
Sat, 25 Jul 2020 17:26:29 GMT
managing-itot-convergence-risk-showcase_image-8-a-14643.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
27 KB
27 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/managing-itot-convergence-risk-showcase_image-8-a-14643.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
152e9b2ccea80e23db38a47c13fcd0b132ff403d9758c698d5afb66566a51b25

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Fri, 17 Jul 2020 14:58:32 GMT
X-Trans-Id
txdd0a83ee09f34a11948dc-005f19a46edfw1
ETag
b8cdb9953ee02bf7dabafd2b41241670
Content-Type
image/jpeg
X-Timestamp
1594997911.97658
Cache-Control
public, max-age=77247
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
27189
Expires
Sun, 26 Jul 2020 11:25:37 GMT
live-webinar-on-line-privacy-security-seamless-patient-experience-showcase_image-3-w-2539.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
66 KB
67 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-on-line-privacy-security-seamless-patient-experience-showcase_image-3-w-2539.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c3d76392ef3f9a467c13e1a91d2c710372b9501a38c94b18e5d070c79eff16c3

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Wed, 08 Jul 2020 20:25:42 GMT
X-Trans-Id
txeaf3a83b616d4fe89bfeb-005f18721bdfw1
ETag
4dea2ac18153b21ecb4f2a4ad3717739
Content-Type
image/jpeg
X-Timestamp
1594239941.17352
Cache-Control
public, max-age=77447
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
67973
Expires
Sun, 26 Jul 2020 11:28:57 GMT
live-webinar-3-things-to-consider-when-building-secure-identity-based-perimeter-showcase_image-2-w-2465.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
100 KB
101 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-3-things-to-consider-when-building-secure-identity-based-perimeter-showcase_image-2-w-2465.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
aa8d0e59eac163825d167855dfb420a265ff91df05d9196add29a3f68ebdad13

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Wed, 27 May 2020 19:30:24 GMT
X-Trans-Id
tx40eb9ade29ee48868df9b-005f16bf7cdfw1
ETag
9b206c615a0178068be0f5d27c92659d
Content-Type
image/jpeg
X-Timestamp
1590607823.82810
Cache-Control
public, max-age=48539
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
102553
Expires
Sun, 26 Jul 2020 03:27:09 GMT
live-webinar-redefining-endpoint-security-three-ways-to-maximize-operational-efficiency-showcase_image-2-w-2550.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
127 KB
128 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-redefining-endpoint-security-three-ways-to-maximize-operational-efficiency-showcase_image-2-w-2550.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b0af90c2d12963bd630eccfa71bfe80b8a2b66088df44b276a81656dec94f402

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Mon, 20 Jul 2020 20:49:49 GMT
X-Trans-Id
tx254c9783f81d466b86b61-005f177ddfdfw1
ETag
9f0980f45fe7d3babbb01396bf7dd0d7
Content-Type
image/jpeg
X-Timestamp
1595278188.62091
Cache-Control
public, max-age=21462
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
130214
Expires
Sat, 25 Jul 2020 19:55:52 GMT
work-from-anywhere-mission-critical-workforce-needs-dedicated-portable-secure-connectivity-showcase_image-3-w-2548.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
100 KB
101 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/work-from-anywhere-mission-critical-workforce-needs-dedicated-portable-secure-connectivity-showcase_image-3-w-2548.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
aa8d0e59eac163825d167855dfb420a265ff91df05d9196add29a3f68ebdad13

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 17 Jul 2020 17:59:12 GMT
X-Trans-Id
tx0ddef56fc5364effab519-005f170f16dfw1
ETag
9b206c615a0178068be0f5d27c92659d
Content-Type
image/jpeg
X-Timestamp
1595008751.41205
Cache-Control
public, max-age=60935
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
102553
Expires
Sun, 26 Jul 2020 06:53:46 GMT
live-webinar-rise-machines-state-unmanaged-iot-device-security-showcase_image-2-w-2502.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
129 KB
129 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-rise-machines-state-unmanaged-iot-device-security-showcase_image-2-w-2502.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f819134b317d8fc086aca3265159b39381784c56fd29512542fc6c55fb4c7d74

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Tue, 16 Jun 2020 20:03:17 GMT
X-Trans-Id
txa3462c4e790948208fcc4-005f0984f3dfw1
ETag
78c3ef13e372999ad58a4856ed25a94a
Content-Type
image/jpeg
X-Timestamp
1592337796.98292
Cache-Control
public, max-age=48617
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
132121
Expires
Sun, 26 Jul 2020 03:28:28 GMT
live-webinar-3-mistakes-that-could-ruin-your-multi-cloud-strategy-showcase_image-8-w-2491.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
38 KB
39 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-3-mistakes-that-could-ruin-your-multi-cloud-strategy-showcase_image-8-w-2491.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
923153c4ea1a7de9b0a936536091e8c191eb05adf5b79338945d0bef0fcbcdea

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Thu, 11 Jun 2020 15:53:20 GMT
X-Trans-Id
txc468ab8e29ec4f6a9ebd3-005f1bd726dfw1
ETag
708d851bdfb1b32b0f859e727848a4f2
Content-Type
image/jpeg
X-Timestamp
1591890799.53337
Cache-Control
public, max-age=60929
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
39277
Expires
Sun, 26 Jul 2020 06:53:40 GMT
live-webinar-exposed-environments-cyber-ai-insider-threats-showcase_image-3-w-2540.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
84 KB
84 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-exposed-environments-cyber-ai-insider-threats-showcase_image-3-w-2540.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
52ee89d110520b977224c94026f5c06b2cf874598dd3b59c738980f43a33aae9

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Mon, 13 Jul 2020 21:22:50 GMT
X-Trans-Id
tx75973cc6ab6b4d3d882cf-005f15e33ddfw1
ETag
e48ae8333b3bce6359349aa372baf6bd
Content-Type
image/jpeg
X-Timestamp
1594675369.03869
Cache-Control
public, max-age=77524
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
85917
Expires
Sun, 26 Jul 2020 11:30:15 GMT
live-webinar-8-ways-to-tackle-biggest-access-related-information-security-challenges-in-financial-services-showcase_image-7-w-2514.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
98 KB
98 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-8-ways-to-tackle-biggest-access-related-information-security-challenges-in-financial-services-showcase_image-7-w-2514.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ee44668bb58e135de33ef50ebabb98f6251dba5149d2368d247d8754cc7d5d18

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Mon, 22 Jun 2020 16:06:11 GMT
X-Trans-Id
tx5247f35b15a54bab966e2-005f003413dfw1
ETag
96664496ee6115609fcc8ca4fa68dd27
Content-Type
image/jpeg
X-Timestamp
1592841970.43529
Cache-Control
public, max-age=48513
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
100085
Expires
Sun, 26 Jul 2020 03:26:44 GMT
jeremy-hayes-largeImage-10-a-1586.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
38 KB
38 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/jeremy-hayes-largeImage-10-a-1586.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8cf374c82f399e0aab046bc678ded4456eb295c8602efc7362a2d9749901fb25

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Tue, 05 Apr 2016 20:54:39 GMT
X-Trans-Id
tx60c6e0306c644fd5980c0-005ef87489dfw1
ETag
17b88e99eab0707adae4a3556c5ff421
Content-Type
image/jpeg
X-Timestamp
1459889678.37798
Cache-Control
public, max-age=17240
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
38897
Expires
Sat, 25 Jul 2020 18:45:30 GMT
kim-peretti-largeImage-a-342.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
96 KB
96 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/kim-peretti-largeImage-a-342.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c27f517a52328878d8f7052ed2adf6f7901e2dabdc18bcb8cada275ab2decfea

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Tue, 29 Oct 2013 16:21:54 GMT
X-Trans-Id
txc50032dd5c7d4d578966c-005f0bb839dfw1
ETag
756b17619c964600716b6c5f298668f2
Content-Type
image/jpeg
X-Timestamp
1383063713.14328
Cache-Control
public, max-age=8059
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
98341
Expires
Sat, 25 Jul 2020 16:12:29 GMT
ken-meiser-largeImage-1-a-1555.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
24 KB
24 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/ken-meiser-largeImage-1-a-1555.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c52d22b816ba5a035cda04ca849174213af85a850cc060bd550bcb6807cf65a9

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Thu, 10 Mar 2016 15:07:49 GMT
X-Trans-Id
tx8fdf3beea00041d9b77a7-005f0e1416dfw1
ETag
346027378be5f7775a0725219dc617d5
Content-Type
image/jpeg
X-Timestamp
1457622468.71841
Cache-Control
public, max-age=59202
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
24627
Expires
Sun, 26 Jul 2020 06:24:53 GMT
david-debenham-largeImage-1-a-1325.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
34 KB
34 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/david-debenham-largeImage-1-a-1325.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1aeec51f4fd733d4fae7a3f31d33b284a1870ce4246cbd4514fd7c704c6df181

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Wed, 29 Jul 2015 21:17:47 GMT
X-Trans-Id
txa8f1b5cc9b7144a8bcb71-005eca49c1dfw1
ETag
10170072bdfb8772e34c8e4658d6db39
Content-Type
image/jpeg
X-Timestamp
1438204666.72939
Cache-Control
public, max-age=68633
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
34476
Expires
Sun, 26 Jul 2020 09:02:04 GMT
3-ways-behavioral-biometrics-spot-criminals-protect-customers-logo-4-w-6456.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
63 KB
63 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/3-ways-behavioral-biometrics-spot-criminals-protect-customers-logo-4-w-6456.JPG
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
38d6ea5491bc3771a5a5e7e11c694c38504a21f4b07f4dddc07da2112c508579

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 24 Jul 2020 15:58:31 GMT
X-Trans-Id
tx94659566a7114c4e9a1ea-005f1b0c12dfw1
ETag
7a0a9d3d9062af016a2600588422c495
Content-Type
image/jpeg
X-Timestamp
1595606310.04448
Cache-Control
public, max-age=9006
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
64125
Expires
Sat, 25 Jul 2020 16:28:17 GMT
five-lessons-learned-from-pivot-to-distributed-workforce-logo-3-w-6448.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
57 KB
57 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/five-lessons-learned-from-pivot-to-distributed-workforce-logo-3-w-6448.JPG
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4534645ae98e76c12275643cb28cbd22e255aae7b2fcdc4e905347489f99cd69

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Thu, 23 Jul 2020 17:37:55 GMT
X-Trans-Id
tx1a1c66efddf4439a91a64-005f19db55dfw1
ETag
fb89f68fa601e1ca64279500747dd621
Content-Type
image/jpeg
X-Timestamp
1595525874.03944
Cache-Control
public, max-age=8952
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
58447
Expires
Sat, 25 Jul 2020 16:27:23 GMT
email-fraud-landscape-summer-2020-pdf-2-w-6444.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
251 KB
251 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/email-fraud-landscape-summer-2020-pdf-2-w-6444.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c8c525defd4291da149b4a8cd93654a194403a87f9b500de4868394dd40a894e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Wed, 22 Jul 2020 17:18:07 GMT
X-Trans-Id
txbe91d0912d1d419898972-005f19e430dfw1
ETag
ec9e83911442298221f33931a6a2250d
Content-Type
image/jpeg
X-Timestamp
1595438286.24832
Cache-Control
public, max-age=15940
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
256780
Expires
Sat, 25 Jul 2020 18:23:51 GMT
multi-factor-authentication-evaluation-guide-logo-6-w-6437.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
24 KB
24 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/multi-factor-authentication-evaluation-guide-logo-6-w-6437.JPG
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
bc400f59ff1bfb460bc1f3969b132423f1328d942edbdc1651b0147557580613

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 17 Jul 2020 20:11:35 GMT
X-Trans-Id
txd4deaaa07f55406fa20ab-005f170925dfw1
ETag
2c9c8e658238c62a017c34fe46715fad
Content-Type
image/jpeg
X-Timestamp
1595016694.78536
Cache-Control
public, max-age=63895
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
24686
Expires
Sun, 26 Jul 2020 07:43:06 GMT
combatting-cybercrime-pdf-9-h-103.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
358 KB
358 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/combatting-cybercrime-pdf-9-h-103.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7ff5b98c09ec9d2af43d4108160ea0455f91f415f83031cc79fbe24a3a765bb8

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Tue, 26 Nov 2019 19:37:47 GMT
X-Trans-Id
tx817ae584a6c0434bb6e03-005f12b382dfw1
ETag
11a3adb400c0ff282a505428b1d7be73
Content-Type
image/jpeg
X-Timestamp
1574797066.57975
Cache-Control
public, max-age=13711
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
366322
Expires
Sat, 25 Jul 2020 17:46:42 GMT
top-canadian-cyber-threats-expected-in-2020-logo-9-h-102.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
76 KB
77 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/top-canadian-cyber-threats-expected-in-2020-logo-9-h-102.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
eb9ec684a7198fded61e248eaff2d28d0c9f8a15dfee8d9afff66aa6ff200461

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Mon, 28 Oct 2019 13:57:45 GMT
X-Trans-Id
txdfb6e237dbed47d3b393f-005eb8eaa5dfw1
ETag
69913c61181f1fc9d730d6c8298e55c4
Content-Type
image/jpeg
X-Timestamp
1572271064.63410
Cache-Control
public, max-age=15960
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
78320
Expires
Sat, 25 Jul 2020 18:24:11 GMT
leveraging-new-technologies-in-fraud-investigations-logo-7-h-101.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
197 KB
198 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/leveraging-new-technologies-in-fraud-investigations-logo-7-h-101.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c70242480ad0a0ecc7c305d659f1fdb3a9cb1eb480927b46f8bd62d33ed0f8b2

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Tue, 15 Oct 2019 14:06:53 GMT
X-Trans-Id
tx386a5bb1886e403f8273d-005f1bd726dfw1
ETag
e3e068e355cdbfaa15e88b627d7ebc55
Content-Type
image/jpeg
X-Timestamp
1571148412.42493
Cache-Control
public, max-age=60979
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
202154
Expires
Sun, 26 Jul 2020 06:54:30 GMT
collaboration-avoiding-operational-conflicts-taking-on-new-roles-logo-10-h-100.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
87 KB
88 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/collaboration-avoiding-operational-conflicts-taking-on-new-roles-logo-10-h-100.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4c57a77761f2639985b760e69c5bbaffceb6100559dcf3296d3cc96ea6a0d305

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Wed, 02 Oct 2019 13:41:41 GMT
X-Trans-Id
tx51c65d379db049f295cc2-005f12b382dfw1
ETag
36c70127fa172aa8ce8cd235fddf4c97
Content-Type
image/jpeg
X-Timestamp
1570023700.81183
Cache-Control
public, max-age=39603
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
89481
Expires
Sun, 26 Jul 2020 00:58:14 GMT
securing-telemedicine-future-remote-healthcare-showcase_image-4-s-82.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
78 KB
78 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/securing-telemedicine-future-remote-healthcare-showcase_image-4-s-82.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
88c5a42e7fbc0839487147414a88531996b455a15cfc7d43dbc0102e55490f89

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 19 Jun 2020 20:27:30 GMT
X-Trans-Id
tx4964de3a64e948988ed8e-005f0984f3dfw1
ETag
277c051b9980d6d67e9279ed59b4b968
Content-Type
image/jpeg
X-Timestamp
1592598449.94175
Cache-Control
public, max-age=35855
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
79854
Expires
Sat, 25 Jul 2020 23:55:46 GMT
managing-identity-governance-data-breach-risks-todays-remote-workforce-showcase_image-7-s-80.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
87 KB
87 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/managing-identity-governance-data-breach-risks-todays-remote-workforce-showcase_image-7-s-80.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
dc13abd25a627a2481bced8a69e5daace0cac7eeb2ee19e7bc5b16852adc4279

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 24 Apr 2020 20:49:35 GMT
X-Trans-Id
txee68ea5d2fdb420aac02c-005f129548dfw1
ETag
798bc33a31e70aade019309a9fa16e27
Content-Type
image/jpeg
X-Timestamp
1587761374.72132
Cache-Control
public, max-age=18130
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88866
Expires
Sat, 25 Jul 2020 19:00:21 GMT
taking-pulse-government-cybersecurity-2020-showcase_image-4-s-77.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
95 KB
95 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/taking-pulse-government-cybersecurity-2020-showcase_image-4-s-77.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f12bfcfe32a118f715dbfbd7c13833f73ed857e42dae19f8ef24fc8b473840af

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Mon, 23 Mar 2020 21:52:35 GMT
X-Trans-Id
tx1178fc87e0c1480e8477f-005f0dc15adfw1
ETag
4af1e925902f765709fbac19d76f9149
Content-Type
image/jpeg
X-Timestamp
1585000354.21724
Cache-Control
public, max-age=21395
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
97383
Expires
Sat, 25 Jul 2020 19:54:46 GMT
2020-faces-fraud-survey-showcase_image-4-s-75.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
82 KB
83 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/2020-faces-fraud-survey-showcase_image-4-s-75.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3d7510063e1b2e52048eb4de8e364e2d5516dcb3dfa3b30feab3e4c10d785726

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Thu, 21 Nov 2019 17:08:18 GMT
X-Trans-Id
tx855927e27ec84fde99622-005f1bd726dfw1
ETag
6435f83ec3a957ed676e16f2c26353cf
Content-Type
image/jpeg
X-Timestamp
1574356097.60397
Cache-Control
public, max-age=60926
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
84215
Expires
Sun, 26 Jul 2020 06:53:37 GMT
your-cloud-strategy-needs-data-strategy-pdf-1-w-6436.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
141 KB
141 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/your-cloud-strategy-needs-data-strategy-pdf-1-w-6436.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
abdfde4e90b2c1559cdf4eef5bc79b7d60e9351e81fa5e8366dcc70e4aece5f2

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 17 Jul 2020 06:27:52 GMT
X-Trans-Id
txd89105d50ecc4e5199141-005f1bd726dfw1
ETag
81ab811870549594a0f94c24f997f7b4
Content-Type
image/jpeg
X-Timestamp
1594967271.68017
Cache-Control
public, max-age=60950
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
144129
Expires
Sun, 26 Jul 2020 06:54:01 GMT
virtual-cybersecurity-summit-brazil-showcase_image-8-e-302.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
62 KB
63 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/virtual-cybersecurity-summit-brazil-showcase_image-8-e-302.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1f6c795f99c9dfece6009d42b0841c590c602e63e691ffd77e6812268edfbc50

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Thu, 23 Jul 2020 21:54:07 GMT
X-Trans-Id
tx40444dcfe46346938725b-005f1a0cd5dfw1
ETag
65ebf5486b6bc09d1f69fb349d083959
Content-Type
image/jpeg
X-Timestamp
1595541246.55762
Cache-Control
public, max-age=23891
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
63680
Expires
Sat, 25 Jul 2020 20:36:22 GMT
virtual-cybersecurity-fraud-summit-chicago-showcase_image-9-e-298.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
72 KB
72 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/virtual-cybersecurity-fraud-summit-chicago-showcase_image-9-e-298.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
31d684108b61548ba747aac544e074fc2e13350fff72f0f07de2c9d705598948

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Thu, 23 Jul 2020 21:51:12 GMT
X-Trans-Id
tx0979cd9aa6da4ba2bdbd0-005f1a0cd5dfw1
ETag
dbef5856bcc89cb3818b0cf2b55ffb4f
Content-Type
image/jpeg
X-Timestamp
1595541071.22507
Cache-Control
public, max-age=23398
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
73743
Expires
Sat, 25 Jul 2020 20:28:09 GMT
virtual-cybersecurity-summit-bengaluru-showcase_image-3-e-299.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
60 KB
60 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/virtual-cybersecurity-summit-bengaluru-showcase_image-3-e-299.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
eab772a3cf0afc7491e9dd5d0abf33df5f4b43a54bf7c2d464ce03ffee35754e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Thu, 23 Jul 2020 21:56:45 GMT
X-Trans-Id
txac979112c1224c9baca0c-005f1a0cd5dfw1
ETag
c277d2f74aaec3083a3cd1f79f8ff053
Content-Type
image/jpeg
X-Timestamp
1595541404.44350
Cache-Control
public, max-age=23624
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
61061
Expires
Sat, 25 Jul 2020 20:31:55 GMT
virtual-cybersecurity-fraud-summit-seattle-showcase_image-10-e-300.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
61 KB
62 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/virtual-cybersecurity-fraud-summit-seattle-showcase_image-10-e-300.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
dafe277be793f7c92f70acf012cba32d18b344b2b895629edf072b61ba3e16e0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Thu, 23 Jul 2020 21:57:32 GMT
X-Trans-Id
tx2ddb0fdfac6548a89c419-005f1a0cd5dfw1
ETag
8654e46336a3a5448f6e3b7b6daee459
Content-Type
image/jpeg
X-Timestamp
1595541451.30245
Cache-Control
public, max-age=23824
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
62869
Expires
Sat, 25 Jul 2020 20:35:15 GMT
redefining-mobile-security-and-works-showcase_image-7-w-2273.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
187 KB
187 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/redefining-mobile-security-and-works-showcase_image-7-w-2273.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f5f24ffc5d931243a6e2818cac716ed061b7cf0065aead0b1ab77e8c2af890cb

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Mon, 16 Dec 2019 14:31:16 GMT
X-Trans-Id
txeba53b672c31445391ebd-005f07f8bfdfw1
ETag
0361dfeccb1a59b88690bb5349e1ca4a
Content-Type
image/jpeg
X-Timestamp
1576506675.18748
Cache-Control
public, max-age=69496
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
191395
Expires
Sun, 26 Jul 2020 09:16:27 GMT
ethics-ml-ai-showcase_image-5-w-2274.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
172 KB
172 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/ethics-ml-ai-showcase_image-5-w-2274.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7bcd31cd48941d1287630c9f1f852616cf59a1d86e3456ebee40bb2ea9519e78

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Mon, 16 Dec 2019 14:40:21 GMT
X-Trans-Id
txfc5e4fb4c9de420888fdd-005f06300adfw1
ETag
3f868326180ec04482c8f7f7026be9ca
Content-Type
image/jpeg
X-Timestamp
1576507220.38776
Cache-Control
public, max-age=63590
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
175715
Expires
Sun, 26 Jul 2020 07:38:01 GMT
best-practices-for-implementing-comprehensive-identity-governance-solution-showcase_image-7-w-2126.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
158 KB
158 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/best-practices-for-implementing-comprehensive-identity-governance-solution-showcase_image-7-w-2126.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9cfda57bf5032c33579ba5213ea3f6f04ae76eddf8169ccc03b65dad46387700

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Wed, 21 Aug 2019 16:07:31 GMT
X-Trans-Id
tx38942196d77245139f698-005f130755dfw1
ETag
ac5ec7485b98a4e425694526cac66c60
Content-Type
image/jpeg
X-Timestamp
1566403650.23177
Cache-Control
public, max-age=32103
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
161648
Expires
Sat, 25 Jul 2020 22:53:14 GMT
zero-trust-approach-for-healthcare-showcase_image-4-w-2071.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
135 KB
136 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/zero-trust-approach-for-healthcare-showcase_image-4-w-2071.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3c766722210633878a01a1266168f93abd804eb1d5b90539146ed55870822f1d

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 28 Jun 2019 20:21:33 GMT
X-Trans-Id
tx92773ae62fd341629e7de-005ed6f26fdfw1
ETag
dd5032aff4d05ed19b21dbe830b01316
Content-Type
image/jpeg
X-Timestamp
1561753292.90767
Cache-Control
public, max-age=72349
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
138422
Expires
Sun, 26 Jul 2020 10:04:00 GMT
reducing-risk-now-showcase_image-7-w-2052.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
134 KB
134 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/reducing-risk-now-showcase_image-7-w-2052.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
971f0c03a1e63271a19b7de81d084c6acf81e7506dae8b31a0c6587c6ddf6a34

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 28 Jun 2019 20:15:01 GMT
X-Trans-Id
tx82e1dd6804be4946a8195-005f16be57dfw1
ETag
79f8120d6bfab756d31e5f38dbdd523c
Content-Type
image/jpeg
X-Timestamp
1561752900.06505
Cache-Control
public, max-age=59014
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
136753
Expires
Sun, 26 Jul 2020 06:21:45 GMT
increasing-your-cybersecurity-posture-value-partnering-healthcare-exclusive-mssp-showcase_image-7-w-2045.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
153 KB
154 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/increasing-your-cybersecurity-posture-value-partnering-healthcare-exclusive-mssp-showcase_image-7-w-2045.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3b4dcc216d84f51755dc2cae1b96e2c5f39a28352e1601f65f69d0e42600370a

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 28 Jun 2019 21:20:42 GMT
X-Trans-Id
tx2a9ce8e1bc804bffaeaee-005f16be57dfw1
ETag
5e3afa124e2e37df4ab9093792a841aa
Content-Type
image/jpeg
X-Timestamp
1561756841.42456
Cache-Control
public, max-age=48836
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
156921
Expires
Sun, 26 Jul 2020 03:32:07 GMT
todays-trends-in-e-commerce-fraud-showcase_image-4-a-13927.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
69 KB
70 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/todays-trends-in-e-commerce-fraud-showcase_image-4-a-13927.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
073ce3168634ada329dac67b06abf8e481474d636b512e6b558cc779d00e8fab

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Wed, 11 Mar 2020 18:40:32 GMT
X-Trans-Id
tx4ec1a80f6ae84810a29ae-005e8cb97cdfw1
ETag
b710debdf96f2b48a22aa4a8f63dc7d4
Content-Type
image/jpeg
X-Timestamp
1583952031.64606
Cache-Control
public, max-age=50033
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
70886
Expires
Sun, 26 Jul 2020 03:52:04 GMT
achieving-true-predictive-security-analytics-showcase_image-2-a-13878.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
54 KB
55 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/achieving-true-predictive-security-analytics-showcase_image-2-a-13878.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
199cd24e6b0d526eb0c06060d87dee6425d302456b0a2cb3015778f6401c476d

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Wed, 04 Mar 2020 21:51:00 GMT
X-Trans-Id
tx048a2e55a93847a79e863-005e8c9865dfw1
ETag
3cd4bf863b88b9c29a24cef0ad690ce1
Content-Type
image/jpeg
X-Timestamp
1583358659.31089
Cache-Control
public, max-age=12568
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
55733
Expires
Sat, 25 Jul 2020 17:27:39 GMT
tackling-challenges-around-dwell-times-visibility-showcase_image-8-a-13884.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
59 KB
59 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/tackling-challenges-around-dwell-times-visibility-showcase_image-8-a-13884.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3e7547a62e6d182a13a336293cc60a80152ad60e7cc2ae1d2aa6c1539eeeb2d3

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Thu, 05 Mar 2020 16:04:36 GMT
X-Trans-Id
tx9cc9445e1fe94d8b8b793-005e7e5924dfw1
ETag
f159c9867556eec8a5360d3493db29ad
Content-Type
image/jpeg
X-Timestamp
1583424275.63523
Cache-Control
public, max-age=53918
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
60191
Expires
Sun, 26 Jul 2020 04:56:49 GMT
best-rsa-conference-2020-showcase_image-1-a-14011.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
100 KB
101 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/best-rsa-conference-2020-showcase_image-1-a-14011.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8d24db7742c1a5864fcef9b95b39da9f4bdce218cd525cbd2a6c1233a9cb020e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Wed, 25 Mar 2020 19:33:42 GMT
X-Trans-Id
txd90fa594fdea49c9953bf-005e7bbf13dfw1
ETag
5509cbbd99ddd348f3533b4b8f6a0da9
Content-Type
image/jpeg
X-Timestamp
1585164821.83821
Cache-Control
public, max-age=53980
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
102596
Expires
Sun, 26 Jul 2020 04:57:51 GMT
infosec-europe-2019-compendium-imageFile-2-a-12739.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
89 KB
89 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/infosec-europe-2019-compendium-imageFile-2-a-12739.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4546d13ea9bae9935dcd23f61d215a528120a53479bf51e372de3420029ed535

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 05 Jul 2019 20:13:34 GMT
X-Trans-Id
tx9a65f7a711cd41d185e31-005d1fb074dfw1
ETag
f9dab7917669551bb50361c2dcd43aa7
Content-Type
image/jpeg
X-Timestamp
1562357613.59432
Cache-Control
public, max-age=41441
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
91187
Expires
Sun, 26 Jul 2020 01:28:52 GMT
improving-iot-risk-management-showcase_image-10-a-12689.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
60 KB
61 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/improving-iot-risk-management-showcase_image-10-a-12689.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6ec9288103b5919c36e28909faf04364cdf19cf7687e234663d0d9daab65a3c0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 28 Jun 2019 14:04:32 GMT
X-Trans-Id
tx9cb7ab9427404656ad526-005d16294edfw1
ETag
7f5fdd9cf37f980ea13c12c231815e13
Content-Type
image/jpeg
X-Timestamp
1561730671.53151
Cache-Control
public, max-age=22271
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
61807
Expires
Sat, 25 Jul 2020 20:09:22 GMT
gdpr-where-do-we-go-from-here-showcase_image-1-a-12681.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
62 KB
62 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/gdpr-where-do-we-go-from-here-showcase_image-1-a-12681.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8bc7f122cae9e9efd75cd58076d06fb057d8f50abf07ffc1716e17d87682b9cf

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Tue, 25 Jun 2019 19:30:48 GMT
X-Trans-Id
txcda89b20c2cf487a8c903-005d1279e2dfw1
ETag
bba47bed092092a1c82b09a86a3a0e40
Content-Type
image/jpeg
X-Timestamp
1561491047.60933
Cache-Control
public, max-age=56371
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
63007
Expires
Sun, 26 Jul 2020 05:37:42 GMT
reinventing-application-security-showcase_image-10-a-12671.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
53 KB
53 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/reinventing-application-security-showcase_image-10-a-12671.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4179815331b1b050e45da1ccf1d1a8cb50904e1cbb92228b32d55d545d4aaf7c

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Tue, 25 Jun 2019 19:54:35 GMT
X-Trans-Id
tx2cea77591d1f484b913f2-005d127e7fdfw1
ETag
89521d60b07d7e85acabbf0301821f45
Content-Type
image/jpeg
X-Timestamp
1561492474.52472
Cache-Control
public, max-age=54406
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
54026
Expires
Sun, 26 Jul 2020 05:04:57 GMT
microsoft-seize-domains-used-for-covid-19-phishing-scam-showcase_image-5-a-14576.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
36 KB
36 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-showcase_image-5-a-14576.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
68906cd39d5ed01a1be4e2c51b494139fc10c87072508064cf8c5aa9f204f86f

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Tue, 07 Jul 2020 21:52:35 GMT
X-Trans-Id
tx2340e39429df4f8b9f26e-005f1c3a72dfw1
ETag
3c06a0508803376fc75769f61bebabf7
Content-Type
image/jpeg
X-Timestamp
1594158754.77155
Cache-Control
public, max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
36422
Expires
Sun, 26 Jul 2020 13:58:10 GMT
msftcovid19court1.jpg
dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com/files/images_articles/
35 KB
35 KB
Image
General
Full URL
https://dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com/files/images_articles/msftcovid19court1.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4c5b225e97dee98d058aee5b00ca0a8093f9d14981f29a83b96a1c0812929034

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Tue, 07 Jul 2020 21:48:51 GMT
X-Trans-Id
tx40e72ffb86b547bc8ac3d-005f1c1feedfw1
ETag
886b8581f87406ab1bde424aa61610a8
Content-Type
image/jpeg
X-Timestamp
1594158530.59059
Cache-Control
public, max-age=252411
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
35420
Expires
Tue, 28 Jul 2020 12:05:02 GMT
doug-olenick-largeImage-6-a-3402.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
48 KB
48 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/doug-olenick-largeImage-6-a-3402.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fc1c5d5032a8d6333bf213c6edaf837136d231139437a7d440eb1ff338e714c4

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Tue, 19 May 2020 17:36:33 GMT
X-Trans-Id
tx5f86022fbccc43a2ba7f5-005ec4492adfw1
ETag
cfe1f47775f601d3b7674e8d503b0732
Content-Type
image/jpeg
X-Timestamp
1589909792.69710
Cache-Control
public, max-age=84585
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
49042
Expires
Sun, 26 Jul 2020 13:27:56 GMT
live-webinar-5-critical-security-privacy-lessons-from-ccpa-litigation-showcase_image-9-w-2456.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
198 KB
199 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-5-critical-security-privacy-lessons-from-ccpa-litigation-showcase_image-9-w-2456.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
bd2bd6fba5970f41e929b46199cfcc58f7ce4bc822936a71ea4c098405392281

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Tue, 26 May 2020 16:05:02 GMT
X-Trans-Id
txd88ba95c13e54dc5ac2c5-005f1bf3d8dfw1
ETag
8c931f615989ad0eed420f88ee3960a1
Content-Type
image/jpeg
X-Timestamp
1590509101.37432
Cache-Control
public, max-age=68307
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
202978
Expires
Sun, 26 Jul 2020 08:56:38 GMT
pulse-flash-report-5-insights-covid-19-in-contact-center-logo-9-w-6172.png
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
119 KB
120 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/pulse-flash-report-5-insights-covid-19-in-contact-center-logo-9-w-6172.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
14aa68cb13a7265c4929e5ac951a6fe482a2593e225771d0fe0fe64ec91e36cd

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 01 May 2020 12:58:52 GMT
X-Trans-Id
tx1155b317e399478d9de6d-005f197266dfw1
ETag
1f2aa92f6ce1d3356dcd17e3d34235df
Content-Type
image/png
X-Timestamp
1588337931.66256
Cache-Control
public, max-age=63877
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
122148
Expires
Sun, 26 Jul 2020 07:42:48 GMT
live-webinar-your-brand-being-used-as-bait-you-just-dont-know-yet-showcase_image-2-w-2500.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
54 KB
54 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-your-brand-being-used-as-bait-you-just-dont-know-yet-showcase_image-2-w-2500.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2f2242cdeee9d69d43d17283693563996b21774839b9d8904d025be7646ed074

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Mon, 22 Jun 2020 12:45:55 GMT
X-Trans-Id
tx91b1b093edf841dfbc1b1-005f12b380dfw1
ETag
dd5c34d044f15e3338fb45b3a530de20
Content-Type
image/jpeg
X-Timestamp
1592829954.18572
Cache-Control
public, max-age=64951
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
55179
Expires
Sun, 26 Jul 2020 08:00:42 GMT
2020-cyberthreat-defense-report-pdf-7-w-6407.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
388 KB
389 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/2020-cyberthreat-defense-report-pdf-7-w-6407.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
dc789e45538a91acaacf8348f77c3911d14530268f421579f2647f0aacaa447e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Wed, 08 Jul 2020 16:07:34 GMT
X-Trans-Id
tx3c81b5c711fc441c94f99-005f1be2a4dfw1
ETag
2e226f27bf25917f21bb3f7a92903c3a
Content-Type
image/jpeg
X-Timestamp
1594224453.27661
Cache-Control
public, max-age=63895
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
397657
Expires
Sun, 26 Jul 2020 07:43:06 GMT
protecting-your-assets-from-cryptomining-malware-logo-5-w-6086.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
127 KB
128 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/protecting-your-assets-from-cryptomining-malware-logo-5-w-6086.JPG
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
29ef5d9f730f72e21eb410e5dc2c78d6667013bdeb0b24c0a8ddc9d096942104

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Wed, 08 Apr 2020 20:25:36 GMT
X-Trans-Id
tx8f594b53acfa4086bc5e6-005f18479fdfw1
ETag
262c593f6e3dad89a873e6562acf8153
Content-Type
image/jpeg
X-Timestamp
1586377535.41166
Cache-Control
public, max-age=67720
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
130378
Expires
Sun, 26 Jul 2020 08:46:51 GMT
new-threats-in-age-dynamic-workforce-imageFile-8-a-14528.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
131 KB
131 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/new-threats-in-age-dynamic-workforce-imageFile-8-a-14528.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
eafcb483ff20c27cb22dae72233ea16e4155ebeb42dedc302380bae489d79910

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Mon, 29 Jun 2020 21:20:46 GMT
X-Trans-Id
txe1ef9b7a9cef43d3b8b89-005efa5f83dfw1
ETag
c1d7db277486afc281c01984479698df
Content-Type
image/jpeg
X-Timestamp
1593465645.21335
Cache-Control
public, max-age=31330
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
133691
Expires
Sat, 25 Jul 2020 22:40:21 GMT
nhs-england-provides-6800-agile-workers-secured-mobile-devices-logo-6-w-6117.PNG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
127 KB
127 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/nhs-england-provides-6800-agile-workers-secured-mobile-devices-logo-6-w-6117.PNG
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2b6262d9dac17680ad0add461b0ce9d008e91ac17c906a6012d49e5b18142d1c

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Mon, 20 Apr 2020 13:57:56 GMT
X-Trans-Id
txa314aced040a45e283a2c-005f1c179edfw1
ETag
b99b286fd57a541fcf42874595b314ed
Content-Type
image/png
X-Timestamp
1587391075.98608
Cache-Control
public, max-age=77460
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
129835
Expires
Sun, 26 Jul 2020 11:29:11 GMT
2021-cybersecurity-odyssey-showcase_image-1-a-14244.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
54 KB
55 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/2021-cybersecurity-odyssey-showcase_image-1-a-14244.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4cc0a94fe285d89f90a1b94a8c02d6bc86025c50859d20cab31a621e2ebb677f

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Thu, 07 May 2020 19:44:50 GMT
X-Trans-Id
tx27a933b29b654e949ebcb-005ed6722adfw1
ETag
7303dc2c8f8ad4a8c8e3d12f88842b44
Content-Type
image/jpeg
X-Timestamp
1588880689.41373
Cache-Control
public, max-age=59268
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
55645
Expires
Sun, 26 Jul 2020 06:25:59 GMT
beware-other-virus-spread-coronavirus-themed-malware-showcase_image-1-a-14110.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
134 KB
135 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/beware-other-virus-spread-coronavirus-themed-malware-showcase_image-1-a-14110.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d9da61cbf2665aed71c6d5c6d58282fa9ca941d488718bf16fc49f819fa2bbf2

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Mon, 13 Apr 2020 19:01:01 GMT
X-Trans-Id
tx7eac1f4a4fc847f388cdb-005e97c402dfw1
ETag
80a930491aade24aa861bf009e0dd85a
Content-Type
image/jpeg
X-Timestamp
1586804460.99060
Cache-Control
public, max-age=7754
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
137417
Expires
Sat, 25 Jul 2020 16:07:24 GMT
live-webinar-combating-cyber-fraud-best-practices-for-increasing-visibility-automating-threat-response-showcase_image-2-w-2394.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
103 KB
103 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-combating-cyber-fraud-best-practices-for-increasing-visibility-automating-threat-response-showcase_image-2-w-2394.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
246bdd23927d3219e3a9142f94cef4d994e0d38002292476aac1b23b526b5ef9

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Fri, 08 May 2020 15:55:46 GMT
X-Trans-Id
tx21b5db7741514968ad8cc-005f17f286dfw1
ETag
70c6ff2c24015e9abb873b47bfe0e4ef
Content-Type
image/jpeg
X-Timestamp
1588953345.99575
Cache-Control
public, max-age=63607
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
105392
Expires
Sun, 26 Jul 2020 07:38:17 GMT
covid-19-beyond-will-workfrom-home-explosion-revolutionize-enterprise-security-architecture-pdf-5-w-6408.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
163 KB
163 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/covid-19-beyond-will-workfrom-home-explosion-revolutionize-enterprise-security-architecture-pdf-5-w-6408.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
27a67d208bdacc3eee628eec1fe1bcda5ebcce45661bb766800a9ba2c93959dd

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Wed, 08 Jul 2020 16:19:13 GMT
X-Trans-Id
tx26c33f77b9274dc1a525e-005f18929fdfw1
ETag
13bc7927b0b8707d387bfa4ff1d0e5f0
Content-Type
image/jpeg
X-Timestamp
1594225152.18734
Cache-Control
public, max-age=20740
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
166577
Expires
Sat, 25 Jul 2020 19:43:50 GMT
live-webinar-post-pandemic-new-normal-rethink-rebuild-cyber-security-11-am-aest-i-1-pm-nzst-showcase_image-10-w-2518.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
438 KB
439 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-post-pandemic-new-normal-rethink-rebuild-cyber-security-11-am-aest-i-1-pm-nzst-showcase_image-10-w-2518.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ba0e38f69748fd14bc36a4f0a3986c5ebade7edf684e38a4f64247d19060886a

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Mon, 29 Jun 2020 10:16:58 GMT
X-Trans-Id
tx9832487c03db40c6ab24e-005f16bf4adfw1
ETag
d40d459e4361dd680bcefcfdeff3a770
Content-Type
image/jpeg
X-Timestamp
1593425817.82658
Cache-Control
public, max-age=68196
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
448648
Expires
Sun, 26 Jul 2020 08:54:46 GMT
live-webinar-five-things-you-need-to-know-about-new-ccpa-regulations-showcase_image-5-w-2362.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
129 KB
130 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-five-things-you-need-to-know-about-new-ccpa-regulations-showcase_image-5-w-2362.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
53cf8d9d31033ec080746606303e7d935adb6d66169ad8c3a5f090f06e3afb43

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Thu, 02 Apr 2020 13:39:55 GMT
X-Trans-Id
txd67971e82b9542d981f4f-005f12ae33dfw1
ETag
8eeaf151358a7535c35e7ef49d928b1e
Content-Type
image/jpeg
X-Timestamp
1585834794.02020
Cache-Control
public, max-age=31912
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
132376
Expires
Sat, 25 Jul 2020 22:50:02 GMT
1-million-rewards-offered-for-help-in-finding-sec-hackers-showcase_image-4-a-14695.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
49 KB
49 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/1-million-rewards-offered-for-help-in-finding-sec-hackers-showcase_image-4-a-14695.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3447a5471d04db5d613e1d31b2e8bd9801a3ceb3c611efdfaff532703f9cf70a

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 24 Jul 2020 14:26:10 GMT
X-Trans-Id
tx8647d724eda94098a23be-005f1af71bdfw1
ETag
aab86542e1d506cc4b1ef8f3c47abbf3
Content-Type
image/jpeg
X-Timestamp
1595600769.68161
Cache-Control
public, max-age=3665
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
49731
Expires
Sat, 25 Jul 2020 14:59:16 GMT
crowley-showcase_image-2-i-4725.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
51 KB
52 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/crowley-showcase_image-2-i-4725.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
11d1b1d35a1dd90caaf8811f17dd4b2d56f88305d43820330c914893176c2a58

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Tue, 07 Jul 2020 18:33:46 GMT
X-Trans-Id
tx60c918321ea547c3b3fc0-005f1bd726dfw1
ETag
9a3665dad301a5e1d3602cacf8524e2e
Content-Type
image/jpeg
X-Timestamp
1594146825.06861
Cache-Control
public, max-age=60970
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
52616
Expires
Sun, 26 Jul 2020 06:54:21 GMT
digital-ids-progress-report-showcase_image-5-i-4722.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
56 KB
57 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/digital-ids-progress-report-showcase_image-5-i-4722.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
214f0ced4aa41206009c814aaf3607f7b7546818c0678b29ca47cc893495bf9d

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Thu, 02 Jul 2020 21:04:21 GMT
X-Trans-Id
txa66416231d0d4d759ef09-005f149b20dfw1
ETag
a5fc5b3d71891aa1e4b019a48c6cfb3d
Content-Type
image/jpeg
X-Timestamp
1593723860.19254
Cache-Control
public, max-age=70497
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
57619
Expires
Sun, 26 Jul 2020 09:33:08 GMT
coordinating-disclosures-medical-device-vulnerabilities-showcase_image-9-i-4728.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
37 KB
37 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/coordinating-disclosures-medical-device-vulnerabilities-showcase_image-9-i-4728.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7136b2d75ce910970eca268a0b23968710daae9989719e2edfd3d76406171129

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 10 Jul 2020 18:22:39 GMT
X-Trans-Id
tx1142f5a4911745cc908f2-005f1bd727dfw1
ETag
ea6a5f042d53564ed48389b88df876c4
Content-Type
image/jpeg
X-Timestamp
1594405358.20219
Cache-Control
public, max-age=60943
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
37451
Expires
Sun, 26 Jul 2020 06:53:54 GMT
sizing-up-security-challenges-for-telecom-companies-showcase_image-7-i-4724.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
283 KB
283 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/sizing-up-security-challenges-for-telecom-companies-showcase_image-7-i-4724.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
bd2e639a1fe61ffcd81a3b611791e73bbcaebbc0c3cce8b3e9a7c3ec8b895211

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 03 Jul 2020 08:15:53 GMT
X-Trans-Id
tx9dee47a22bfa4da8b3d0a-005f17f287dfw1
ETag
6af97ba50478ff38eb7ab54a2c23dd07
Content-Type
image/jpeg
X-Timestamp
1593764152.31456
Cache-Control
public, max-age=47576
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
289898
Expires
Sun, 26 Jul 2020 03:11:07 GMT
analysis-monitoring-risks-posed-by-remote-workers-showcase_image-2-i-4727.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
128 KB
129 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/analysis-monitoring-risks-posed-by-remote-workers-showcase_image-2-i-4727.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
106f63140e591f71994ba5a86cfccf8b336911e254ed2c685eba40c233e2bddc

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Thu, 09 Jul 2020 20:23:39 GMT
X-Trans-Id
txcea9f6de793f46daa594b-005f1bd726dfw1
ETag
59a030c9ca5adf19dcf30022234eff90
Content-Type
image/jpeg
X-Timestamp
1594326218.39610
Cache-Control
public, max-age=60963
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
131562
Expires
Sun, 26 Jul 2020 06:54:14 GMT
medical-devices-mitigating-cyber-risks-showcase_image-5-i-4733.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
42 KB
43 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/medical-devices-mitigating-cyber-risks-showcase_image-5-i-4733.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fa292343a77c2e20d0f25f4142adac9438b21ae0b44606a980ae0ef3ae814256

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 24 Jul 2020 16:59:57 GMT
X-Trans-Id
txe5d63e9a87464f2097d17-005f1b272adfw1
ETag
bf8ef5149938058fd3c774d0429d1d48
Content-Type
image/jpeg
X-Timestamp
1595609996.71059
Cache-Control
public, max-age=15875
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43457
Expires
Sat, 25 Jul 2020 18:22:46 GMT
logo-ismg-with-text.png
www.bankinfosecurity.com/images-responsive/
4 KB
4 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images-responsive/logo-ismg-with-text.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
4e2db1bef009e01901b4083a153f1607301428277a76f508e659dc2849cefa04

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
4175
logo-ismg-print.png
www.bankinfosecurity.com/images-responsive/
5 KB
6 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images-responsive/logo-ismg-print.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
5133e2e1a213ca44a8adb1f42f103a2d2e495849dfa4d42bf67c04fcc962e577

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=92
Content-Length
5598
ondemand-preview-w-255.jpg
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
56 KB
57 KB
Image
General
Full URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3059f92e36a564c5cbcedc195f764e3c55c8cf919c84129c5f202870e7026b61

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:12 GMT
Last-Modified
Fri, 05 Jul 2013 12:55:26 GMT
X-Trans-Id
txe137a9f9f4114aeb8e995-005f1c3a74dfw1
ETag
7aece0902995efedc289b7c24037434b
Content-Type
image/jpeg
X-Timestamp
1373028925.94439
Cache-Control
public, max-age=900
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
57633
Expires
Sat, 25 Jul 2020 14:13:12 GMT
ron-ross-smallImage-a-558.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
10 KB
11 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/ron-ross-smallImage-a-558.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.12 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-249-12.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9c8bb391a723e088d163b560afa73f709c42a69df5647c4fefce9d16e4226895

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Last-Modified
Fri, 01 Nov 2013 13:09:25 GMT
X-Trans-Id
txab72948d29114a0888233-0059daf781dfw1
ETag
fac8c56390d084c4f1dfaa9b24a58c33
Content-Type
image/jpeg
X-Timestamp
1383311364.81114
Cache-Control
public, max-age=51879
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
10640
Expires
Sun, 26 Jul 2020 04:22:50 GMT
ismg-user-ip
worker.ismgcorp.com/
13 B
405 B
XHR
General
Full URL
https://worker.ismgcorp.com/ismg-user-ip
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1595685489.1271
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.130.251.6 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
c5efe210aa092eb33013911784ca3b8e00aaff8efac48b9f3f189ed7b4607069

Request headers

Accept
*/*
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, private
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Content-Length
31
gpt.js
www.googletagservices.com/tag/js/
48 KB
16 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c5e5742593fb85b25251acdb96a2f0d31ee17b2eb8b6b8c737714ea1efc56a11
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"581 / 401 of 1000 / last-modified: 1595628830"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
16533
x-xss-protection
0
expires
Sat, 25 Jul 2020 13:58:11 GMT
munchkin.js
munchkin.marketo.net/
1 KB
1 KB
Script
General
Full URL
https://munchkin.marketo.net/munchkin.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1595685489.1271
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
88.221.60.75 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a88-221-60-75.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
e33257e40a5420d325cbdd826a42403d63e4fa3c32efb3d7a4b3596aa0541a64

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:12 GMT
Content-Encoding
gzip
Last-Modified
Fri, 10 Jul 2020 02:50:40 GMT
Server
AkamaiNetStorage
ETag
"bc06a6fbc5f82b85379e5482b06ad372:1594349440.875338"
Vary
Accept-Encoding
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
760
gtm.js
www.googletagmanager.com/
536 KB
41 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-T6KM3T
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
edfbed6757c288d5e4c7a45c8886159cdb5e29dbd142d18007ed5a91f36043db
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:11 GMT
content-encoding
br
vary
Accept-Encoding
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
41640
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 12:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Sat, 25 Jul 2020 13:58:11 GMT
gtm.js
www.googletagmanager.com/
58 KB
23 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-T8C2JFW
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
025635cd10d157105f4ddeeb45686a4300388e2b0c10ebefcd29f93b5025681c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:11 GMT
content-encoding
br
vary
Accept-Encoding
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
23524
x-xss-protection
0
last-modified
Sat, 25 Jul 2020 12:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Sat, 25 Jul 2020 13:58:11 GMT
mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
54c64f3c66372027154f01fc9f24b4e25fdfe405b70d1994c79abbc2576ff775
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.bankinfosecurity.com

Response headers

date
Thu, 11 Jun 2020 13:03:24 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:49 GMT
server
sffe
age
3804886
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9132
x-xss-protection
0
expires
Fri, 11 Jun 2021 13:03:24 GMT
main.js
www.bankinfosecurity.com/javascripts-responsive/
41 KB
10 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/main.js?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
703a0faa9e0cc9f4261b1a3a121ab4ddf5ffc4a7da1d483c47bbc122ad114606

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
9704
media-transcript-navigation.js
www.bankinfosecurity.com/javascripts-responsive/
26 KB
7 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/media-transcript-navigation.js?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
ae3c472ff47a96820c1acdf9574b231a88f62a006b84d320eb313af40f32f2db

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
6519
bis-hdr.r1.js
www.bankinfosecurity.com/javascripts-responsive/
1 KB
766 B
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/bis-hdr.r1.js?s=1595685489.1271
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
4c92262ff23b2116bad93fc1e36f1a597dc713ad8b3cd03d56f8e49bec4cb186

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
455
jquery.browser.js
www.bankinfosecurity.com/javascripts-responsive/
2 KB
1 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/jquery.browser.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
bbe0aa82dca8a36f677fb17025c3baa011d355bd7cb42d4aacea1b0265855d6e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=93
Content-Length
1022
jquery.prettyPhoto.js
www.bankinfosecurity.com/javascripts-responsive/
24 KB
7 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/jquery.prettyPhoto.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
1edbdbe7dd4c59e2fef20ef8dc4615a18d116fdf43daf018dce46a93e6cb153e

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
6459
mem5YaGs126MiZpBA-UN_r8OUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN_r8OUuhpKKSTjw.woff2
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5e261f7e11c39ff6f4c8fe884e5c9de2fa15f29085a1adefdd36603ef2e23c00
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.bankinfosecurity.com

Response headers

date
Thu, 09 Jul 2020 00:04:34 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:37 GMT
server
sffe
age
1432416
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9016
x-xss-protection
0
expires
Fri, 09 Jul 2021 00:04:34 GMT
mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b8e23a845bc6b7fd417d29182e0e38d353e64b5e12e06bb1de2b5ce063db1dcc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.bankinfosecurity.com

Response headers

date
Tue, 14 Jul 2020 16:17:11 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:44 GMT
server
sffe
age
942059
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9180
x-xss-protection
0
expires
Wed, 14 Jul 2021 16:17:11 GMT
fontawesome-webfont.woff
www.bankinfosecurity.com/css-responsive/fonts/
43 KB
44 KB
Font
General
Full URL
https://www.bankinfosecurity.com/css-responsive/fonts/fontawesome-webfont.woff?v=4.2.0
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
0fd28fece9ebd606b8b071460ebd3fc2ed7bc7a66ef91c8834f11dfacab4a849

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.bankinfosecurity.com/css-responsive/vendor/font-awesome.min.css?s=1595685489.1271
Origin
https://www.bankinfosecurity.com

Response headers

Date
Sat, 25 Jul 2020 13:58:10 GMT
Last-Modified
Fri, 24 Jul 2020 17:05:18 GMT
Server
Apache
ETag
"ad90-5ab32fa406237"
Content-Type
application/font-woff
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
44432
mem5YaGs126MiZpBA-UN7rgOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN7rgOUuhpKKSTjw.woff2
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a48a6e4b14fe55f750c0a3dfb5a6f4941bdc06af0aa542b90de25c30c2b4625c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.bankinfosecurity.com

Response headers

date
Tue, 14 Jul 2020 15:32:55 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:31:11 GMT
server
sffe
age
944715
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9080
x-xss-protection
0
expires
Wed, 14 Jul 2021 15:32:55 GMT
memnYaGs126MiZpBA-UFUKWyV9hrIqOxjaPX.woff2
fonts.gstatic.com/s/opensans/v17/
10 KB
10 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/memnYaGs126MiZpBA-UFUKWyV9hrIqOxjaPX.woff2
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
41c93545a4e2a1a46bca581d80fec8c8da014e13b310c65d694e4af30c7da9bd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Origin
https://www.bankinfosecurity.com

Response headers

date
Wed, 08 Jul 2020 21:51:53 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:56 GMT
server
sffe
age
1440377
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9744
x-xss-protection
0
expires
Thu, 08 Jul 2021 21:51:53 GMT
moatframe.js
z.moatads.com/addthismoatframe568911941483/
2 KB
1 KB
Script
General
Full URL
https://z.moatads.com/addthismoatframe568911941483/moatframe.js
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/250/addthis_widget.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
72.247.226.64 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-226-64.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
05090f9390f5bc0cd23fe5f432037cc92d7cbce1ced9bfe8faf3d1c9abae85cd

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:12 GMT
content-encoding
gzip
last-modified
Fri, 08 Nov 2019 20:13:52 GMT
server
AmazonS3
x-amz-request-id
0DB5AF736F61F63C
etag
"f14b4e1f799b14f798a195f43cf58376"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=10570
accept-ranges
bytes
content-length
948
x-amz-id-2
zxZ9QjXWSr8oaCLVYc90sV6rnZo88Bftr2rarhfixtNaNoGpU246ZMWWFRg4ifQvUX0y8VNw/nA=
ondemand-preview-w-255.mp4
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
0
0

embed.js
bankinfosecurity.disqus.com/
70 KB
23 KB
Script
General
Full URL
https://bankinfosecurity.disqus.com/embed.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.134 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
openresty /
Resource Hash
f0167d41aaedc2fdcdbdf7a2b81914a239c535da48afd0049d068cb69bb26563
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:12 GMT
Content-Encoding
gzip
Server
openresty
Age
0
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
23007
analytics.js
www.google-analytics.com/
45 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
fd361b57998c76f86335afa28b8a62527d88a8200fb5c428d6f0fff73383e955
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 04 Jun 2020 23:38:14 GMT
server
Golfe2
age
6152
date
Sat, 25 Jul 2020 12:15:39 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18469
expires
Sat, 25 Jul 2020 14:15:39 GMT
tag.aspx
ml314.com/
26 KB
12 KB
Script
General
Full URL
https://ml314.com/tag.aspx?2562020
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.253.133.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
9c6af299685617864c257472040f437ef951afec994720a24781931cc3527017

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Content-Encoding
gzip
Last-Modified
Sat, 25 Jul 2020 07:05:11 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=61619
Connection
keep-alive
Content-Length
11933
Expires
Sun, 26 Jul 2020 07:05:11 GMT
insight.min.js
sjs.bizographics.com/
3 KB
2 KB
Script
General
Full URL
https://sjs.bizographics.com/insight.min.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:10c:399::3adf , Ascension Island, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
Software
/
Resource Hash
41dd5e421fe221a7d2921d6fa2b36e8b01a9f2c054aaef5fad866fe896c1d1e0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Content-Encoding
gzip
Last-Modified
Mon, 07 Oct 2019 16:41:31 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=71203
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1576
livechat.ashx
chatserver.comm100.com/
990 B
935 B
Script
General
Full URL
https://chatserver.comm100.com/livechat.ashx?siteId=92035
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.5.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
935ce461fd2a13af7c4a5aa08a854b747628072f74fcbedd515adee98bc8d86c

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:13 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
server
cloudflare
x-aspnet-version
4.0.30319
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
status
200
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
cache-control
no-cache, no-store
cf-ray
5b8664fbe8e5c765-AMS
content-length
516
cf-request-id
0427dd71730000c7657a990200000001
2682.js
dnn506yrbagrg.cloudfront.net/pages/scripts/0021/
309 B
822 B
Script
General
Full URL
https://dnn506yrbagrg.cloudfront.net/pages/scripts/0021/2682.js?443245
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.208.151 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6caf904d3dfc096ae3b4e40aed43181686bdf1bac4722b3dd2a775ab6d2a9992

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 03 Mar 2020 19:31:54 GMT
Via
1.1 78c402b74e65ae12b398b6b957ab229e.cloudfront.net (CloudFront)
Connection
keep-alive
Last-Modified
Tue, 03 Mar 2020 19:14:28 GMT
Server
AmazonS3
Age
12421577
ETag
"53b0291ca3900aca920ad48e9790c1b7"
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Cache-Control
max-age=31536000
X-Amz-Cf-Pop
FRA53-C1
Accept-Ranges
bytes
Content-Length
309
X-Amz-Cf-Id
MJNNc2qSf6AWH1QRjWwjYM2g9Kwt9NujnCgnugkINEidT1fF3gkldw==
sh.f48a1a04fe8dbf021b4cda1d.html
s7.addthis.com/static/ Frame C3BF
0
0

ajax.php
www.bankinfosecurity.com/
5 KB
1 KB
XHR
General
Full URL
https://www.bankinfosecurity.com/ajax.php?json=twitterWidget
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1595685489.1271
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
a57242989c6d78643031ea7271670c281c9500fc420d7df0a24016a06068cf0d

Request headers

Accept
text/html, */*; q=0.01
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:58:10 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Keep-Alive
timeout=5, max=97
Expires
Thu, 19 Nov 1981 08:52:00 GMT
_ate.track.config_resp
v1.addthisedge.com/live/boost/ra-4fd21f2b39b17192/
166 B
325 B
Script
General
Full URL
https://v1.addthisedge.com/live/boost/ra-4fd21f2b39b17192/_ate.track.config_resp
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/250/addthis_widget.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.36.164 , France, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
Software
/
Resource Hash
4cf8b4da854cac70fb514c2d255e93904353bda1fcc7229de2f59d5971d83028

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:12 GMT
content-encoding
gzip
etag
659743217
vary
Accept-Encoding
content-type
application/javascript;charset=utf-8
status
200
cache-control
public, max-age=60, s-maxage=86400
content-disposition
attachment; filename=1.txt
content-length
154
300lo.json
m.addthis.com/live/red_lojson/
89 B
249 B
Script
General
Full URL
https://m.addthis.com/live/red_lojson/300lo.json?si=5f1c3a72997c362b&bkl=0&bl=1&pdt=786&sid=5f1c3a72997c362b&pub=ra-4fd21f2b39b17192&rev=v8.28.7-wp&ln=en&pc=men&cb=0&ab=-&dp=www.bankinfosecurity.com&fp=microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&fr=&of=0&pd=0&irt=0&vcl=0&md=0&ct=1&tct=0&abt=0&cdn=0&pi=1&rb=0&gen=100&chr=UTF-8&mk=Microsoft%2Cphishing%2Cemail%2CCOVID-19%2Cfederal%20court&colc=1595685490839&jsl=1&uvs=5f1c3a721ee22841000&skipb=1&callback=addthis.cbs.jsonp__53665442127397030
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/250/addthis_widget.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.248.44 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-44.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e643d6430b39a55c32ecce536557aaa824f96782bc8965ae7118de8d1d977af0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Sat, 25 Jul 2020 13:58:12 GMT
cache-control
max-age=0, no-cache, no-store, no-transform
content-disposition
attachment; filename=1.txt
content-length
89
content-type
application/javascript;charset=utf-8
sh.f48a1a04fe8dbf021b4cda1d.html
s7.addthis.com/static/ Frame EFC3
0
0
Document
General
Full URL
https://s7.addthis.com/static/sh.f48a1a04fe8dbf021b4cda1d.html
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/250/addthis_widget.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.210.248.44 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-210-248-44.deploy.static.akamaitechnologies.com
Software
nginx/1.15.8 /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

:method
GET
:authority
s7.addthis.com
:scheme
https
:path
/static/sh.f48a1a04fe8dbf021b4cda1d.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576

Response headers

status
200
server
nginx/1.15.8
content-type
text/html
last-modified
Mon, 09 Sep 2019 15:34:57 GMT
etag
W/"5d767121-1115f"
timing-allow-origin
*
cache-control
public, max-age=86313600
p3p
CP="NON ADM OUR DEV IND COM STA"
strict-transport-security
max-age=15724800; includeSubDomains
content-encoding
gzip
content-length
25412
date
Sat, 25 Jul 2020 13:58:10 GMT
vary
Accept-Encoding
x-host
s7.addthis.com
ondemand-preview-w-255.mp4
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
3 MB
0
Media
General
Full URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.mp4
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.224.209 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-224-209.deploy.static.akamaitechnologies.com
Software
/
Resource Hash

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Range
bytes=0-

Response headers

Date
Sat, 25 Jul 2020 13:58:13 GMT
Last-Modified
Fri, 05 Jul 2013 12:56:36 GMT
X-Trans-Id
tx0246bc4313a047d8a5f5a-005efc6834dfw1
ETag
e5d65b36cc2f1ee7de6cc53cd6609280
Content-Type
video/mp4
Content-Range
bytes 0-10621769/10621770
X-Timestamp
1373028995.98411
Cache-Control
public, max-age=900
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
10621770
Expires
Sat, 25 Jul 2020 14:13:13 GMT
2682.js
script.crazyegg.com/pages/scripts/0021/
1 KB
1 KB
Script
General
Full URL
https://script.crazyegg.com/pages/scripts/0021/2682.js
Requested by
Host: dnn506yrbagrg.cloudfront.net
URL: https://dnn506yrbagrg.cloudfront.net/pages/scripts/0021/2682.js?443245
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9408 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1e77bab3ad8f9f1b3b5ae0c91adc45c5efe0a0adb091107c8bae2df942c38b28

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:11 GMT
content-encoding
gzip
cf-cache-status
HIT
ce-version
11.1.68
age
177515
cf-polished
origSize=1484
status
200
cf-request-id
0427dd6d010000c290b8889200000001
last-modified
Thu, 23 Jul 2020 12:39:36 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
access-control-expose-headers
CE-Version
cache-control
max-age=300
cf-ray
5b8664f4ceb2c290-FRA
cf-bgj
minify
Q6BkxeQb_normal.jpg
pbs.twimg.com/profile_images/771013611141685248/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/771013611141685248/Q6BkxeQb_normal.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/419A) /
Resource Hash
1b230cc086847af7ec89c564edc5afe6036845fd005b66628c56e1f440e4b932
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:11 GMT
x-content-type-options
nosniff
age
10864
x-cache
HIT
status
200
content-length
2035
x-response-time
117
surrogate-key
profile_images profile_images/bucket/4 profile_images/771013611141685248
last-modified
Wed, 31 Aug 2016 15:53:44 GMT
server
ECS (fcn/419A)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
7e96a962eab7c8395f0ea02d39bd4bc9
accept-ranges
bytes
O0-6K7mw_normal.jpg
pbs.twimg.com/profile_images/673468724725305344/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/673468724725305344/O0-6K7mw_normal.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/418B) /
Resource Hash
1da6c889ffc546f25e52d44bc8242bfb1474926b93f110b3b0ffe086afdf0e41
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:12 GMT
x-content-type-options
nosniff
age
66840
x-cache
HIT
status
200
content-length
2035
x-response-time
111
surrogate-key
profile_images profile_images/bucket/2 profile_images/673468724725305344
last-modified
Sun, 06 Dec 2015 11:45:11 GMT
server
ECS (fcn/418B)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
53380ea9824390a02e0c5086317ff7e2
accept-ranges
bytes
a0AOtFiC_normal.jpg
pbs.twimg.com/profile_images/721286547597848576/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/721286547597848576/a0AOtFiC_normal.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4186) /
Resource Hash
9271496895cbf8f332ad9aff46e0b69a9ccdf8d20e50d5e71ca92c71b5834cc6
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:12 GMT
x-content-type-options
nosniff
age
237219
x-cache
HIT
status
200
content-length
1883
x-response-time
124
surrogate-key
profile_images profile_images/bucket/1 profile_images/721286547597848576
last-modified
Sat, 16 Apr 2016 10:36:08 GMT
server
ECS (fcn/4186)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
fedb293bc0f312fdb0afe1e21159f20b
accept-ranges
bytes
IpFUUmQe_normal.jpg
pbs.twimg.com/profile_images/1243235498614648832/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1243235498614648832/IpFUUmQe_normal.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40EB) /
Resource Hash
9ed7525a525f4e3d51ac64a1691c749eafa1995c5fe4d28b863c7b5091b5f48b
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:12 GMT
x-content-type-options
nosniff
age
108397
x-cache
HIT
status
200
content-length
1731
x-response-time
115
surrogate-key
profile_images profile_images/bucket/1 profile_images/1243235498614648832
last-modified
Thu, 26 Mar 2020 17:54:55 GMT
server
ECS (fcn/40EB)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
c47c81cf0e0dae3fd68bf0611250e563
accept-ranges
bytes
ajax.php
www.bankinfosecurity.com/
5 B
388 B
XHR
General
Full URL
https://www.bankinfosecurity.com/ajax.php?json=notificationCookies&action=getNotifications
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1595685489.1271
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
fcbcf165908dd18a9e49f7ff27810176db8e9f63b4352213741664245224f8aa

Request headers

Accept
*/*
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:58:11 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Keep-Alive
timeout=5, max=96
Expires
Thu, 19 Nov 1981 08:52:00 GMT
integrator.js
adservice.google.de/adsid/
109 B
168 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.bankinfosecurity.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:58:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
168 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.bankinfosecurity.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:58:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
pubads_impl_2020072001.js
securepubads.g.doubleclick.net/gpt/
253 KB
90 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
31e539be75870ad6cec377525eb196ea9fbc423ea53d68c03b2c94b96701bc47
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 20 Jul 2020 13:10:24 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
91349
x-xss-protection
0
expires
Sat, 25 Jul 2020 13:58:12 GMT
collect
www.google-analytics.com/r/
35 B
100 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j83&a=1868433254&t=pageview&_s=1&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&ul=en-us&de=UTF-8&dt=Microsoft%20Seizes%20Domains%20Used%20for%20COVID-19%20Phishing%20Scam&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAEAB~&jid=7178188&gjid=1408315513&cid=1477614901.1595685492&tid=UA-212197-2&_gid=68754820.1595685492&_r=1&z=450789030
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:58:12 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
stats.g.doubleclick.net/r/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j83&a=1868433254&t=pageview&_s=1&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&ul=en-...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-212197-36&cid=1477614901.1595685492&jid=2140583511&_gid=68754820.1595685492&gjid=1178618580&_v=j83&z=654813028
35 B
99 B
Image
General
Full URL
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-212197-36&cid=1477614901.1595685492&jid=2140583511&_gid=68754820.1595685492&gjid=1178618580&_v=j83&z=654813028
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c0a::9c Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Sat, 25 Jul 2020 13:58:12 GMT
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:58:12 GMT
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
302
location
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-212197-36&cid=1477614901.1595685492&jid=2140583511&_gid=68754820.1595685492&gjid=1178618580&_v=j83&z=654813028
content-type
text/html; charset=UTF-8
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
416
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
99 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j83&a=1868433254&t=event&_s=2&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&ul=en-us&de=UTF-8&dt=Microsoft%20Seizes%20Domains%20Used%20for%20COVID-19%20Phishing%20Scam&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=dailyemailupdates&ea=impression&el=&_u=IEDAAEAB~&jid=&gjid=&cid=1477614901.1595685492&tid=UA-212197-2&_gid=68754820.1595685492&z=492582250
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 21 Jul 2020 18:25:02 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
329590
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
collect
px.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&time=1595685491928
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D749%26url%3Dhttps%253A%252F%252Fwww.bankinfosecurity.com%252Fmicrosoft-seize-doma...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&time=1595685491928&liSync=true
0
57 B
Image
General
Full URL
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&time=1595685491928&liSync=true
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9105 , Ireland, ASN14413 (LINKEDIN, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:12 GMT
server
Play
linkedin-action
1
x-li-fabric
prod-lva1
status
200
x-li-proto
http/2
x-li-pop
prod-efr5
content-type
application/javascript
content-length
0
x-li-uuid
De0DQYADJRaAFg8nhCsAAA==

Redirect headers

content-security-policy
default-src *; connect-src 'self' https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob: https://accounts.google.com/gsi/status https://linkedin.sc.omtrdc.net/b/ss/ static.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com media.licdn.com media-exp1.licdn.com media-exp2.licdn.com media-exp3.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/insight.min.js platform.linkedin.com platform-akam.linkedin.com platform-ecst.linkedin.com platform-azur.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
x-content-type-options
nosniff
linkedin-action
1
status
302
content-length
0
x-li-uuid
6VLdPIADJRbg/45r2ioAAA==
pragma
no-cache
x-li-pop
afd-prod-lva1
x-msedge-ref
Ref A: F3F0B8D9A23D4A5BA55B97333F97DA56 Ref B: FRAEDGE1510 Ref C: 2020-07-25T13:58:12Z
x-frame-options
sameorigin
date
Sat, 25 Jul 2020 13:58:11 GMT
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
strict-transport-security
max-age=2592000
x-li-fabric
prod-lva1
location
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&time=1595685491928&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
munchkin.js
munchkin.marketo.net/158/
11 KB
5 KB
Script
General
Full URL
https://munchkin.marketo.net/158/munchkin.js
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
88.221.60.75 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a88-221-60-75.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
5f967fd41346c0fc1b9b44fa69c52bf1e754420c59c8017cefb0a14a764cafa4

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:12 GMT
Content-Encoding
gzip
Last-Modified
Tue, 28 Jan 2020 03:01:21 GMT
Server
AkamaiNetStorage
ETag
"67df7eb9e9e68638308f14367dddec10:1580180481"
Vary
Accept-Encoding
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR", policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Cache-Control
max-age=8640000
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
4686
Expires
Mon, 02 Nov 2020 13:58:12 GMT
visitWebPage
051-zxi-237.mktoresp.com/webevents/
2 B
304 B
XHR
General
Full URL
https://051-zxi-237.mktoresp.com/webevents/visitWebPage?_mchNc=1595685492159&_mchCn=&_mchId=051-ZXI-237&_mchTk=_mch-bankinfosecurity.com-1595685492158-47437&_mchHo=www.bankinfosecurity.com&_mchPo=&_mchRu=%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&_mchPc=https%3A&_mchVr=158&_mchEcid=&_mchHa=&_mchRe=&_mchQp=
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/158/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.28.147.68 , United States, ASN53580 (MARKETO, US),
Reverse DNS
Software
akka-http/10.1.11 /
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sat, 25 Jul 2020 13:58:13 GMT
Content-Encoding
gzip
Server
akka-http/10.1.11
Transfer-Encoding
chunked
X-Request-Id
135eaf79-c996-476d-b239-c57cb67b57a0
Content-Type
text/plain; charset=UTF-8
visitWebPage
051-zxi-237.mktoresp.com/webevents/
2 B
304 B
XHR
General
Full URL
https://051-zxi-237.mktoresp.com/webevents/visitWebPage?_mchNc=1595685492159&_mchRu=%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&_mchQp=cat%3D413%26cat%3D562%26cat%3D416%26cat%3D409%26cat%3D93%26cat%3D320%26cat%3D423%26cat%3D435%26assetID%3D14576%26assetType%3Darticle%26key%3Dmicrosoft%26key%3Dphishing%26key%3Demail%26key%3Dcovid-19%26key%3Dfederal%20court%26key%3D&_mchId=051-ZXI-237&_mchTk=_mch-bankinfosecurity.com-1595685492158-47437&_mchHo=www.bankinfosecurity.com&_mchPo=&_mchPc=https%3A&_mchVr=158&_mchEcid=&_mchRe=undefined
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/158/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.28.147.68 , United States, ASN53580 (MARKETO, US),
Reverse DNS
Software
akka-http/10.1.11 /
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sat, 25 Jul 2020 13:58:13 GMT
Content-Encoding
gzip
Server
akka-http/10.1.11
Transfer-Encoding
chunked
X-Request-Id
b08646a3-c662-4135-890d-780b882aa170
Content-Type
text/plain; charset=UTF-8
utsync.ashx
ml314.com/
644 B
1 KB
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=57819&ct=js&pi=&fp=&clid=&if=0&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&pv=1595685492188_ifunhkn8y&bl=en-us&cb=108850&return=&ht=&d=&dc=&si=1595685492188_ifunhkn8y&cid=&s=1600x1200&rp=
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?2562020
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.253.133.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
7b90e079bcc9d775740899fd899ec8a20d128b18fa7f3d3d5e3cbd41f59ebd40

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:58:11 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
468
Expires
0
ud.ashx
in.ml314.com/
20 B
481 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=2562020
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?2562020
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.215.10.43 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:12 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public
Connection
keep-alive
Content-Length
138
Expires
Sun, 26 Jul 2020 13:58:12 GMT
demconf.jpg
dpm.demdex.net/
Redirect Chain
  • https://dpm.demdex.net/ibs:dpid=22052&dpuuid=3611938403182968859&redir=
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=3611938403182968859&redir=
42 B
915 B
Image
General
Full URL
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=3611938403182968859&redir=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.243.136.226 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v075-034dec33c.edge-irl1.demdex.com 5.74.0.20200706134429 0ms (+1ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-TID
vE+OUS7dSl0=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-TID
ekvEQyrHSE0=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Location
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=3611938403182968859&redir=
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://idsync.rlcdn.com/395886.gif?partner_uid=3611938403182968859
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTMzYxMTkzODQwMzE4Mjk2ODg1ORAAGg0I9PTw-AUSBQjoBxAAQgBKAA
  • https://ml314.com/csync.ashx?fp=77fb3638555e4137db4400d38225f01bd2913409eaa5019334ee4db889eb01e5f4cb09cee1a4f8eb&person_id=3611938403182968859&eid=50082
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=77fb3638555e4137db4400d38225f01bd2913409eaa5019334ee4db889eb01e5f4cb09cee1a4f8eb&person_id=3611938403182968859&eid=50082
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.253.133.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:12 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sun, 26 Jul 2020 09:58:12 GMT

Redirect headers

date
Sat, 25 Jul 2020 13:58:12 GMT
via
1.1 google
status
307
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
location
https://ml314.com/csync.ashx?fp=77fb3638555e4137db4400d38225f01bd2913409eaa5019334ee4db889eb01e5f4cb09cee1a4f8eb&person_id=3611938403182968859&eid=50082
cache-control
no-cache, no-store
timing-allow-origin
*
alt-svc
clear
content-length
0
utsync.ashx
ml314.com/
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=03c7c36d-1512-4fac-8bf2-fc54e1ecd0d9
43 B
748 B
Image
General
Full URL
https://ml314.com/utsync.ashx?eid=53819&et=0&fp=03c7c36d-1512-4fac-8bf2-fc54e1ecd0d9
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.253.133.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Pragma
no-cache
Date
Sat, 25 Jul 2020 13:58:12 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
0,Sun, 26 Jul 2020 09:58:12 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:58:12 GMT
x-aspnet-version
4.0.30319
status
302
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
location
https://ml314.com/utsync.ashx?eid=53819&et=0&fp=03c7c36d-1512-4fac-8bf2-fc54e1ecd0d9
cache-control
private,no-cache, must-revalidate
content-type
text/html
content-length
199
csync.ashx
ml314.com/
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3611938403182968859
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3611938403182968859
  • https://ml314.com/csync.ashx?fp=8f6d141d890d8df1de509c9172bed173&eid=50146&person_id=3611938403182968859
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=8f6d141d890d8df1de509c9172bed173&eid=50146&person_id=3611938403182968859
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.253.133.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:11 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sun, 26 Jul 2020 09:58:12 GMT

Redirect headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:58:12 GMT
status
302
p3p
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
location
https://ml314.com/csync.ashx?fp=8f6d141d890d8df1de509c9172bed173&eid=50146&person_id=3611938403182968859
cache-control
no-cache
x-server
10.45.1.67
content-length
0
expires
0
/
ps.eyeota.net/pixel/bounce/
Redirect Chain
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif
0
344 B
Image
General
Full URL
https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
3.125.70.222 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:12 GMT
Content-Length
0
P3P
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR SAMo BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR", policyref="http://ps.eyeota.net/w3c/p3p.xml"

Redirect headers

Location
/pixel/bounce/?pid=r8hrb20&t=gif
Date
Sat, 25 Jul 2020 13:58:12 GMT
Content-Length
0
P3P
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR SAMo BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR", policyref="http://ps.eyeota.net/w3c/p3p.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR SAMo BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR", policyref="http://ps.eyeota.net/w3c/p3p.xml"
lounge.6525595c7a9874fa10bd041275e40f17.css
c.disquscdn.com/next/embed/styles/
0
22 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.6525595c7a9874fa10bd041275e40f17.css
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a813 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
331007
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
22092
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Mon, 20 Jul 2020 23:36:39 GMT
server
cloudflare
etag
"5f162a87-564c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-request-id
0427dd6e8b000096fec4035200000001
accept-ranges
bytes
cf-ray
5b8664f749c196fe-FRA
expires
Wed, 21 Jul 2021 18:01:24 GMT
common.bundle.f9de3d662c5d03c937747411c45f2ea2.js
c.disquscdn.com/next/embed/
0
88 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.f9de3d662c5d03c937747411c45f2ea2.js
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a813 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
331007
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
89946
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Mon, 20 Jul 2020 23:36:39 GMT
server
cloudflare
etag
"5f162a87-15f5a"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-request-id
0427dd6eb2000096fec4039200000001
accept-ranges
bytes
cf-ray
5b8664f789f596fe-FRA
expires
Wed, 21 Jul 2021 18:01:24 GMT
lounge.bundle.c32f18973ccddcdedfa44f2602cdb867.js
c.disquscdn.com/next/embed/
0
113 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.c32f18973ccddcdedfa44f2602cdb867.js
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a813 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
147035
status
200
strict-transport-security
max-age=300; includeSubdomains
content-length
115356
x-xss-protection
1; mode=block
timing-allow-origin
*
last-modified
Thu, 23 Jul 2020 20:57:22 GMT
server
cloudflare
etag
"5f19f9b2-1c29c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
cf-request-id
0427dd6eb2000096fec403a200000001
accept-ranges
bytes
cf-ray
5b8664f789f796fe-FRA
expires
Fri, 23 Jul 2021 21:07:37 GMT
config.js
disqus.com/next/
0
7 KB
Other
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.192.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:12 GMT
X-Content-Type-Options
nosniff
Content-Type
application/javascript; charset=UTF-8
Server
nginx
Age
57
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
6275
X-XSS-Protection
1; mode=block
ads
securepubads.g.doubleclick.net/gampad/
144 KB
14 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3426801808764996&correlator=3637708515898597&output=ldjh&impl=fifs&adsid=NT&eid=21066626%2C21066720&vrg=2020072001&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200725&iu_parts=4444691%2CBIS_TOP_728x90%2CBIS_MID_RB_300x250%2CBIS_MID_RB_2_300x250%2CBIS_MID_RB_3_300x250%2CBIS_MID_RB_300x600%2CBIS_MID_L_180x150%2CBIS_MID_R_180x150%2CBIS_MID2_L_180x150%2CBIS_MID2_R_180x150%2CBIS_TEXT_1%2CBIS_TEXT_2%2CBIS_BOTTOM_728x90%2CBIS_MID_728x90%2CBIS_Interstitial%2CBIS_TOP_320x50%2CBIS_BOTTOM_320x50%2CBIS_MID_320x50%2CBIS_CAT_LOGO&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3%2C%2F0%2F4%2C%2F0%2F5%2C%2F0%2F6%2C%2F0%2F7%2C%2F0%2F8%2C%2F0%2F9%2C%2F0%2F10%2C%2F0%2F11%2C%2F0%2F12%2C%2F0%2F13%2C%2F0%2F14%2C%2F0%2F15%2C%2F0%2F16%2C%2F0%2F17%2C%2F0%2F18&prev_iu_szs=728x90%2C300x250%2C300x250%2C300x250%2C300x600%2C180x150%2C180x150%2C180x150%2C180x150%2C280x70%2C280x70%2C728x90%2C728x90%2C640x480%2C320x50%2C320x50%2C320x50%2C216x54&cust_params=category%3D%255B413%252C562%252C416%252C409%252C93%252C320%252C423%252C435%255D%26gated%3Dn&cookie_enabled=1&bc=31&abxe=1&lmt=1595685492&dt=1595685492388&dlt=1595685489296&idt=3064&frm=20&biw=1600&bih=1200&oid=3&adxs=615%2C1025%2C1025%2C-9%2C1010%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C15%2C-9%2C-9%2C-12245933%2C-12245933%2C-9%2C-12245933&adys=71%2C587%2C4185%2C-9%2C2152%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C4525%2C-9%2C-9%2C-12245933%2C-12245933%2C-9%2C-12245933&adks=606436291%2C592806581%2C4037182823%2C700692632%2C585369811%2C2214922354%2C1142555781%2C3687202745%2C1536889060%2C1397140349%2C824892936%2C1158310571%2C1554130010%2C3082656849%2C1657167512%2C3519266287%2C3120678580%2C3463778582&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9%7Ca%7Cb%7Cc%7Cd%7Ce%7Cf%7Cg%7Ch%7Ci&ifi=1&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&dssz=72&icsg=3298533878783&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=800x90%7C360x0%7C360x0%7C0x-1%7C390x595%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C1600x90%7C0x-1%7C0x-1%7C0x0%7C0x0%7C0x-1%7C780x4053&msz=770x90%7C360x250%7C360x250%7C0x-1%7C390x600%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C1570x90%7C0x-1%7C0x-1%7C0x0%7C0x0%7C0x-1%7C236x64&ga_vid=1477614901.1595685492&ga_sid=1595685492&ga_hid=1868433254&fws=0%2C0%2C0%2C2%2C0%2C2%2C2%2C2%2C2%2C2%2C2%2C0%2C2%2C2%2C128%2C128%2C2%2C128&ohw=0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
382def399b10de4fdd101ad955d430f3fb0f4341f6037d7ceb27bc37cfb2749c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:12 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13454
x-xss-protection
0
google-lineitem-id
5374156995,5374156995,5374156995,5419002435,5374156995,-2,-2,-2,-2,-2,-2,5374156995,5374156995,5418155186,-2,-2,-2,-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138312227827,138311858019,138311858010,138316731935,138312228070,-2,-2,-2,-2,-2,-2,138311858058,138311857974,138316496783,-2,-2,-2,-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.bankinfosecurity.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
430c7e165989420d4243e166687674f7.safeframe.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://430c7e165989420d4243e166687674f7.safeframe.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

/
disqus.com/embed/comments/ Frame D16C
0
0
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576&t_d=Microsoft%20Seizes%20Domains%20Used%20for%20COVID-19%20Phishing%20Scam&t_t=Microsoft%20Seizes%20Domains%20Used%20for%20COVID-19%20Phishing%20Scam&s_o=default
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.192.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ https://apis.google.com https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ 'unsafe-inline' https://com-disqus.netmng.com:* https://www.google.com/recaptcha/ https://cf.ignitionone.com:* https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
disqus.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576

Response headers

Connection
keep-alive
Content-Length
2700
Server
nginx
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ https://apis.google.com https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ 'unsafe-inline' https://com-disqus.netmng.com:* https://www.google.com/recaptcha/ https://cf.ignitionone.com:* https://disqus.com
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Timing-Allow-Origin
*
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Type
text/html; charset=utf-8
Last-Modified
Wed, 08 Jul 2020 00:27:00 GMT
ETag
W/"lounge:view:8114956664.cd3d4b4451f130382a9ce7bd4a4ad5ab.2"
Content-Encoding
gzip
Date
Sat, 25 Jul 2020 13:58:12 GMT
Age
0
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
amp4ads-v0.js
cdn.ampproject.org/rtv/012007102309000/ Frame 63A8
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1d719a7b7ef17ad476a644a196c6130ed955f5ab06f7bac34632f44d4772bfe5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16582
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57400
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:21:50 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"83969d63ffc70a02"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:21:50 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012007102309000/v0/ Frame 63A8
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16581
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:21:51 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:21:51 GMT
truncated
/ Frame 63A8
218 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
12c7a6a646aaa878d5bb495e09624fcacc493ed46e9796475f347218642d5860

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/012007102309000/ Frame 09C8
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1d719a7b7ef17ad476a644a196c6130ed955f5ab06f7bac34632f44d4772bfe5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16582
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57400
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:21:50 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"83969d63ffc70a02"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:21:50 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012007102309000/v0/ Frame 09C8
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16581
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:21:51 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:21:51 GMT
truncated
/ Frame 09C8
219 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ec04b214c3bcc798032a98a7d0ca3c8a567525c0ff2d9adb06a0c5db6fb2b27

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/012007102309000/ Frame 233F
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1d719a7b7ef17ad476a644a196c6130ed955f5ab06f7bac34632f44d4772bfe5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16582
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57400
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:21:50 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"83969d63ffc70a02"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:21:50 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012007102309000/v0/ Frame 233F
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16581
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:21:51 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:21:51 GMT
truncated
/ Frame 233F
220 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
fab8ac379740c1e15bfc3b47b84fc2d4c1e8810adaf065cde16d20c688194e27

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
7023985773770768296
tpc.googlesyndication.com/simgad/ Frame 63A8
26 KB
27 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7023985773770768296
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e49126b9c1de5a40b95eedc51611737f54d1ec8f63292467e12a797128a9c82c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 21 Jul 2020 16:49:25 GMT
x-content-type-options
nosniff
age
335327
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
27018
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:35 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 21 Jul 2021 16:49:25 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 63A8
0
167 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssOkTeiFY4Wb-fFUxEnVAgHEY6EcTaU4_b8-fqWUbqp8vljPFQl-Gq5sMOM7cxMkoU_waWs1Wa_vDHPEZI9yMG8jRcMjg8CP0DInFryWJZMVG3ElcbkqOktoQO2f28Nndif4RPzJ0toWizQNpJgwi_QLB4B-hqKSUhH9mIy3cGjWBydK9ZIV6Qps0rbjvLUBx3kalsnsS5zn1TWBPbp_s7BAjK6raAieTDNuu-DfRaSY4ehwr-xkIm-eNsEyAPx78Xx2Ps1dQocf4XhRhJiMKI&sig=Cg0ArKJSzJkYzpKK_9KNEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:58:12 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 25 Jul 2020 13:58:12 GMT
l
www.google.com/ads/measurement/ Frame 63A8
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaSULKEOTuX1hw2ZiRnc0H2TbvnFgE5PswZRfr-hmT7a9xacAKnQNEAiXek55Y8uhsney7JNxJkgTCTvuGKf0rW1uaOJgw
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

1446018992864035693
tpc.googlesyndication.com/simgad/ Frame 09C8
30 KB
30 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/1446018992864035693
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4d3fcbef254dcbd91c92b13ec741c0dcfc592fa256e234e53f27ba7e1a3052a7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 05:34:54 GMT
x-content-type-options
nosniff
age
202998
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
31010
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:53 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 23 Jul 2021 05:34:54 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 09C8
0
149 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvRuBpDkJ8slO_SNurkiMqAX9ATWMajOiWcpJBvoNeiGHsyMZhlEFbKgtJ2voQdZ6URdeaRHflnxJsBhJo39GWogU-qEIQMkv-Ec6XsTFP8SUGuoiXj8tMIRKgw_iZmHjiv7xkIByfpMyg0CUUgU8xsDvDNJBvfg7x0Cy9HFbL8MG6lsmP6RSswxNmsmnSXqorxOXrrGdy9IhrK3HEZmglfnggSS_2ux7KMBxIVheEAw_qsY_CKtQNRsYAB5tljJ8Typs84dTjKCeptqkER0tio5XLo&sig=Cg0ArKJSzAsKuhM9gcY6EAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:58:12 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 25 Jul 2020 13:58:12 GMT
1446018992864035693
tpc.googlesyndication.com/simgad/ Frame 233F
30 KB
30 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/1446018992864035693
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4d3fcbef254dcbd91c92b13ec741c0dcfc592fa256e234e53f27ba7e1a3052a7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 05:34:54 GMT
x-content-type-options
nosniff
age
202998
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
31010
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:53 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 23 Jul 2021 05:34:54 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 233F
0
149 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss_44_C-KZqC6j021uMWXWFE4r0k1uN5rPU9OV6z9i-YJFfSu9nEnvLg-2x5pBJRP-zP2X-jfvTM4GPxrDM5tW24wQ0QtTNbSQScqvrcCpOebzMpJXQFHU0MN2NSYOU0fKIxginxIFNm7eKJfxe92t7oPkzLYsNAWmuvdMLFUVk2_d-tqY8xgz7wiNV7KRXHLS2CNA0RLY6D7RfsE9eWF4Cbky1LNX9sFBEDuxwbfqYqAIlNv9YFrEpHQeTLq1L1nM7Xx7vdLESlv41zuX3WsukXZ-mbIw&sig=Cg0ArKJSzFfHPCV6LOx-EAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:58:12 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 25 Jul 2020 13:58:12 GMT
amp4ads-v0.js
cdn.ampproject.org/rtv/012007102309000/ Frame 8603
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1d719a7b7ef17ad476a644a196c6130ed955f5ab06f7bac34632f44d4772bfe5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16582
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57400
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:21:50 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"83969d63ffc70a02"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:21:50 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012007102309000/v0/ Frame 8603
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16581
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:21:51 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:21:51 GMT
truncated
/ Frame 8603
221 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
11f8b97a7023e925e51ee3484875fa6beafee2511657f0840fa519cbbab20b8e

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/012007102309000/ Frame 4E42
206 KB
56 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1d719a7b7ef17ad476a644a196c6130ed955f5ab06f7bac34632f44d4772bfe5
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16582
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
57400
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:21:50 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"83969d63ffc70a02"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:21:50 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012007102309000/v0/ Frame 4E42
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012007102309000/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de2181a33594f9109e9e48ecf4d5431585340ad5d9a3ba7ab57939f5afe90d32
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16581
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29729
x-xss-protection
0
server
sffe
date
Sat, 25 Jul 2020 09:21:51 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"b208119f1c2c4cc7"
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 25 Jul 2021 09:21:51 GMT
7023985773770768296
tpc.googlesyndication.com/simgad/ Frame 4E42
26 KB
26 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7023985773770768296
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e49126b9c1de5a40b95eedc51611737f54d1ec8f63292467e12a797128a9c82c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 21 Jul 2020 16:49:25 GMT
x-content-type-options
nosniff
age
335327
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
27018
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:35 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 21 Jul 2021 16:49:25 GMT
truncated
/ Frame 4E42
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d6b36b5fef95905ca91470c4e968a620cdf0561dcff40b92ff59d9294d926b50

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
13894270929831550705
tpc.googlesyndication.com/simgad/ Frame 8603
60 KB
60 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/13894270929831550705
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
57addda2c635118ad02c1fbe74324d03d5dee2a1561c42e0b9c35f5c18e64f62
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 12 Jun 2020 20:54:23 GMT
x-content-type-options
nosniff
age
3690229
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
61388
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:13 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 12 Jun 2021 20:54:23 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 8603
0
149 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvbuRCO0pfgWlaaFukMyfi0SOW2PB44cVSg_u4thb8KEe8cE1oBBJSB_pgbiOoHyG8QxgLy-1sNIcsTsiX13lzu-Zl9TaeFzB8dt9eiqHuAakrhvlD46KfQem0JEe3YthEqmB9enifguyeg5EQbfIBDP5XVo0VPOZdTT4L_G2rXq4D4097r2Bs1ppFx93aVhWBXFWeGpaFcYsPkOrzIY9ri2m6VOfL59Ha-22NV501SfMCDy0GuVNw65VjI0T5Upw5_488v-3ru0fDQVZ6PBYDplnrb&sig=Cg0ArKJSzHGmo0yZnB4TEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:58:12 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 25 Jul 2020 13:58:12 GMT
l
www.google.com/ads/measurement/ Frame 8603
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaQbbAemPuOiapcO1HZnN5bcCz8yPl2hxT3BGWmUqzfrX2Lyc9Q0X7Vbeg1t8yKUa1btCqCbYuErqfmpQrXBT5cIMSuB6g
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

view
securepubads.g.doubleclick.net/pcs/ Frame 4E42
0
273 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssuGu93bOPAFJOXE7p9z8HHmjKdo7sull4BwNgHakDp2JYMC4p9I0tZ8YAgBfVqnxwH2-qiUt4GR55HPr2f8zFNq-QCbHw_IhRbsqo6Ai4BpwBIAhip3JW5vhFsuRl1h7MV6kVvNtM8AO6Rq8NhD3pN3anGSSZHo_zhxCLnU8-imGuf6hjHGTxLoqstGg3_oJPasnEoJE9eJs3YxJC7QLS8LFb7pTngT5eIWJniApx-t3krWyN6CYrerUE8O0AXax5jO5_3zIDNgKIHmEOoIrwpLU0&sig=Cg0ArKJSzOdwsnn9z8cVEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:58:12 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 25 Jul 2020 13:58:12 GMT
l
www.google.com/ads/measurement/ Frame 4E42
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaTrDTphxbquSWT6G8PO_ny3-Ge-HDGoYq8mz9rlpAoKCrX1j0t9_L9hkX7FONqEjXy5oeG0T14C4XIdHYasJAzkKEgXGQ
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

7023985773770768296
tpc.googlesyndication.com/simgad/ Frame 63A8
26 KB
26 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7023985773770768296
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e49126b9c1de5a40b95eedc51611737f54d1ec8f63292467e12a797128a9c82c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 21 Jul 2020 16:49:25 GMT
x-content-type-options
nosniff
age
335327
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
27018
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:35 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 21 Jul 2021 16:49:25 GMT
1446018992864035693
tpc.googlesyndication.com/simgad/ Frame 09C8
30 KB
30 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/1446018992864035693
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4d3fcbef254dcbd91c92b13ec741c0dcfc592fa256e234e53f27ba7e1a3052a7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 05:34:54 GMT
x-content-type-options
nosniff
age
202998
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
31010
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:53 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 23 Jul 2021 05:34:54 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 63A8
0
274 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstmX9JZAtzmdQrSvbz5F0Yd5qYPKZ5nXMmF33TBVRZUSkI4zGu-CN_OL7wH3R0XmoDIAo8noukLc8oxuTZIAyYphCWEHDht8ONKMDGtzSX2qbcR1zZNTR08Sa3vb6y23sUn8ad5aTIVjzKYTdBmqVGID_vjmF2v3VfTGC9Lc54ILkdYNtE0iEo-PtN2JBfq2vAen5pTyQub_ACP6PgbxAJp4Y46DgbofNqUSh8crWs4wXUfdSXlo-2rDFpevQiQ8tFv-akKD1BJbu8ysnwOJjb9SA&sig=Cg0ArKJSzCIM5k_f4JTGEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:58:12 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 25 Jul 2020 13:58:12 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 09C8
0
273 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuJx-H5T1HR4B7wUKxpfckOAbKyE5AW9Y__gGP5EOW_tFaY3AtiXRImmJtwU5SLZe6WjN9c4JJE-96sxw4ocVIvcwS_gHVoQFfZtDhI5CJ9yyPD7IYwWIwbIs1BL2e4o0Od6skTDtsAVhOsgBPO30o5OJ7ZFZDYGpEld55nC-AF7EOdnSpg8NL9jgAPOrgPViW1wejekxZmcAzfjRxUIE9XXCFY6aoh_u3qW8JrPMfIi4cRga72Ihb0NooIZY41gilgjG1vifEB4JnieTQcEgoZBdqQMJc&sig=Cg0ArKJSzEPglVt8Z16BEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:58:12 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Sat, 25 Jul 2020 13:58:12 GMT
1446018992864035693
tpc.googlesyndication.com/simgad/ Frame 233F
30 KB
30 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/1446018992864035693
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4d3fcbef254dcbd91c92b13ec741c0dcfc592fa256e234e53f27ba7e1a3052a7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 23 Jul 2020 05:34:54 GMT
x-content-type-options
nosniff
age
202998
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
31010
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:53 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 23 Jul 2021 05:34:54 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 233F
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvzIAasp9b56Bz--SLey1k_5GuP8Ll0tDxM735FJoms35AkxQ_iF2r8GxDhRI6qqoUAqRT8xgn_VImxdFTOBDEsvUoiT8wvpk4qaQ9rcIXGNamU9rGQdM8eKWQNjbjDjCwxhXinxfmySi7RmlFyhrk2rkJMs9BoQSTBY4hSik99ydzqiXXP00m5G1EfZs4H3r1Es9go3rbHtyEo64W_ik8Vd_Be38tjXKIa73KO9wHG9ZyNyAQjpfHaXf2fM9sJHF3HwRUlsXvDXSPbh2oxVXAr2gVdIwjNSg&sig=Cg0ArKJSzPKWOM7vQDauEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:58:12 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
13894270929831550705
tpc.googlesyndication.com/simgad/ Frame 8603
60 KB
60 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/13894270929831550705
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
57addda2c635118ad02c1fbe74324d03d5dee2a1561c42e0b9c35f5c18e64f62
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 12 Jun 2020 20:54:23 GMT
x-content-type-options
nosniff
age
3690229
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
61388
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:13 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 12 Jun 2021 20:54:23 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 8603
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvi49KFFXmg-U-EjpPuDoA9IiNB6ZcEfSFkj1_itLLNyqbWAIBj5JMEuMZkqnO8e4VRYDaFxw2utksKkJ_1G9N6YBe6ngMvHrL0fyerBaoN5IA1BLIFxQLszgCxKQyin5llUpyTU8a6sALXjvt3kngZtvghEDrrKcpF7N--RkVnGMwgxTy22k9zTNND8goAnB60hpw5s0lK54w09R2A0TTv7ExORel3LALvtdLZmcLJQxkEUQfYDRPrXugS2zZxmIkf_W72YLY8ZAWkQZaIr_NFyz7ipKM&sig=Cg0ArKJSzMLlkCFKe2ybEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:58:12 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
7023985773770768296
tpc.googlesyndication.com/simgad/ Frame 4E42
26 KB
26 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7023985773770768296
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e49126b9c1de5a40b95eedc51611737f54d1ec8f63292467e12a797128a9c82c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 21 Jul 2020 16:49:25 GMT
x-content-type-options
nosniff
age
335327
x-dns-prefetch-control
off
status
200
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
27018
x-xss-protection
0
last-modified
Mon, 18 May 2020 17:28:35 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 21 Jul 2021 16:49:25 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 4E42
0
54 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssuhNJsOWFphoHkMsH2SCdjLZo35ZjW9AcoNiR6A5FazrJBirFoTqMjUPpKep4ASWRtyltuQaD_F0Q1AxpmEtbsJePsHsXUmH4VKuETxxwd0Jsw_-exrHRBhe4L4dab1bmqrXZgsOzP6tr-uf0rOWWhT-qLlaXGEzqqxbWP7-RsTBDeqJtf0-bE8hyKv7s3t_ShO-tAiOpOIN6ICm6KNovroI3imism3_XBd8LGGgWMSYfLep7bCDBwYdM5bUj7_7W9tNdNeJT3XlpBaS0J4c1w4NHLhA&sig=Cg0ArKJSzK6vij0wZfdEEAE&adurl=
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:58:12 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
bundle.968756fbcfe01603c32c1e0d9b0b9ab9.js
vue.comm100.com/js/ Frame 9F27
1002 KB
243 KB
Script
General
Full URL
https://vue.comm100.com/js/bundle.968756fbcfe01603c32c1e0d9b0b9ab9.js
Requested by
Host: chatserver.comm100.com
URL: https://chatserver.comm100.com/livechat.ashx?siteId=92035
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.5.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
d50ab4a607a1f79f62fb5b036f32b3bd702174c30e6829901a557d929d5b7566

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:13 GMT
content-encoding
gzip
cf-cache-status
HIT
age
5034949
x-powered-by
ASP.NET
status
200
content-length
248279
cf-request-id
0427dd72310000c7657a9c5200000001
last-modified
Mon, 25 May 2020 22:19:32 GMT
server
cloudflare
etag
"0b25c90e232d61:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
5b8664fd1adcc765-AMS
visitor.ashx
chatserver3.comm100.com/ Frame 9F27
996 B
884 B
XHR
General
Full URL
https://chatserver3.comm100.com/visitor.ashx?siteId=92035
Requested by
Host: vue.comm100.com
URL: https://vue.comm100.com/js/bundle.968756fbcfe01603c32c1e0d9b0b9ab9.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.5.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
985c91121dcc18ab51c9cebfb81414a1745cb42c0b694f8dfa21b529d9d62ef4

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Sat, 25 Jul 2020 13:58:14 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
x-aspnet-version
4.0.30319
x-powered-by
ASP.NET
p3p
CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
status
200
content-length
544
cf-request-id
0427dd73290000c7657a9f6200000001
x-robots-tag
noindex, nofollow
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
content-type
text/json; charset=utf-8
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
private
access-control-allow-credentials
true
cf-ray
5b8664feadccc765-AMS
access-control-allow-headers
Content-type,api-key,Authorization,X-Requested-With
activeview
pagead2.googlesyndication.com/pcs/ Frame 63A8
42 B
107 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssaI1TSUM0iJtzcCByz3_oldX75v43-5F4uquEesy2n_gizdw6i6oKMiSVSjWVxbwQpqJzcxSj6M5lYfpZ82nq1rP9rDgNeGRW5txsSkNI&sig=Cg0ArKJSzBSrVEtmQ6MAEAE&id=ampim&o=636,71&d=728,90&ss=1600,1200&bs=1600,1200&mcvt=1000&mtos=0,0,1000,1000,1000&tos=0,0,1000,0,0&tfs=129&tls=1129&g=100&h=100&tt=1129&r=v&avms=ampa&adk=606436291
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:58:13 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 09C8
42 B
107 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvGOTsFu2I-nbrc96MBt7-hkRvhMzx-awNnNdtxlkZSQ6jHQi00N0D3TZ2UfIDOSwf4qrTj6T0PJzvFkomwCgwYfAGJ-JKC7PNPO_uy7Ek&sig=Cg0ArKJSzDH9XFu3j5AlEAE&id=ampim&o=1040,587&d=300,250&ss=1600,1200&bs=1600,1200&mcvt=1000&mtos=0,0,1000,1000,1000&tos=0,0,1000,0,0&tfs=113&tls=1113&g=100&h=100&tt=1113&r=v&avms=ampa&adk=592806581
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:58:13 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
bis-hdr.desktop.r2.js
www.bankinfosecurity.com/javascripts-responsive/
2 KB
906 B
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/bis-hdr.desktop.r2.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 San Antonio, United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
a952a44375a3d8c869e96f85505fcbae076f4226021f08676a1b4627152252d0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 25 Jul 2020 13:58:13 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=90
Content-Length
595
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
6 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020072001&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a1858a195b3af31d40f2c57bd261c6b40e0b083050c55ab4d863ab581b0dd992
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Sat, 25 Jul 2020 13:58:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
5646
x-xss-protection
0
up.js
cdn01.basis.net/assets/
1 KB
951 B
Script
General
Full URL
https://cdn01.basis.net/assets/up.js?um=1
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-T6KM3T
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
178.79.227.167 , Italy, ASN22822 (LLNW, US),
Reverse DNS
Software
AC1.1 /
Resource Hash
6d810862e66c6beb7963f98524bee4231cd6ae1a41a2c8389ea49c31976180f8

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:14 GMT
content-encoding
gzip
last-modified
Wed, 13 Nov 2019 19:28:15 GMT
server
AC1.1
age
433901
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
737
x-llid
771911ef8e805b52207503eac4ccf4d5
64ead273d1f41aa7
pixel.sitescout.com/iap/
Redirect Chain
  • https://pixel-a.basis.net/iap/64ead273d1f41aa7
  • https://pixel.sitescout.com/iap/64ead273d1f41aa7
0
191 B
Image
General
Full URL
https://pixel.sitescout.com/iap/64ead273d1f41aa7
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
66.155.71.25 Southampton, United Kingdom, ASN13768 (COGECO-PEER1, CA),
Reverse DNS
Software
AC1.1 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
204
pragma
no-cache
date
Sat, 25 Jul 2020 13:58:13 GMT
cache-control
max-age=0,no-cache,no-store
expires
Tue, 11 Oct 1977 12:34:56 GMT
server
AC1.1
p3p
CP="NON DEVa PSAa PSDa OUR NOR NAV",policyref="/w3c/p3p.xml"

Redirect headers

status
301
content-length
0
location
https://pixel.sitescout.com/iap/64ead273d1f41aa7
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
6 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020072001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
08f50e9e70388c99977ca13b6af3a49f8f48c83e79230d51ea72a56c0735bd0c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1591403518460474"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5540
x-xss-protection
0
expires
Sat, 25 Jul 2020 13:58:13 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/210/ Frame 06C1
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/210/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/210/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
4590
date
Sat, 25 Jul 2020 12:59:23 GMT
expires
Sun, 25 Jul 2021 12:59:23 GMT
last-modified
Wed, 26 Feb 2020 19:47:50 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
3530
alt-svc
h3-29=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
gen_204
pagead2.googlesyndication.com/pagead/
0
55 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=210&t=2&li=gpt_2020072001&jk=3426801808764996&bg=!S0ilSFBYLGeGlu8itGcCAAAAW1IAAAAQmQGPcGI-MqQmKT14vNRNkc9oN_hG1DvCdw5OKZvJNOmp5haG6cFkjyvZQGGJQ474oq84qm7xAQNGpH1vZtP4ZHeZ9WBgXq6vt9knjfWNS8u8DhFw7PGEX81HVFU1kKiwoYyIHcDh0sAsLJw7UE-iMtxXfv2DQ3KngX1DmzC-7ipBe3J93Dxu7ZH-Nqv_A2lGuaxecTHrFu6bDRmFaZvbBTJfdl_mMJj_3GuZ8EEV3OEfVHMr69gNnlcf90wWKed81FEsrZlkzq-fVe7nNXkO5XtR9ArDqNrDFhMS1VqoOj5VtVFfpw8vdhZ5PbQDlxU54DfVgST0QlIhmITS4pRO7jDpTNTBx2RlK9QuOdk-QEKjYkYaWTeGh9t1dlJOLuK6qT21d-rULSnVkXGAcYRgJz9IZ9xWrCGli_C-NXgOcOMsBw6c-cYxrr2K3waIh8rN3z_SU_rYbjY97czoWPb-AE0r9iGH20PrPMa6P0gQAtudb1VmqFP9SGNuNyVZfEs-q9f_hAROy02qpc1lB9ACPM9A
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:58:14 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
asyncPixelSync
pixel.sitescout.com/dmp/ Frame 7AE7
0
0
Document
General
Full URL
https://pixel.sitescout.com/dmp/asyncPixelSync
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
66.155.71.25 Southampton, United Kingdom, ASN13768 (COGECO-PEER1, CA),
Reverse DNS
Software
AC1.1 /
Resource Hash

Request headers

:method
GET
:authority
pixel.sitescout.com
:scheme
https
:path
/dmp/asyncPixelSync
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576

Response headers

status
204
cache-control
max-age=0,no-cache,no-store
pragma
no-cache
expires
Tue, 11 Oct 1977 12:34:56 GMT
p3p
CP="NON DEVa PSAa PSDa OUR NOR NAV",policyref="/w3c/p3p.xml"
date
Sat, 25 Jul 2020 13:58:13 GMT
server
AC1.1
dabbb58b17f5118e
pixel.sitescout.com/up/
43 B
267 B
Image
General
Full URL
https://pixel.sitescout.com/up/dabbb58b17f5118e?cntr_url=https%3A%2F%2Fwww.bankinfosecurity.com%2Fmicrosoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
66.155.71.25 Southampton, United Kingdom, ASN13768 (COGECO-PEER1, CA),
Reverse DNS
Software
AC1.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 25 Jul 2020 13:58:14 GMT
server
AC1.1
p3p
CP="NON DEVa PSAa PSDa OUR NOR NAV",policyref="/w3c/p3p.xml"
status
200
cache-control
max-age=0,no-cache,no-store
content-type
image/gif
content-length
43
expires
Tue, 11 Oct 1977 12:34:56 GMT
visitor.ashx
chatserver3.comm100.com/ Frame 9F27
992 B
864 B
XHR
General
Full URL
https://chatserver3.comm100.com/visitor.ashx?siteId=92035
Requested by
Host: vue.comm100.com
URL: https://vue.comm100.com/js/bundle.968756fbcfe01603c32c1e0d9b0b9ab9.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.5.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
a1d99315472a32b62d793ffc86067dbe11a5735fe99ec83ae80b91858c394550

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Sat, 25 Jul 2020 13:58:14 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
x-aspnet-version
4.0.30319
x-powered-by
ASP.NET
p3p
CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
status
200
content-length
576
cf-request-id
0427dd75f80000c7657aa17200000001
x-robots-tag
noindex, nofollow
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
content-type
text/json; charset=utf-8
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
private
access-control-allow-credentials
true
cf-ray
5b8665032dcdc765-AMS
access-control-allow-headers
Content-type,api-key,Authorization,X-Requested-With
campaign.ashx
chatserver3.comm100.com/ Frame 9F27
6 KB
3 KB
XHR
General
Full URL
https://chatserver3.comm100.com/campaign.ashx?siteId=92035&campaignId=1275&lastUpdateTime=75567E86D28614B61879350BF24B10CF3D5F2F97D558627059BACCEACEA691D0
Requested by
Host: vue.comm100.com
URL: https://vue.comm100.com/js/bundle.968756fbcfe01603c32c1e0d9b0b9ab9.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.4.43 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
75567e86d28614b61879350bf24b10cf3d5f2f97d558627059bacceacea691d0

Request headers

Referer
https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 25 Jul 2020 13:58:15 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
x-aspnet-version
4.0.30319
x-powered-by
ASP.NET
status
200
content-length
2617
cf-request-id
0427dd775900000b536a3ed200000001
x-robots-tag
noindex, nofollow
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/json; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000
cf-ray
5b8665055d760b53-AMS
access-control-allow-headers
Content-type,api-key,Authorization,X-Requested-With

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.mp4
Domain
s7.addthis.com
URL
https://s7.addthis.com/static/sh.f48a1a04fe8dbf021b4cda1d.html

Verdicts & Comments Add Verdict or Comment

184 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery object| jQuery1910535656645076221 object| mejs function| MediaElement object| HtmlMediaElement function| onYouTubePlayerAPIReady function| DefaultPlayer function| MediaElementPlayer number| mce-data-1ee348jj3 object| tinyMCE object| tinymce function| des function| des_createKeys function| stringToHex function| hexToString function| readCookie function| disqus_config object| googletag object| top_banner_display object| dataLayer function| importScript function| cleanExistingScript function| refreshJavascript function| atwpjp string| _atd function| _euc function| _duc object| _atc string| _atr object| addthis string| addthis_pub function| emdot object| _ate object| _adr object| addthis_conf function| addthis_open function| addthis_close function| addthis_sendto string| base_url string| base_url_auto string| ssl_base string| services_url string| includes_url object| video_intro object| audio_data boolean| rsa_page boolean| ceo_page boolean| interview_page boolean| article_page boolean| is_gatedasset number| videoAskLoginTime number| videoStart boolean| identified_user boolean| display_videologin string| current_page string| session_id boolean| user_is_acq object| login_reload_pages object| scrollTopPages string| popup_to_open string| marketo_contact_identification_ajax object| all_states object| all_countries_with_states string| webinar_auto_click_register string| webinar_auto_click_register_slot string| __family__ boolean| exclude_pre_roll object| user_email number| ENTER_KEY object| article_video_caption_id object| highlight number| show_subtitles_speakers string| caption_speakers string| register_source boolean| player_is_running undefined| opened_modal undefined| do_hashchange function| closeCookieTerms function| uncheckGroupInputs function| submitFormPopup function| setMembershipPrices function| updatePriceBox function| forgotPassword function| generateHash2w function| login function| register function| pagination function| scrollTO function| showAlert function| assetPrequalSubmit function| addToBriefcase function| toggleDdlsByValue function| populateStates function| registerFormShowErrors function| recordLead function| initAudio function| initVideos function| initVideoScrolling function| resizeVideoPlayer function| removePlayerFromSidebar function| togglePrePostTime function| jumpSlide function| initVideoEvents function| URLToObj function| timedPopUpCount function| initAutoPopups function| initAJAXpopups function| checkClassicPopupPrequalErrors function| submitPopupAction function| saveToMyJobs function| initEmailSubscriptionsValidation function| emailSubscriptionsUncheckAll function| showPopupOnDemand function| sendAssetEmail function| runStrikesOnMKTLeadIdentification function| mediaMetadataNavigation number| width function| isMobile boolean| isDesktop function| addClassToMenuItem function| addClassToDropDown function| removeClassFromMenuItem function| removeClassFromDropDown function| clearDropDowns function| showDropDown function| hideDropDown function| showDropDown2 function| hideDropDown2 string| disqus_shortname string| disqus_url string| GoogleAnalyticsObject function| ga object| _ml function| CE_READY string| _bizo_data_partner_id object| Comm100API object| comm100_chatButton object| comm100_lc object| comm100_s number| top_banner_display_interval object| jQBrowser boolean| pp_alreadyInitialized boolean| doresize object| scroll_pos string| url boolean| hashtag object| addthis_share object| addthis_config boolean| notifications object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| google_tag_manager object| google_tag_data object| gaplugins object| gaGlobal object| gaData function| lintrk boolean| _already_called_lintrk object| CE2 function| mktoMunchkinFunction object| Munchkin function| mktoMunchkin boolean| __@@##MUH object| oattr object| MunchkinTracker object| DISQUS number| google_srt function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter undefined| google_measure_js_timing number| __google_ad_urls_id number| google_unique_id object| ampInaboxPositionObserver object| ampInaboxFrameOverlayManager object| GoogleGcLKhOms function| showSearch function| hideSearch object| google_image_requests object| cntrUpTag

1 Cookies

Domain/Path Name / Value
.bankinfosecurity.com/ Name: __gads
Value: ID=9f53eeb5d7ec3962:T=1595685492:S=ALNI_MYh1oiSv1P6WOVvre7H5IvYc68FDA

11 Console Messages

Source Level URL
Text
console-api debug URL: https://munchkin.marketo.net/158/munchkin.js(Line 22)
Message:
Munchkin.init("%s") options: 051-ZXI-237 [object Object]
console-api info URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
console-api info URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
console-api info URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
console-api info URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
console-api info URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 419)
Message:
Powered by AMP ⚡ HTML – Version 2007102309000 https://www.bankinfosecurity.com/microsoft-seize-domains-used-for-covid-19-phishing-scam-a-14576
console-api warning URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 21)
Message:
[amp-analytics/transport] Response unparseable or failed to send image request https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstmX9JZAtzmdQrSvbz5F0Yd5qYPKZ5nXMmF33TBVRZUSkI4zGu-CN_OL7wH3R0XmoDIAo8noukLc8oxuTZIAyYphCWEHDht8ONKMDGtzSX2qbcR1zZNTR08Sa3vb6y23sUn8ad5aTIVjzKYTdBmqVGID_vjmF2v3VfTGC9Lc54ILkdYNtE0iEo-PtN2JBfq2vAen5pTyQub_ACP6PgbxAJp4Y46DgbofNqUSh8crWs4wXUfdSXlo-2rDFpevQiQ8tFv-akKD1BJbu8ysnwOJjb9SA&sig=Cg0ArKJSzCIM5k_f4JTGEAE&adurl=
console-api warning URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 21)
Message:
[amp-analytics/transport] Response unparseable or failed to send image request https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuJx-H5T1HR4B7wUKxpfckOAbKyE5AW9Y__gGP5EOW_tFaY3AtiXRImmJtwU5SLZe6WjN9c4JJE-96sxw4ocVIvcwS_gHVoQFfZtDhI5CJ9yyPD7IYwWIwbIs1BL2e4o0Od6skTDtsAVhOsgBPO30o5OJ7ZFZDYGpEld55nC-AF7EOdnSpg8NL9jgAPOrgPViW1wejekxZmcAzfjRxUIE9XXCFY6aoh_u3qW8JrPMfIi4cRga72Ihb0NooIZY41gilgjG1vifEB4JnieTQcEgoZBdqQMJc&sig=Cg0ArKJSzEPglVt8Z16BEAE&adurl=
console-api warning URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 21)
Message:
[amp-analytics/transport] Response unparseable or failed to send image request https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvzIAasp9b56Bz--SLey1k_5GuP8Ll0tDxM735FJoms35AkxQ_iF2r8GxDhRI6qqoUAqRT8xgn_VImxdFTOBDEsvUoiT8wvpk4qaQ9rcIXGNamU9rGQdM8eKWQNjbjDjCwxhXinxfmySi7RmlFyhrk2rkJMs9BoQSTBY4hSik99ydzqiXXP00m5G1EfZs4H3r1Es9go3rbHtyEo64W_ik8Vd_Be38tjXKIa73KO9wHG9ZyNyAQjpfHaXf2fM9sJHF3HwRUlsXvDXSPbh2oxVXAr2gVdIwjNSg&sig=Cg0ArKJSzPKWOM7vQDauEAE&adurl=
console-api warning URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 21)
Message:
[amp-analytics/transport] Response unparseable or failed to send image request https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvi49KFFXmg-U-EjpPuDoA9IiNB6ZcEfSFkj1_itLLNyqbWAIBj5JMEuMZkqnO8e4VRYDaFxw2utksKkJ_1G9N6YBe6ngMvHrL0fyerBaoN5IA1BLIFxQLszgCxKQyin5llUpyTU8a6sALXjvt3kngZtvghEDrrKcpF7N--RkVnGMwgxTy22k9zTNND8goAnB60hpw5s0lK54w09R2A0TTv7ExORel3LALvtdLZmcLJQxkEUQfYDRPrXugS2zZxmIkf_W72YLY8ZAWkQZaIr_NFyz7ipKM&sig=Cg0ArKJSzMLlkCFKe2ybEAE&adurl=
console-api warning URL: https://cdn.ampproject.org/rtv/012007102309000/amp4ads-v0.js(Line 21)
Message:
[amp-analytics/transport] Response unparseable or failed to send image request https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssuhNJsOWFphoHkMsH2SCdjLZo35ZjW9AcoNiR6A5FazrJBirFoTqMjUPpKep4ASWRtyltuQaD_F0Q1AxpmEtbsJePsHsXUmH4VKuETxxwd0Jsw_-exrHRBhe4L4dab1bmqrXZgsOzP6tr-uf0rOWWhT-qLlaXGEzqqxbWP7-RsTBDeqJtf0-bE8hyKv7s3t_ShO-tAiOpOIN6ICm6KNovroI3imism3_XBd8LGGgWMSYfLep7bCDBwYdM5bUj7_7W9tNdNeJT3XlpBaS0J4c1w4NHLhA&sig=Cg0ArKJSzK6vij0wZfdEEAE&adurl=

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com
051-zxi-237.mktoresp.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com
430c7e165989420d4243e166687674f7.safeframe.googlesyndication.com
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com
adservice.google.com
adservice.google.de
bankinfosecurity.disqus.com
c.disquscdn.com
cdn.ampproject.org
cdn01.basis.net
chatserver.comm100.com
chatserver3.comm100.com
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com
dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com
disqus.com
dnn506yrbagrg.cloudfront.net
dpm.demdex.net
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com
fonts.googleapis.com
fonts.gstatic.com
idsync.rlcdn.com
in.ml314.com
m.addthis.com
match.adsrvr.org
ml314.com
munchkin.marketo.net
pagead2.googlesyndication.com
pbs.twimg.com
pixel-a.basis.net
pixel.sitescout.com
ps.eyeota.net
px.ads.linkedin.com
s7.addthis.com
script.crazyegg.com
securepubads.g.doubleclick.net
sjs.bizographics.com
stats.g.doubleclick.net
sync.crwdcntrl.net
tpc.googlesyndication.com
v1.addthisedge.com
vue.comm100.com
worker.ismgcorp.com
www.bankinfosecurity.com
www.google-analytics.com
www.google.com
www.googletagmanager.com
www.googletagservices.com
www.linkedin.com
z.moatads.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
s7.addthis.com
104.130.251.6
104.20.4.43
104.20.5.43
143.204.208.151
151.101.112.134
151.101.192.134
172.217.16.130
178.79.227.167
192.28.147.68
2.21.36.164
23.210.248.44
23.210.249.12
2606:2800:134:1a0d:1429:742:782:b6
2606:4700::6812:a813
2606:4700::6813:9408
2620:1ec:21::14
2a00:1450:4001:801::2004
2a00:1450:4001:814::2001
2a00:1450:4001:814::2002
2a00:1450:4001:816::2008
2a00:1450:4001:816::200e
2a00:1450:4001:818::2003
2a00:1450:4001:819::2001
2a00:1450:4001:81a::2002
2a00:1450:4001:81f::2001
2a00:1450:4001:81f::200a
2a00:1450:400c:c0a::9c
2a02:26f0:10c:399::3adf
2a05:f500:10:101::b93f:9105
3.125.70.222
3.215.10.43
34.243.136.226
34.253.133.202
35.244.245.222
50.56.167.254
52.18.161.147
52.211.146.59
66.155.71.25
72.247.224.209
72.247.226.64
88.221.60.75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