Submitted URL: https://hq.t.hubspotemail.net/e2t/tc/VWrdfp8P34J5W5m8-r232MMQfW7-75Mp4ww3dbN8mSy5m3lHPfV1-WJV7CgSqsVKlhG480nt_SW24mPYw6B2-DMF4...
Effective URL: https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=15153324...
Submission: On August 22 via api from US

Summary

This website contacted 4 IPs in 2 countries across 4 domains to perform 25 HTTP transactions. The main IP is 162.241.218.22, located in United States and belongs to UNIFIEDLAYER-AS-1, US. The main domain is www.dtonomy.com.
TLS certificate: Issued by R3 on August 16th 2021. Valid for: 3 months.
This is the only time www.dtonomy.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2 2606:4700::68... 13335 (CLOUDFLAR...)
7 162.241.218.22 46606 (UNIFIEDLA...)
3 2a00:1450:400... 15169 (GOOGLE)
25 4
Apex Domain
Subdomains
Transfer
7 dtonomy.com
www.dtonomy.com
30 KB
3 googleapis.com
fonts.googleapis.com
4 KB
2 hubspotemail.net
hq.t.hubspotemail.net
3 KB
0 hs-scripts.com Failed
js.hs-scripts.com Failed
25 4
Domain Requested by
7 www.dtonomy.com hq.t.hubspotemail.net
www.dtonomy.com
3 fonts.googleapis.com www.dtonomy.com
2 hq.t.hubspotemail.net 1 redirects
0 js.hs-scripts.com Failed www.dtonomy.com
25 4

This site contains no links.

Subject Issuer Validity Valid
hubspotemail.net
Cloudflare Inc ECC CA-3
2021-06-01 -
2022-05-31
a year crt.sh
autodiscover.dtonomy.com
R3
2021-08-16 -
2021-11-14
3 months crt.sh
upload.video.google.com
GTS CA 1O1
2021-07-26 -
2021-10-18
3 months crt.sh

This page contains 1 frames:

Primary Page: https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
Frame ID: 500F4F0FAF8E8BF71D51CFDD3AA485CE
Requests: 25 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://hq.t.hubspotemail.net/e2t/tc/VWrdfp8P34J5W5m8-r232MMQfW7-75Mp4ww3dbN8mSy5m3lHPfV1-WJV7CgSqsVKlhG48... Page URL
  2. https://hq.t.hubspotemail.net/events/public/v1/track/tc/VWrdfp8P34J5W5m8-r232MMQfW7-75Mp4ww3dbN8mSy5m3lHPf... HTTP 307
    https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^cloudflare$/i

Page Statistics

25
Requests

44 %
HTTPS

67 %
IPv6

4
Domains

4
Subdomains

4
IPs

2
Countries

36 kB
Transfer

210 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://hq.t.hubspotemail.net/e2t/tc/VWrdfp8P34J5W5m8-r232MMQfW7-75Mp4ww3dbN8mSy5m3lHPfV1-WJV7CgSqsVKlhG480nt_SW24mPYw6B2-DMF4c4Sjx3mgYW2-F3KB9gcn1KW7R3yMG4nT3WyW4xxKY84nhc-MVPMByf12XDCfW3c_MfJ3QNgDDW2DLVLG1LkfdKW8CmFMb2_P_WQW33hCBh5tW_kKW34xhGh7Z13yGW4fGrF79889P9W757YGC8Bl9R0W1rPkTk1M6dP9W1KlrQ916F49zW6rH9dz5y1NkRW13mkY89cWJg2W3vwb4c8lxpk7VWfy_L5vtTRgVjPG3f6k1DLYW9hv-PX7VMW7SW5dnrmb5zlnHMW33x8Ll6SJlCrW8MlnkH8WsJ8nW8BVZv498cXp33gXq1 Page URL
  2. https://hq.t.hubspotemail.net/events/public/v1/track/tc/VWrdfp8P34J5W5m8-r232MMQfW7-75Mp4ww3dbN8mSy5m3lHPfV1-WJV7CgSqsVKlhG480nt_SW24mPYw6B2-DMF4c4Sjx3mgYW2-F3KB9gcn1KW7R3yMG4nT3WyW4xxKY84nhc-MVPMByf12XDCfW3c_MfJ3QNgDDW2DLVLG1LkfdKW8CmFMb2_P_WQW33hCBh5tW_kKW34xhGh7Z13yGW4fGrF79889P9W757YGC8Bl9R0W1rPkTk1M6dP9W1KlrQ916F49zW6rH9dz5y1NkRW13mkY89cWJg2W3vwb4c8lxpk7VWfy_L5vtTRgVjPG3f6k1DLYW9hv-PX7VMW7SW5dnrmb5zlnHMW33x8Ll6SJlCrW8MlnkH8WsJ8nW8BVZv498cXp33gXq1?_ud=97753fa2-10d9-463a-939e-a40224a3a816&_ch=p&_pr2=p&_pl=0&_lg=en-US&_dr=b&_ts=p HTTP 307
    https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

25 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
VWrdfp8P34J5W5m8-r232MMQfW7-75Mp4ww3dbN8mSy5m3lHPfV1-WJV7CgSqsVKlhG480nt_SW24mPYw6B2-DMF4c4Sjx3mgYW2-F3KB9gcn1KW7R3yMG4nT3WyW4xxKY84nhc-MVPMByf12XDCfW3c_MfJ3QNgDDW2DLVLG1LkfdKW8CmFMb2_P_WQW33hCBh5t...
hq.t.hubspotemail.net/e2t/tc/
9 KB
3 KB
Document
General
Full URL
https://hq.t.hubspotemail.net/e2t/tc/VWrdfp8P34J5W5m8-r232MMQfW7-75Mp4ww3dbN8mSy5m3lHPfV1-WJV7CgSqsVKlhG480nt_SW24mPYw6B2-DMF4c4Sjx3mgYW2-F3KB9gcn1KW7R3yMG4nT3WyW4xxKY84nhc-MVPMByf12XDCfW3c_MfJ3QNgDDW2DLVLG1LkfdKW8CmFMb2_P_WQW33hCBh5tW_kKW34xhGh7Z13yGW4fGrF79889P9W757YGC8Bl9R0W1rPkTk1M6dP9W1KlrQ916F49zW6rH9dz5y1NkRW13mkY89cWJg2W3vwb4c8lxpk7VWfy_L5vtTRgVjPG3f6k1DLYW9hv-PX7VMW7SW5dnrmb5zlnHMW33x8Ll6SJlCrW8MlnkH8WsJ8nW8BVZv498cXp33gXq1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:a205 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6e85d4260cf6fb18ec4f5023edb9626120ea7451cc2576c9cb6e0dde64de6c95

Request headers

:method
GET
:authority
hq.t.hubspotemail.net
:scheme
https
:path
/e2t/tc/VWrdfp8P34J5W5m8-r232MMQfW7-75Mp4ww3dbN8mSy5m3lHPfV1-WJV7CgSqsVKlhG480nt_SW24mPYw6B2-DMF4c4Sjx3mgYW2-F3KB9gcn1KW7R3yMG4nT3WyW4xxKY84nhc-MVPMByf12XDCfW3c_MfJ3QNgDDW2DLVLG1LkfdKW8CmFMb2_P_WQW33hCBh5tW_kKW34xhGh7Z13yGW4fGrF79889P9W757YGC8Bl9R0W1rPkTk1M6dP9W1KlrQ916F49zW6rH9dz5y1NkRW13mkY89cWJg2W3vwb4c8lxpk7VWfy_L5vtTRgVjPG3f6k1DLYW9hv-PX7VMW7SW5dnrmb5zlnHMW33x8Ll6SJlCrW8MlnkH8WsJ8nW8BVZv498cXp33gXq1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sun, 22 Aug 2021 16:48:55 GMT
content-type
text/html;charset=utf-8
x-robots-tag
none
referrer-policy
no-referrer
vary
Accept-Encoding
x-hubspot-correlation-id
69a86150-a9cc-461f-b50c-1df880fdf945
access-control-allow-credentials
false
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
682d976cd9ab175a-FRA
content-encoding
br
Primary Request /
www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/
Redirect Chain
  • https://hq.t.hubspotemail.net/events/public/v1/track/tc/VWrdfp8P34J5W5m8-r232MMQfW7-75Mp4ww3dbN8mSy5m3lHPfV1-WJV7CgSqsVKlhG480nt_SW24mPYw6B2-DMF4c4Sjx3mgYW2-F3KB9gcn1KW7R3yMG4nT3WyW4xxKY84nhc-MVPMB...
  • https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqY...
94 KB
27 KB
Document
General
Full URL
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
Requested by
Host: hq.t.hubspotemail.net
URL: https://hq.t.hubspotemail.net/e2t/tc/VWrdfp8P34J5W5m8-r232MMQfW7-75Mp4ww3dbN8mSy5m3lHPfV1-WJV7CgSqsVKlhG480nt_SW24mPYw6B2-DMF4c4Sjx3mgYW2-F3KB9gcn1KW7R3yMG4nT3WyW4xxKY84nhc-MVPMByf12XDCfW3c_MfJ3QNgDDW2DLVLG1LkfdKW8CmFMb2_P_WQW33hCBh5tW_kKW34xhGh7Z13yGW4fGrF79889P9W757YGC8Bl9R0W1rPkTk1M6dP9W1KlrQ916F49zW6rH9dz5y1NkRW13mkY89cWJg2W3vwb4c8lxpk7VWfy_L5vtTRgVjPG3f6k1DLYW9hv-PX7VMW7SW5dnrmb5zlnHMW33x8Ll6SJlCrW8MlnkH8WsJ8nW8BVZv498cXp33gXq1
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
162.241.218.22 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
box5528.bluehost.com
Software
nginx/1.19.10 /
Resource Hash
dcd838c561cb32bb49dcf7a6807e606092326fca5b6401dfc5318ae0be587966

Request headers

:method
GET
:authority
www.dtonomy.com
:scheme
https
:path
/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://hq.t.hubspotemail.net/e2t/tc/VWrdfp8P34J5W5m8-r232MMQfW7-75Mp4ww3dbN8mSy5m3lHPfV1-WJV7CgSqsVKlhG480nt_SW24mPYw6B2-DMF4c4Sjx3mgYW2-F3KB9gcn1KW7R3yMG4nT3WyW4xxKY84nhc-MVPMByf12XDCfW3c_MfJ3QNgDDW2DLVLG1LkfdKW8CmFMb2_P_WQW33hCBh5tW_kKW34xhGh7Z13yGW4fGrF79889P9W757YGC8Bl9R0W1rPkTk1M6dP9W1KlrQ916F49zW6rH9dz5y1NkRW13mkY89cWJg2W3vwb4c8lxpk7VWfy_L5vtTRgVjPG3f6k1DLYW9hv-PX7VMW7SW5dnrmb5zlnHMW33x8Ll6SJlCrW8MlnkH8WsJ8nW8BVZv498cXp33gXq1

Response headers

date
Sun, 22 Aug 2021 16:49:21 GMT
server
nginx/1.19.10
content-type
text/html; charset=UTF-8
link
<https://www.dtonomy.com/wp-json/>; rel="https://api.w.org/", <https://www.dtonomy.com/wp-json/wp/v2/posts/8757>; rel="alternate"; type="application/json", <https://www.dtonomy.com/?p=8757>; rel=shortlink
vary
Accept-Encoding
content-encoding
gzip
host-header
c2hhcmVkLmJsdWVob3N0LmNvbQ==
referrer-policy
no-referrer-when-downgrade
access-control-allow-origin
*
x-server-cache
false

Redirect headers

date
Sun, 22 Aug 2021 16:48:55 GMT
x-robots-tag
none
link
<https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email>; rel="canonical"
location
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
referrer-policy
no-referrer
x-hubspot-correlation-id
0854a567-0c57-492e-bcf7-41cd6be8283f
access-control-allow-credentials
false
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
682d976d1a1a175a-FRA
lazyload.min.js
www.dtonomy.com/wp-content/plugins/w3-total-cache/pub/js/
6 KB
3 KB
Script
General
Full URL
https://www.dtonomy.com/wp-content/plugins/w3-total-cache/pub/js/lazyload.min.js
Requested by
Host: www.dtonomy.com
URL: https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
162.241.218.22 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
box5528.bluehost.com
Software
nginx/1.19.10 /
Resource Hash
1a54a1907a6443e3c81608130bfed4546eb0ce5d0c8897e1d7a3b43d89ecc367

Request headers

:path
/wp-content/plugins/w3-total-cache/pub/js/lazyload.min.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
www.dtonomy.com
referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sun, 22 Aug 2021 16:49:22 GMT
content-encoding
gzip
referrer-policy
no-referrer-when-downgrade
last-modified
Thu, 24 Jun 2021 16:10:23 GMT
server
nginx/1.19.10
accept-ranges
bytes
x-server-cache
false
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=31536000
host-header
c2hhcmVkLmJsdWVob3N0LmNvbQ==
content-length
2563
expires
Mon, 22 Aug 2022 16:49:22 GMT
/
www.dtonomy.com/
0
0

css
fonts.googleapis.com/
6 KB
557 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Poppins%3A300%2C400%2C500%2C600%2C700%2C900&subset
Requested by
Host: www.dtonomy.com
URL: https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
Protocol
H3-29
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:831::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
23822a86650e7cdc65fb33dfd7abb28b9a67756a22044ae832e7c5171af5b133
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sun, 22 Aug 2021 16:48:18 GMT
server
ESF
date
Sun, 22 Aug 2021 16:49:21 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sun, 22 Aug 2021 16:49:21 GMT
/
www.dtonomy.com/
0
0

css
fonts.googleapis.com/
5 KB
599 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato%3A400%2C500%2C600%2C700%7CPoppins%3A400%2C500%2C600%2C700&ver=2.5.5
Requested by
Host: www.dtonomy.com
URL: https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
Protocol
H3-29
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:831::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
0257c7661074b05f668768f59d18957b2cd7b4dd5b32f3a465f4649a5392da35
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sun, 22 Aug 2021 16:45:21 GMT
server
ESF
date
Sun, 22 Aug 2021 16:49:21 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sun, 22 Aug 2021 16:49:21 GMT
/
www.dtonomy.com/
0
0

/
www.dtonomy.com/
0
0

/
www.dtonomy.com/
0
0

css
fonts.googleapis.com/
90 KB
3 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic%7CRoboto+Slab%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic%7CVarela+Round%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic%7CMontserrat%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic%7CPoppins%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic&display=auto&ver=5.8
Requested by
Host: www.dtonomy.com
URL: https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
Protocol
H3-29
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:831::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
074603af16e14c1564f4ef4896ed930ed9319a6653cf475f590af418b5f3c13e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sun, 22 Aug 2021 16:49:21 GMT
server
ESF
date
Sun, 22 Aug 2021 16:49:21 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sun, 22 Aug 2021 16:49:21 GMT
/
www.dtonomy.com/
0
0

wp-emoji-release.min.js
www.dtonomy.com/wp-includes/js/
0
0

/
www.dtonomy.com/
0
0

/
www.dtonomy.com/
0
0
Script
General
Full URL
https://www.dtonomy.com/?w3tc_minify=93901.js
Requested by
Host: www.dtonomy.com
URL: https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
162.241.218.22 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
box5528.bluehost.com
Software
nginx/1.19.10 /
Resource Hash

Request headers

:path
/?w3tc_minify=93901.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
www.dtonomy.com
referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sun, 22 Aug 2021 16:49:23 GMT
server
nginx/1.19.10
host-header
c2hhcmVkLmJsdWVob3N0LmNvbQ==
content-length
665
content-type
text/html; charset=iso-8859-1
/
www.dtonomy.com/
0
0
Script
General
Full URL
https://www.dtonomy.com/?w3tc_minify=b68ea.js
Requested by
Host: www.dtonomy.com
URL: https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
162.241.218.22 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
box5528.bluehost.com
Software
nginx/1.19.10 /
Resource Hash

Request headers

:path
/?w3tc_minify=b68ea.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
www.dtonomy.com
referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sun, 22 Aug 2021 16:49:23 GMT
server
nginx/1.19.10
host-header
c2hhcmVkLmJsdWVob3N0LmNvbQ==
content-length
665
content-type
text/html; charset=iso-8859-1
5983116.js
js.hs-scripts.com/
0
0

/
www.dtonomy.com/
0
0

/
www.dtonomy.com/
0
0

/
www.dtonomy.com/
0
0
Script
General
Full URL
https://www.dtonomy.com/?w3tc_minify=06ec8.js
Requested by
Host: www.dtonomy.com
URL: https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
162.241.218.22 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
box5528.bluehost.com
Software
nginx/1.19.10 /
Resource Hash

Request headers

:path
/?w3tc_minify=06ec8.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
www.dtonomy.com
referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sun, 22 Aug 2021 16:49:23 GMT
server
nginx/1.19.10
host-header
c2hhcmVkLmJsdWVob3N0LmNvbQ==
content-length
665
content-type
text/html; charset=iso-8859-1
/
www.dtonomy.com/
0
0

/
www.dtonomy.com/
0
0
Script
General
Full URL
https://www.dtonomy.com/?w3tc_minify=b45c8.js
Requested by
Host: www.dtonomy.com
URL: https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
162.241.218.22 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
box5528.bluehost.com
Software
nginx/1.19.10 /
Resource Hash

Request headers

:path
/?w3tc_minify=b45c8.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
www.dtonomy.com
referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sun, 22 Aug 2021 16:49:23 GMT
server
nginx/1.19.10
host-header
c2hhcmVkLmJsdWVob3N0LmNvbQ==
content-length
665
content-type
text/html; charset=iso-8859-1
/
www.dtonomy.com/
0
0

/
www.dtonomy.com/
0
0
Script
General
Full URL
https://www.dtonomy.com/?w3tc_minify=d8d9f.js
Requested by
Host: www.dtonomy.com
URL: https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
162.241.218.22 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
box5528.bluehost.com
Software
nginx/1.19.10 /
Resource Hash

Request headers

:path
/?w3tc_minify=d8d9f.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
www.dtonomy.com
referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.dtonomy.com/tips-and-techniques-for-investigating-suspected-phishing-emails/?utm_medium=email&_hsmi=151533244&_hsenc=p2ANqtz-87dbLylKDqVeQVlW6lcmepSsIGa7-aDbTgQbyK7AfY9DYe4g2oXouPkjafqYjZZneL_3itRVX4CYT4phAn-KnLHO7oEg&utm_content=151533244&utm_source=hs_email
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sun, 22 Aug 2021 16:49:23 GMT
server
nginx/1.19.10
host-header
c2hhcmVkLmJsdWVob3N0LmNvbQ==
content-length
665
content-type
text/html; charset=iso-8859-1
/
www.dtonomy.com/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
www.dtonomy.com
URL
https://www.dtonomy.com/?w3tc_minify=a5ff7.css
Domain
www.dtonomy.com
URL
https://www.dtonomy.com/?w3tc_minify=97e64.css
Domain
www.dtonomy.com
URL
https://www.dtonomy.com/?w3tc_minify=7139d.css
Domain
www.dtonomy.com
URL
https://www.dtonomy.com/?w3tc_minify=48a74.css
Domain
www.dtonomy.com
URL
https://www.dtonomy.com/?w3tc_minify=5fbf9.css
Domain
www.dtonomy.com
URL
https://www.dtonomy.com/?w3tc_minify=8ef71.js
Domain
www.dtonomy.com
URL
https://www.dtonomy.com/wp-includes/js/wp-emoji-release.min.js?ver=5.8
Domain
www.dtonomy.com
URL
https://www.dtonomy.com/?w3tc_minify=b251d.css
Domain
js.hs-scripts.com
URL
https://js.hs-scripts.com/5983116.js?integration=WordPress
Domain
www.dtonomy.com
URL
https://www.dtonomy.com/?w3tc_minify=24235.js
Domain
www.dtonomy.com
URL
https://www.dtonomy.com/?w3tc_minify=ee4c4.js
Domain
www.dtonomy.com
URL
https://www.dtonomy.com/?w3tc_minify=0495a.js
Domain
www.dtonomy.com
URL
https://www.dtonomy.com/?w3tc_minify=9f110.js
Domain
www.dtonomy.com
URL
https://www.dtonomy.com/?w3tc_minify=1615d.js

Verdicts & Comments Add Verdict or Comment

14 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated string| gtm4wp_datalayer_name object| dataLayer object| _wpemojiSettings

0 Cookies

1 Console Messages

Source Level URL
Text
console-api debug URL: https://hq.t.hubspotemail.net/e2t/tc/VWrdfp8P34J5W5m8-r232MMQfW7-75Mp4ww3dbN8mSy5m3lHPfV1-WJV7CgSqsVKlhG480nt_SW24mPYw6B2-DMF4c4Sjx3mgYW2-F3KB9gcn1KW7R3yMG4nT3WyW4xxKY84nhc-MVPMByf12XDCfW3c_MfJ3QNgDDW2DLVLG1LkfdKW8CmFMb2_P_WQW33hCBh5tW_kKW34xhGh7Z13yGW4fGrF79889P9W757YGC8Bl9R0W1rPkTk1M6dP9W1KlrQ916F49zW6rH9dz5y1NkRW13mkY89cWJg2W3vwb4c8lxpk7VWfy_L5vtTRgVjPG3f6k1DLYW9hv-PX7VMW7SW5dnrmb5zlnHMW33x8Ll6SJlCrW8MlnkH8WsJ8nW8BVZv498cXp33gXq1(Line 13)
Message:
toS