URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Submission: On January 08 via manual from US

Summary

This website contacted 58 IPs in 8 countries across 40 domains to perform 262 HTTP transactions. The main IP is 85.13.148.62, located in Germany and belongs to NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE. The main domain is www.onlinewarnungen.de.
TLS certificate: Issued by Let's Encrypt Authority X3 on November 22nd 2019. Valid for: 3 months.
This is the only time www.onlinewarnungen.de was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
57 85.13.148.62 34788 (NMM-AS D)
20 2a00:1450:400... 15169 (GOOGLE)
8 2606:4700:20:... 13335 (CLOUDFLAR...)
3 95.100.197.157 16625 (AKAMAI-AS)
2 2a00:1450:400... 15169 (GOOGLE)
2 2001:4de0:ac1... 20446 (HIGHWINDS3)
1 4 2600:9000:215... 16509 (AMAZON-02)
1 23.210.248.226 16625 (AKAMAI-AS)
1 2 161.156.66.188 36351 (SOFTLAYER)
3 2a00:1450:400... 15169 (GOOGLE)
7 172.217.23.98 15169 (GOOGLE)
6 2a00:1450:400... 15169 (GOOGLE)
6 2a00:1450:400... 15169 (GOOGLE)
1 8 205.185.216.10 20446 (HIGHWINDS3)
1 104.99.234.34 16625 (AKAMAI-AS)
2 88.99.66.207 24940 (HETZNER-AS)
2 2a00:1450:400... 15169 (GOOGLE)
8 70.42.32.127 22075 (AS-OUTBRAIN)
1 2a02:6ea0:cf0... 60068 (CDN77)
1 2600:9000:21f... 16509 (AMAZON-02)
2 35.172.132.19 14618 (AMAZON-AES)
1 205.185.216.42 20446 (HIGHWINDS3)
2 151.101.14.2 54113 (FASTLY)
1 52.51.20.189 16509 (AMAZON-02)
5 52.48.67.153 16509 (AMAZON-02)
1 95.100.197.53 16625 (AKAMAI-AS)
1 2.18.232.7 16625 (AKAMAI-AS)
3 9 35.156.217.79 16509 (AMAZON-02)
1 95.101.206.43 16625 (AKAMAI-AS)
1 2a03:2880:f01... 32934 (FACEBOOK)
1 69.173.144.140 26667 (RUBICONPR...)
1 185.64.189.112 62713 (AS-PUBMATIC)
2 195.201.205.233 24940 (HETZNER-AS)
2 3 185.33.223.200 29990 (ASN-APPNEXUS)
6 2a00:1450:400... 15169 (GOOGLE)
1 63.33.176.23 16509 (AMAZON-02)
27 108.129.3.32 16509 (AMAZON-02)
7 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 3.124.138.137 16509 (AMAZON-02)
2 7 185.86.137.32 201081 (SMARTADSE...)
5 10 34.95.120.147 15169 (GOOGLE)
6 23.34.190.24 16625 (AKAMAI-AS)
6 2a00:1450:400... 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
1 18.200.166.248 16509 (AMAZON-02)
1 2a00:1288:f03... 10310 (YAHOO-1)
4 54.93.75.206 16509 (AMAZON-02)
2 95.100.197.246 16625 (AKAMAI-AS)
2 2a01:4a0:1338... 201011 (NETZBETRI...)
3 69.173.144.143 26667 (RUBICONPR...)
1 2a01:4f8:191:... 24940 (HETZNER-AS)
1 23.37.55.184 16625 (AKAMAI-AS)
1 95.100.196.250 16625 (AKAMAI-AS)
1 2 23.45.108.93 20940 (AKAMAI-ASN1)
1 2 185.86.139.89 201081 (SMARTADSE...)
5 5 216.58.207.66 15169 (GOOGLE)
1 2 52.59.77.252 16509 (AMAZON-02)
2 2 52.51.104.248 16509 (AMAZON-02)
2 2 37.157.2.239 198622 (ADFORM)
262 58
Apex Domain
Subdomains
Transfer
57 onlinewarnungen.de
www.onlinewarnungen.de
909 KB
29 inforsea.com
player.inforsea.com
call.inforsea.com
pixel.inforsea.com
113 KB
18 doubleclick.net
securepubads.g.doubleclick.net
googleads.g.doubleclick.net
cm.g.doubleclick.net
141 KB
15 googlesyndication.com
pagead2.googlesyndication.com
tpc.googlesyndication.com
385 KB
14 vi-serve.com
s.vi-serve.com
s404-1.vi-serve.com
vis.vi-serve.com
t.vi-serve.com
nv.vi-serve.com
166 KB
11 rubiconproject.com
fastlane.rubiconproject.com
video-ads.rubiconproject.com
optimized-by.rubiconproject.com
eus.rubiconproject.com
70 KB
11 360yield.com
ice.360yield.com
match.360yield.com
ad.360yield.com
6 KB
10 openx.net
videointelligence-d.openx.net
us-u.openx.net Failed
2 KB
9 smartadserver.com
www8.smartadserver.com
sync.smartadserver.com
rtb-csync.smartadserver.com
7 KB
9 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
3 KB
8 googleapis.com
fonts.googleapis.com
imasdk.googleapis.com
273 KB
8 cdntrf.com
cdntrf.com
cmp.cdntrf.com
183 KB
7 ampproject.org
cdn.ampproject.org
153 KB
7 google.com
adservice.google.com
www.google.com
1 KB
6 vidible.tv
acds.prod.vidible.tv
cdn-ssl.vidible.tv
trk.vidible.tv
119 KB
6 gstatic.com
fonts.gstatic.com
47 KB
5 googletagservices.com
www.googletagservices.com
140 KB
5 outbrain.com
widgets.outbrain.com
odb.outbrain.com
mv.outbrain.com
58 KB
4 glomex.com
player.glomex.com
15 KB
3 2mdn.net
s0.2mdn.net
31 KB
3 adnxs.com
ib.adnxs.com
acdn.adnxs.com Failed
secure.adnxs.com Failed
3 KB
3 teads.tv
a.teads.tv
sync.teads.tv
692 B
3 cheqzone.com
ob.cheqzone.com
obs.cheqzone.com
15 KB
3 plista.com
static.plista.com
farm.plista.com
22 KB
3 google.de
adservice.google.de
513 B
2 adform.net
track.adform.net
638 B
2 adsrvr.org
match.adsrvr.org
1 KB
2 sascdn.com
creatives.sascdn.com
756 B
2 moatads.com
z.moatads.com
px.moatads.com
44 KB
2 advertising.com
ads.adaptv.advertising.com
dtm.advertising.com Failed
1 KB
2 videoreach.com
a.videoreach.com
dmp.videoreach.com
847 B
2 pubmatic.com
hbopenbid.pubmatic.com
ads.pubmatic.com
121 B
2 google-analytics.com
www.google-analytics.com
18 KB
2 vgwort.de
ssl-vg03.met.vgwort.de
733 B
2 bootstrapcdn.com
netdna.bootstrapcdn.com
69 KB
1 facebook.com
an.facebook.com
1 KB
1 yieldlab.net
ad.yieldlab.net
770 B
1 casalemedia.com
as-sec.casalemedia.com
910 B
1 prebid.org
currency.prebid.org
2 KB
1 paypalobjects.com
www.paypalobjects.com
5 KB
262 40
Domain Requested by
57 www.onlinewarnungen.de www.onlinewarnungen.de
27 pixel.inforsea.com
10 videointelligence-d.openx.net 5 redirects
9 pagead2.googlesyndication.com www.onlinewarnungen.de
pagead2.googlesyndication.com
securepubads.g.doubleclick.net
8 log.outbrainimg.com widgets.outbrain.com
7 www8.smartadserver.com 2 redirects player.inforsea.com
7 cdn.ampproject.org securepubads.g.doubleclick.net
7 securepubads.g.doubleclick.net cdntrf.com
securepubads.g.doubleclick.net
www.onlinewarnungen.de
6 imasdk.googleapis.com player.inforsea.com
imasdk.googleapis.com
6 video-ads.rubiconproject.com player.inforsea.com
6 tpc.googlesyndication.com securepubads.g.doubleclick.net
www.onlinewarnungen.de
cdn.ampproject.org
6 ice.360yield.com 2 redirects www.onlinewarnungen.de
6 s.vi-serve.com 1 redirects www.onlinewarnungen.de
s.vi-serve.com
6 googleads.g.doubleclick.net pagead2.googlesyndication.com
6 fonts.gstatic.com pagead2.googlesyndication.com
www.onlinewarnungen.de
6 adservice.google.com pagead2.googlesyndication.com
imasdk.googleapis.com
5 cm.g.doubleclick.net 5 redirects
5 t.vi-serve.com www.onlinewarnungen.de
5 www.googletagservices.com pagead2.googlesyndication.com
securepubads.g.doubleclick.net
5 cmp.cdntrf.com cdntrf.com
cmp.cdntrf.com
4 trk.vidible.tv
4 player.glomex.com 1 redirects www.onlinewarnungen.de
player.glomex.com
3 ad.360yield.com 1 redirects
3 optimized-by.rubiconproject.com video-ads.rubiconproject.com
3 s0.2mdn.net imasdk.googleapis.com
3 ib.adnxs.com 2 redirects cdntrf.com
3 adservice.google.de pagead2.googlesyndication.com
3 widgets.outbrain.com www.onlinewarnungen.de
widgets.outbrain.com
3 cdntrf.com www.onlinewarnungen.de
cdntrf.com
2 track.adform.net 2 redirects
2 match.adsrvr.org 2 redirects
2 match.360yield.com 1 redirects
2 sync.teads.tv 1 redirects cdntrf.com
2 creatives.sascdn.com
2 ads.adaptv.advertising.com player.inforsea.com
cdn-ssl.vidible.tv
2 obs.cheqzone.com ob.cheqzone.com
www.onlinewarnungen.de
2 www.google-analytics.com www.onlinewarnungen.de
2 static.plista.com www.onlinewarnungen.de
static.plista.com
2 ssl-vg03.met.vgwort.de 1 redirects www.onlinewarnungen.de
2 netdna.bootstrapcdn.com www.onlinewarnungen.de
pagead2.googlesyndication.com
2 fonts.googleapis.com www.onlinewarnungen.de
1 rtb-csync.smartadserver.com
1 dmp.videoreach.com
1 sync.smartadserver.com 1 redirects
1 ads.pubmatic.com cdntrf.com
1 eus.rubiconproject.com cdntrf.com
1 farm.plista.com static.plista.com
1 px.moatads.com
1 z.moatads.com cdn-ssl.vidible.tv
1 cdn-ssl.vidible.tv acds.prod.vidible.tv
1 acds.prod.vidible.tv player.inforsea.com
1 www.google.com www.onlinewarnungen.de
1 call.inforsea.com player.inforsea.com
1 nv.vi-serve.com s.vi-serve.com
1 a.videoreach.com cdntrf.com
1 hbopenbid.pubmatic.com cdntrf.com
1 fastlane.rubiconproject.com cdntrf.com
1 an.facebook.com cdntrf.com
1 ad.yieldlab.net cdntrf.com
1 a.teads.tv cdntrf.com
1 as-sec.casalemedia.com cdntrf.com
1 mv.outbrain.com widgets.outbrain.com
1 vis.vi-serve.com s.vi-serve.com
1 odb.outbrain.com widgets.outbrain.com
1 player.inforsea.com s.vi-serve.com
1 s404-1.vi-serve.com www.onlinewarnungen.de
1 currency.prebid.org cdntrf.com
1 ob.cheqzone.com widgets.outbrain.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 www.paypalobjects.com www.onlinewarnungen.de
0 secure.adnxs.com Failed
0 acdn.adnxs.com Failed cdntrf.com
0 dtm.advertising.com Failed cdn-ssl.vidible.tv
0 us-u.openx.net Failed
262 74
Subject Issuer Validity Valid
onlinewarnungen.de
Let's Encrypt Authority X3
2019-11-22 -
2020-02-20
3 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-12-03 -
2020-02-25
3 months crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2019-11-20 -
2020-10-09
a year crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
*.storage.googleapis.com
GTS CA 1O1
2019-12-03 -
2020-02-25
3 months crt.sh
*.bootstrapcdn.com
Sectigo RSA Domain Validation Secure Server CA
2019-09-14 -
2020-10-13
a year crt.sh
*.glomex.com
Amazon
2019-05-08 -
2020-06-08
a year crt.sh
www.paypal.com
DigiCert SHA2 Extended Validation Server CA
2019-09-10 -
2020-08-18
a year crt.sh
*.met.vgwort.de
Thawte RSA CA 2018
2018-05-22 -
2020-03-25
2 years crt.sh
*.google.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.vi-serve.com
DigiCert SHA2 Secure Server CA
2019-06-18 -
2021-08-25
2 years crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
*.plista.com
COMODO RSA Domain Validation Secure Server CA
2017-04-11 -
2020-07-10
3 years crt.sh
*.google-analytics.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
ob.cheqzone.com
Let's Encrypt Authority X3
2019-12-24 -
2020-03-23
3 months crt.sh
*.prebid.org
Amazon
2019-09-27 -
2020-10-27
a year crt.sh
obs.cheqzone.com
Let's Encrypt Authority X3
2019-12-24 -
2020-03-23
3 months crt.sh
*.inforsea.com
DigiCert SHA2 Secure Server CA
2018-12-05 -
2020-02-07
a year crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-07-30 -
2020-07-25
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-07-17 -
2020-03-09
8 months crt.sh
teads.tv
Let's Encrypt Authority X3
2019-10-30 -
2020-01-28
3 months crt.sh
*.360yield.com
Amazon
2019-09-24 -
2020-10-24
a year crt.sh
*.yieldlab.net
DigiCert SHA2 Secure Server CA
2018-12-12 -
2020-03-12
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-12-06 -
2020-03-05
3 months crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
*.pubmatic.com
Sectigo RSA Organization Validation Secure Server CA
2019-02-22 -
2021-02-21
2 years crt.sh
videoreach.de
Let's Encrypt Authority X3
2019-11-29 -
2020-02-27
3 months crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2019-12-03 -
2020-02-25
3 months crt.sh
misc-sni.google.com
GTS CA 1O1
2019-12-03 -
2020-02-25
3 months crt.sh
www.google.com
GTS CA 1O1
2019-12-03 -
2020-02-25
3 months crt.sh
*.vssp.yahoo.com
DigiCert SHA2 High Assurance Server CA
2019-11-07 -
2020-05-05
6 months crt.sh
*.smartadserver.com
Thawte RSA CA 2018
2018-09-07 -
2020-02-17
a year crt.sh
*.openx.net
GeoTrust RSA CA 2018
2018-01-04 -
2020-07-09
3 years crt.sh
*.doubleclick.net
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
acds.prod.vidible.tv
DigiCert SHA2 High Assurance Server CA
2018-01-24 -
2021-01-28
3 years crt.sh
cdn-ycs.vidible.tv
DigiCert SHA2 High Assurance Server CA
2019-09-02 -
2020-02-29
6 months crt.sh
trk.vidible.tv
DigiCert SHA2 High Assurance Server CA
2018-02-21 -
2021-02-25
3 years crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-11-10 -
2020-02-09
a year crt.sh
*.sascdn.com
DigiCert SHA2 Secure Server CA
2019-10-17 -
2020-10-16
a year crt.sh

This page contains 27 frames:

Primary Page: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Frame ID: DB80B44250EE6D6D8EDE47A08CAE34C3
Requests: 199 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20200106/r20190131/zrt_lookup.html
Frame ID: 37D319CB0EA111D75D9EEE863EBA4DA9
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2610021889825704&output=html&adk=3826760629&adf=1341073466&lmt=1578502173&plat=0%3A32%2C1%3A32776%2C2%3A32776%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&ea=0&flash=0&pra=5&wgl=1&adsid=NT&dt=1578502173557&bpp=72&bdt=52&fdt=241&idt=241&shv=r20200106&cbv=r20190131&saldr=aa&abxe=1&nras=1&correlator=2430970769009&frm=20&pv=2&ga_vid=1346644779.1578502174&ga_sid=1578502174&ga_hid=1933471663&ga_fc=0&iag=0&icsg=148241973130&dssz=26&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=2804723033592515&rx=0&eae=2&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=0&uci=a!0&fsb=1&dtd=253
Frame ID: 58C2507C4EE56E7E766636ADDF8EE5E8
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2610021889825704&output=html&h=250&slotname=8875007275&adk=2511790096&adf=3126892548&w=300&lmt=1578502173&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&flash=0&wgl=1&adsid=NT&dt=1578502173673&bpp=51&bdt=168&fdt=202&idt=202&shv=r20200106&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0&nras=1&correlator=2430970769009&frm=20&pv=1&ga_vid=1346644779.1578502174&ga_sid=1578502174&ga_hid=1933471663&ga_fc=0&iag=0&icsg=44671858368680&dssz=30&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=988&ady=1854&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=2804723033592515&rx=0&eae=0&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=1&uci=a!1&btvi=1&fsb=1&xpc=c5eD19f7HS&p=https%3A//www.onlinewarnungen.de&dtd=206
Frame ID: EE42C5E140445822C44B15EC4500C074
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2610021889825704&output=html&h=250&slotname=8875007275&adk=2511790096&adf=3045014838&w=300&lmt=1578502173&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&flash=0&wgl=1&adsid=NT&dt=1578502173743&bpp=13&bdt=239&fdt=170&idt=171&shv=r20200106&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&nras=1&correlator=2430970769009&frm=20&pv=1&ga_vid=1346644779.1578502174&ga_sid=1578502174&ga_hid=1933471663&ga_fc=0&iag=0&icsg=44671858368680&dssz=32&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=988&ady=3304&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=2804723033592515&rx=0&eae=0&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&btvi=2&fsb=1&xpc=KieIv2dImb&p=https%3A//www.onlinewarnungen.de&dtd=175
Frame ID: B97A751091E025BF34065D24330E71BC
Requests: 1 HTTP requests in this frame

Frame: https://player.glomex.com/integration/1.207.0/iframe-player.html?integrationId=eexbs14jypxhqnf&playlistId=v-bvbbxi02hg8x&width=588&height=330&origin=glomex-player
Frame ID: 6A812E7DF016B910C2030E40584DCF95
Requests: 1 HTTP requests in this frame

Frame: https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Frame ID: 1FD084F6F9D796D6010BB1D0795247B0
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuBn1SxuLpB6rADpu8aiikuqEYVoV5icmtT8VgRJUsjNJlYom-emL22u6TOd4pjncGzCSp5SfmPk9X-Vv4PSyuYqgXo0fJ9NJpdDjLk8gvsmU2gLYhHTdVxCVKn70h7UAhd-QvT7oO60AGqR9VSVbRBS9Jn-Sdaqf7d8OnIw5JEwujPPtLBpALCCT7xRCEQ4AIDMCnEVFPIcpzvhgCZrubhDI32OopfthTCn48RsdkZcaNiiFiEVjFuhhq7tnXJbC-ftXMzlS6uNCXypQkjm8J1PxLa&sig=Cg0ArKJSzFidZLPCerznEAE&urlfix=1&adurl=
Frame ID: CE3996389B1814239B4CAF953EC621A2
Requests: 8 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Frame ID: 3F53E313C731FE4245DB732397C157CD
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssD7r2PkXjNVB_K03dmONvfm1sRV40LqmfW8rBf7eH_P63lxri6QCVUM-cwf_gl15hvtDQitZkReSjuaITjwKPw7UYyQL8wxfATU3zlnowgy8TWvTdDrWO4MieYlhztCNPaNGrOhqrLUMEMVdWtWsTr-5Q4I45rZKfQVuP4O1UAgNBd0k90mzmYGvINziwxQzpq9Ox4KRaTmTCcGZkrlFKKo2JLGsBumW_YtTTDOmAdGZrxliFcYVPe4nk494T5f075ucLthsBZuWVnthaPDVHHZrN6&sig=Cg0ArKJSzBUS8tNdukHAEAE&urlfix=1&adurl=
Frame ID: ECB821AC7A18B42C5123594AD462476D
Requests: 8 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/011912050130240/amp4ads-v0.js
Frame ID: 24DB5542E231FA613394C07B9761B0AE
Requests: 14 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 0AE345FE0AB478665470762A2B4BB905
Requests: 3 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2610021889825704&output=html&h=250&slotname=8539990066&adk=2572337104&adf=3173046724&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1578502176066&bpp=13&bdt=111&fdt=117&idt=117&shv=r20200106&cbv=r20190131&saldr=aa&correlator=2430970769009&frm=23&ife=4&pv=1&ga_vid=1346644779.1578502174&ga_sid=1578502176&ga_hid=139417971&ga_fc=0&iag=3&icsg=682&nhd=1&dssz=12&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=278&ady=1202&biw=1585&bih=1200&isw=300&ish=250&ifk=59370869&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=4492729583185787&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.n247d5uyxmpk&btvi=1&fsb=1&dtd=124
Frame ID: 28241EBA50363568D6E6FE7DC0995793
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2610021889825704&output=html&h=250&slotname=8506779597&adk=3419700416&adf=776186313&w=250&psa=0&guci=1.2.0.0.2.2.0.0&format=250x250&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1578502176086&bpp=5&bdt=114&fdt=132&idt=132&shv=r20200106&cbv=r20190131&saldr=aa&correlator=2430970769009&frm=23&ife=4&pv=1&ga_vid=1346644779.1578502174&ga_sid=1578502176&ga_hid=1674768030&ga_fc=0&iag=3&icsg=682&nhd=1&dssz=12&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=805&ady=12440&biw=1585&bih=1200&isw=238&ish=250&ifk=1621487864&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=593755614609074&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C238%2C250&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.54wjibfi386&btvi=1&fsb=1&dtd=136
Frame ID: 56EA832144B8650515246CD701767C24
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.355.4_en.html
Frame ID: 2D1D4E69EBF81DB5384353105A448732
Requests: 1 HTTP requests in this frame

Frame: https://acds.prod.vidible.tv/o2shim?companionId=&cpmPassback=&placementId=1240293&orgId=24831&injectCompanionDummy=&pauseOnClick=&d.vw=&d.app=&r=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&vrid=0dc35799-55d4-4b41-aa1f-b7fb4648b9fe&pblob=
Frame ID: FBE770537286E386F0D68F59F9266317
Requests: 9 HTTP requests in this frame

Frame: https://video-ads.rubiconproject.com/video/bridge-30735.js
Frame ID: 68FBAE4F45F14D5B0AFF560C945A7731
Requests: 2 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html
Frame ID: 059D5710E02CF6E035FC9C7E5AD27111
Requests: 1 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/showad.js
Frame ID: 0AFF6BEE5CEB2AB199DCA3F5BCB6DCF5
Requests: 1 HTTP requests in this frame

Frame: https://sync.teads.tv/iframe/redirect?hb_provider=prebid&hb_version=2.36.0-pre&gdprIab=%7B%22status%22:0%7D&
Frame ID: 30DFA28F474DEA250F307DC175C4BD7B
Requests: 1 HTTP requests in this frame

Frame: https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Frame ID: A117B5B826512761108E4180795F3AAD
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 870BA0E1020F6C03C543F6CD1DD5BE2B
Requests: 3 HTTP requests in this frame

Frame: https://video-ads.rubiconproject.com/video/bridge-30735.js
Frame ID: FFF23E5587CBFA2F2EC24E3D539D0157
Requests: 2 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.355.4_en.html
Frame ID: B13B66B06480ABAE40A9F7E562454DC4
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: 07C295BB79E989AB74BCC41D8B73E137
Requests: 3 HTTP requests in this frame

Frame: https://video-ads.rubiconproject.com/video/bridge-30735.js
Frame ID: FAF88D588B43AA1906E6C59C82B403C0
Requests: 2 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.355.4_en.html
Frame ID: F6BB19E97A03B09DE5EB170CF6440E4D
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • script /widgets\.outbrain\.com\/outbrain\.js/i

Page Statistics

262
Requests

97 %
HTTPS

33 %
IPv6

40
Domains

74
Subdomains

58
IPs

8
Countries

2996 kB
Transfer

7276 kB
Size

8
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 36
  • https://player.glomex.com/integration/1/glomex-player.js HTTP 302
  • https://player.glomex.com/integration/1.207.0/glomex-player.js
Request Chain 61
  • https://ssl-vg03.met.vgwort.de/na/4e292022a18f4b58987078e0fa6c8c4e HTTP 302
  • https://ssl-vg03.met.vgwort.de/blank.gif
Request Chain 104
  • https://s.vi-serve.com/publishers/617345935087486_onlinewarnungen.de.js HTTP 301
  • https://s404-1.vi-serve.com/publishers/default.js
Request Chain 123
  • https://ice.360yield.com/hb?jsonp=%7B%22bid_request%22%3A%7B%22secure%22%3A1%2C%22id%22%3A%2221c4e661bd8a48a%22%2C%22version%22%3A%225.2.0-JS-6.2.0%22%2C%22referrer%22%3A%22https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F%22%2C%22imp%22%3A%5B%7B%22id%22%3A%228fea591d4087ca%22%2C%22currency%22%3A%22EUR%22%2C%22pid%22%3A22094047%2C%22tid%22%3A%222bef7a25-704c-4be4-b1e4-d848c0af350e%22%2C%22banner%22%3A%7B%22format%22%3A%5B%7B%22w%22%3A336%2C%22h%22%3A280%7D%2C%7B%22w%22%3A300%2C%22h%22%3A250%7D%2C%7B%22w%22%3A1%2C%22h%22%3A1%7D%5D%7D%7D%5D%7D%7D HTTP 302
  • https://ice.360yield.com/ul_cb/hb?jsonp=%7B%22bid_request%22%3A%7B%22secure%22%3A1%2C%22id%22%3A%2221c4e661bd8a48a%22%2C%22version%22%3A%225.2.0-JS-6.2.0%22%2C%22referrer%22%3A%22https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F%22%2C%22imp%22%3A%5B%7B%22id%22%3A%228fea591d4087ca%22%2C%22currency%22%3A%22EUR%22%2C%22pid%22%3A22094047%2C%22tid%22%3A%222bef7a25-704c-4be4-b1e4-d848c0af350e%22%2C%22banner%22%3A%7B%22format%22%3A%5B%7B%22w%22%3A336%2C%22h%22%3A280%7D%2C%7B%22w%22%3A300%2C%22h%22%3A250%7D%2C%7B%22w%22%3A1%2C%22h%22%3A1%7D%5D%7D%7D%5D%7D%7D
Request Chain 175
  • https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502176133&pgDomain=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&gdpr=1&gdpr_consent=&vaf=0&vpaidt=js&vpaidv=1,2 HTTP 302
  • https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502176133&pgDomain=https%3a%2f%2fwww.onlinewarnungen.de%2fwarnungsticker%2fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2f&gdpr=1&gdpr_consent=&vaf=0&vpaidt=js&vpaidv=1%2c2&cklb=1
Request Chain 176
  • https://videointelligence-d.openx.net/v/1.0/av?auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1578502176133&vwd=494&vht=278&schain=1.0,1!vi.ai,617345935087486,1 HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
Request Chain 197
  • https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc HTTP 302
  • https://us-u.openx.net/w/1.0/sd?id=537072991&val=CAESEPJfA2NVmGtYaZzgnlHI_tU&google_cver=1
Request Chain 218
  • https://sync.teads.tv/iframe?hb_provider=prebid&hb_version=2.36.0-pre&gdprIab=%7B%22status%22%3A0%7D& HTTP 302
  • https://sync.teads.tv/iframe/redirect?hb_provider=prebid&hb_version=2.36.0-pre&gdprIab=%7B%22status%22:0%7D&
Request Chain 220
  • https://sync.smartadserver.com/getuid?url=https%3A%2F%2Fdmp.videoreach.com%2Fsync%2Fupdate%2F%3Fs%3Dsas%26sasid%3D[sas_uid]%26uuid%3D688471a0-4d3b-4dfa-8fb0-72fa57654030 HTTP 302
  • https://dmp.videoreach.com/sync/update/?s=sas&sasid=8529236688608573628&uuid=688471a0-4d3b-4dfa-8fb0-72fa57654030
Request Chain 221
  • https://cm.g.doubleclick.net/pixel?google_nid=improve_digital_eb&google_hm=nfr7x0iETLeJoWDTsKATxw&google_cm&publisher_dsp_id=340 HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=improve_digital_eb&google_hm=nfr7x0iETLeJoWDTsKATxw&google_cm=&publisher_dsp_id=340&google_tc= HTTP 302
  • https://match.360yield.com/match?publisher_dsp_id=340&google_gid=CAESEHTl3IDBB3yi5gSs7TG0tzc&google_cver=1 HTTP 302
  • https://match.360yield.com/ul_cb/match?publisher_dsp_id=340&google_gid=CAESEHTl3IDBB3yi5gSs7TG0tzc&google_cver=1
Request Chain 222
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=improve-digital&ttd_tpi=1&publisher_user_id=9dfafbc7-4884-4cb7-89a1-60d3b0a013c7&publisher_dsp_id=167&publisher_call_type=redirect&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA&publisher_redirecturl=https://ice.360yield.com/match HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=improve-digital&ttd_tpi=1&publisher_user_id=9dfafbc7-4884-4cb7-89a1-60d3b0a013c7&publisher_dsp_id=167&publisher_call_type=redirect&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA&publisher_redirecturl=https://ice.360yield.com/match HTTP 302
  • https://ad.360yield.com/match?publisher_dsp_id=167&external_user_id=62418e21-826e-4959-9539-0b929b8b2324
Request Chain 223
  • https://cm.g.doubleclick.net/pixel?google_nid=improvedigital&google_cm&google_sc&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=improvedigital&google_cm=&google_sc=&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA&google_tc= HTTP 302
  • https://ad.360yield.com/match?publisher_dsp_id=55&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA&external_user_id=CAESELf26hxXKo7OuuY3HX-H-fM&google_cver=1 HTTP 302
  • https://ad.360yield.com/ul_cb/match?publisher_dsp_id=55&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA&external_user_id=CAESELf26hxXKo7OuuY3HX-H-fM&google_cver=1
Request Chain 224
  • https://ib.adnxs.com/getuid?https://ice.360yield.com/match?external_user_id=$UID&publisher_dsp_id=40&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA HTTP 302
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fice.360yield.com%2Fmatch%3Fexternal_user_id%3D%24UID%26publisher_dsp_id%3D40%26gdpr%3D1%26gdpr_consent%3DBOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA HTTP 302
  • https://ice.360yield.com/match?external_user_id=8540796340330875199&publisher_dsp_id=40&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA HTTP 302
  • https://ice.360yield.com/ul_cb/match?external_user_id=8540796340330875199&publisher_dsp_id=40&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA
Request Chain 226
  • https://track.adform.net/serving/cookie/match/?party=5&publisher_user_id=9dfafbc7-4884-4cb7-89a1-60d3b0a013c7&publisher_dsp_id=42&publisher_call_type=redirect&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA&publisher_redirecturl=https://ice.360yield.com/match HTTP 302
  • https://track.adform.net/serving/cookie/match/?CC=1&party=5&publisher_user_id=9dfafbc7-4884-4cb7-89a1-60d3b0a013c7&publisher_dsp_id=42&publisher_call_type=redirect&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA&publisher_redirecturl=https://ice.360yield.com/match HTTP 302
  • https://ice.360yield.com/match?publisher_dsp_id=42&Expiration=1579711780&external_user_id=1964704384595627577
Request Chain 228
  • https://videointelligence-d.openx.net/v/1.0/av?auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1578502180462&vwd=494&vht=278&schain=1.0,1!vi.ai,617345935087486,1 HTTP 302
  • https://videointelligence-d.openx.net/v/1.0/av?cc=1&auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1578502180462&vwd=494&vht=278&schain=1.0,1!vi.ai,617345935087486,1
Request Chain 236
  • https://videointelligence-d.openx.net/v/1.0/av?cc=1&auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1578502180462&vwd=494&vht=278&schain=1.0,1!vi.ai,617345935087486,1 HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
Request Chain 240
  • https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc HTTP 302
  • https://us-u.openx.net/w/1.0/sd?id=537072991&val=CAESEGGRCzIhZNnK1BhJsHxxkns&google_cver=1
Request Chain 242
  • https://cm.g.doubleclick.net/pixel?google_nid=smartrtb_dbm&google_cm&google_sc HTTP 302
  • https://rtb-csync.smartadserver.com/redir/?partnerid=76&partneruserid=CAESEP7S3i3HGOVLSpJZElrBAvU&google_cver=1
Request Chain 247
  • https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502183788&pgDomain=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&gdpr=1&gdpr_consent=&vaf=0&vpaidt=js&vpaidv=1,2 HTTP 302
  • https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502183788&pgDomain=https%3a%2f%2fwww.onlinewarnungen.de%2fwarnungsticker%2fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2f&gdpr=1&gdpr_consent=&vaf=0&vpaidt=js&vpaidv=1%2c2&cklb=1
Request Chain 248
  • https://videointelligence-d.openx.net/v/1.0/av?auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1578502183788&vwd=494&vht=278&schain=1.0,1!vi.ai,617345935087486,1 HTTP 302
  • https://videointelligence-d.openx.net/v/1.0/av?cc=1&auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1578502183788&vwd=494&vht=278&schain=1.0,1!vi.ai,617345935087486,1
Request Chain 260
  • https://videointelligence-d.openx.net/v/1.0/av?cc=1&auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1578502183788&vwd=494&vht=278&schain=1.0,1!vi.ai,617345935087486,1 HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
Request Chain 262
  • https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm=&google_sc=&google_tc=

262 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
139 KB
36 KB
Document
General
Full URL
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
1659d000d4a1ed8b6519b6ebd5f72eb76071ac12399357926cd158b904770c94

Request headers

:method
GET
:authority
www.onlinewarnungen.de
:scheme
https
:path
/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Sec-Fetch-User
?1

Response headers

status
200
date
Wed, 08 Jan 2020 16:49:33 GMT
server
Apache
vary
Accept-Encoding,Cookie
cache-control
max-age=3, must-revalidate
content-encoding
gzip
content-length
36320
content-type
text/html; charset=UTF-8
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/
105 KB
37 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
66b0361f5842889aa456703d5764af62a511fc5149fdf83f033f21d6fde39019
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
37890
x-xss-protection
0
server
cafe
etag
15235979499334503267
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 08 Jan 2020 16:49:33 GMT
trf-onlinewarnungen.js
cdntrf.com/
113 KB
36 KB
Script
General
Full URL
https://cdntrf.com/trf-onlinewarnungen.js
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::681a:2de , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6335c927ff0363618cd4423c92f7e1425e7a19629872cd5e1fb10a4b677fb1c8

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
br
cf-cache-status
HIT
age
2856
status
200
x-amz-request-id
FC2D90CCE3F07C1E
x-amz-id-2
whz7+ppKrnqfRLoG0XyXzf/goEM8nOG2mDzMiKsF2K2pGGKIveQXUoUhEK9q7lAKXm4/NByZE5s=
last-modified
Fri, 06 Dec 2019 14:29:16 GMT
server
cloudflare
etag
W/"7dd6f5988ee4ceb73e2490014b682c9b"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=7200
x-amz-version-id
mpUfLu842attwphig39mgFNgGRokjOw6
cf-ray
551faa588cfbd6e5-FRA
cf-bgj
minify
outbrain.js
widgets.outbrain.com/
113 KB
38 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.197.157 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-197-157.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
ef74c7b03d6b8ca91565193fa590eff5cdf3d224121d7aeba751ead5b33ca8a4

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 08 Jan 2020 16:49:33 GMT
Content-Encoding
gzip
Last-Modified
Tue, 07 Jan 2020 08:11:23 GMT
Server
AkamaiNetStorage
ETag
"089928d498d9fb0e47580f66961cd8d4:1578387484"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=14400
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
38771
aalb_basics.css
www.onlinewarnungen.de/wp-content/plugins/amazon-associates-link-builder/css/
3 KB
1 KB
Stylesheet
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/amazon-associates-link-builder/css/aalb_basics.css?ver=1.4.8
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
8d0633de73047b349a1e74f26c83ef4b084ef98616b2a0bf21d79caa37daa879

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:35:24 GMT
server
Apache
etag
"a21-556ae5a6bebe2-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
972
styles.css
www.onlinewarnungen.de/wp-content/plugins/contact-form-7/includes/css/
2 KB
711 B
Stylesheet
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=4.8.1
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
e291f67dc3e643bfde7604e48a75e17298a3868ebc0c4554b9e8c17355fd6115

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:33:29 GMT
server
Apache
etag
"646-556ae538871f3-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
634
screen.min.css
www.onlinewarnungen.de/wp-content/plugins/table-of-contents-plus/
1 KB
533 B
Stylesheet
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/table-of-contents-plus/screen.min.css?ver=1509
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
2e36bd3bdbb929f427e79a6c84b7922b4375589386981eba29eb0cff57b02b1b

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Wed, 15 Jun 2016 09:58:23 GMT
server
Apache
etag
"484-5354e298590db-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
456
jquery.fancybox-1.3.4.min.css
www.onlinewarnungen.de/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/lightbox/static/fancybox/
7 KB
1 KB
Stylesheet
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/lightbox/static/fancybox/jquery.fancybox-1.3.4.min.css?ver=2.2.12
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
ce76314d302301953cb34b6c4e84d75c9896abbddb4199dbdccbbd6cac1b6e0b

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:38:29 GMT
server
Apache
etag
"1a84-556ae65726945-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
1441
wp-review.css
www.onlinewarnungen.de/wp-content/plugins/wp-review/assets/css/
17 KB
3 KB
Stylesheet
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/wp-review/assets/css/wp-review.css?ver=4.0.6
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
02caecd78c274f7ab6e8dc588efccaaa1b0e6d1a562b3c339fde58230c9c3063

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Sun, 11 Jun 2017 04:35:58 GMT
server
Apache
etag
"45af-551a7bd2cb648-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
3452
style.css
www.onlinewarnungen.de/wp-content/themes/mh-magazine/
84 KB
14 KB
Stylesheet
General
Full URL
https://www.onlinewarnungen.de/wp-content/themes/mh-magazine/style.css?ver=4.8.12
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
c9cfafb87e49bbb34af094c60221cf1490050f5c02bb06455e8d3449bfc87e28

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Sat, 14 Jan 2017 19:55:18 GMT
server
Apache
etag
"14f5e-54613546bb4f3-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
14546
font-awesome.min.css
www.onlinewarnungen.de/wp-content/themes/mh-magazine/includes/
26 KB
6 KB
Stylesheet
General
Full URL
https://www.onlinewarnungen.de/wp-content/themes/mh-magazine/includes/font-awesome.min.css
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
936ffccdc35bc55221e669d0e76034af76ba8c080c1b1149144dbbd3b5311829

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Tue, 14 Jun 2016 13:13:15 GMT
server
Apache
etag
"6857-5353cc48f93f9-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
6081
css
fonts.googleapis.com/
12 KB
889 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans:300,400,400italic,600,700
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
1ac2aecbb2d2d720d3d426c3da5336d6f7189ba2ccb8db482f8f3327a9228e2e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Wed, 08 Jan 2020 16:49:33 GMT
server
ESF
access-control-allow-origin
*
date
Wed, 08 Jan 2020 16:49:33 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:33 GMT
jquery.js
www.onlinewarnungen.de/wp-includes/js/jquery/
95 KB
33 KB
Script
General
Full URL
https://www.onlinewarnungen.de/wp-includes/js/jquery/jquery.js?ver=1.12.4
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
cf34e1b87bbfd9d9b185dec994924a496e279d8dc9387ad8d35bc0110134c4d3

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Thu, 05 Sep 2019 06:58:22 GMT
server
Apache
etag
"17a6a-591c8d8e8c164-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
33776
jquery-migrate.min.js
www.onlinewarnungen.de/wp-includes/js/jquery/
10 KB
4 KB
Script
General
Full URL
https://www.onlinewarnungen.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
48eb8b500ae6a38617b5738d2b3faec481922a7782246e31d2755c034a45cd5d

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Tue, 21 Jun 2016 17:46:14 GMT
server
Apache
etag
"2748-535cd65b70a48-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
4014
ajax.min.js
www.onlinewarnungen.de/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/ajax/static/
3 KB
1 KB
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/ajax/static/ajax.min.js?ver=2.2.12
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
2c0661e3cd1ab97302ef6b52f87e88c1f4febfcdf2f54939724900272bc8176a

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:38:29 GMT
server
Apache
etag
"a85-556ae657278e5-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
1068
scripts.js
www.onlinewarnungen.de/wp-content/themes/mh-magazine/js/
39 KB
12 KB
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/themes/mh-magazine/js/scripts.js?ver=4.8.12
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
5f681370dc686e2eb554c136e442455379573a48f33f0fcf1bfa9e48f2dc898f

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Tue, 14 Jun 2016 13:13:15 GMT
server
Apache
etag
"9c30-5353cc48fd279-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
12636
si_captcha.js
www.onlinewarnungen.de/wp-content/plugins/si-captcha-for-wordpress/captcha/
685 B
456 B
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/si-captcha-for-wordpress/captcha/si_captcha.js?ver=1578501315
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
c52d8ecaada50da7a9739ca285872b431fad51042eccf398e2c2ecad8013880b

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:32:40 GMT
server
Apache
etag
"2ad-556ae50a2df8a-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
380
wp-emoji-release.min.js
www.onlinewarnungen.de/wp-includes/js/
12 KB
4 KB
Script
General
Full URL
https://www.onlinewarnungen.de/wp-includes/js/wp-emoji-release.min.js?ver=4.8.12
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
dba6b80aceb1267fd1ed564e08a983730d272813e9b3aff85dc365c65333dd66

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Wed, 20 Sep 2017 01:44:45 GMT
server
Apache
etag
"2e8b-559951ed1318a-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
4323
shariff.min.css
www.onlinewarnungen.de/wp-content/plugins/e-recht24-share/css/
7 KB
2 KB
Stylesheet
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/e-recht24-share/css/shariff.min.css?ver=2.0.3
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
9f8e22b724bf2a74e7733265430e26901384aed088f1007e86d4283ca176d5eb

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Thu, 24 May 2018 19:30:34 GMT
server
Apache
etag
"1d2f-56cf8af691128-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
1588
box-shortcodes.css
www.onlinewarnungen.de/wp-content/plugins/shortcodes-ultimate/assets/css/
15 KB
3 KB
Stylesheet
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/shortcodes-ultimate/assets/css/box-shortcodes.css?ver=4.10.2
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
1a8d7b7df8aa7c6f5d5583b97d32a5f1711fb540219a17ec11f8383e3a12a77d

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:44:17 GMT
server
Apache
etag
"3a22-556ae7a321488-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
2763
other-shortcodes.css
www.onlinewarnungen.de/wp-content/plugins/shortcodes-ultimate/assets/css/
4 KB
939 B
Stylesheet
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/shortcodes-ultimate/assets/css/other-shortcodes.css?ver=4.10.2
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
46f90a846870882f31ac96c44fcdae6961a070342fd3bac40bfe52634d54a177

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:54:02 GMT
server
Apache
etag
"e07-556ae9d0b9644-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
862
font-awesome.min.css
netdna.bootstrapcdn.com/font-awesome/4.4.0/css/
26 KB
6 KB
Stylesheet
General
Full URL
https://netdna.bootstrapcdn.com/font-awesome/4.4.0/css/font-awesome.min.css?ver=4.4.0
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac19::1:b:3a , Netherlands, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
/
Resource Hash
936ffccdc35bc55221e669d0e76034af76ba8c080c1b1149144dbbd3b5311829

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Wed, 12 Dec 2018 18:35:19 GMT
access-control-allow-origin
*
etag
"1544639719"
vary
Accept-Encoding
x-cache
HIT
content-type
text/css; charset=utf-8
status
200
cache-control
public, max-age=31536000
x-hello-human
Say hello back! @getBootstrapCDN on Twitter
accept-ranges
bytes
timing-allow-origin
*
content-length
6079
content-shortcodes.css
www.onlinewarnungen.de/wp-content/plugins/shortcodes-ultimate/assets/css/
11 KB
2 KB
Stylesheet
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/shortcodes-ultimate/assets/css/content-shortcodes.css?ver=4.10.2
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
1b8f1eb63b17c6fc3dc6dba3b2a705865651bb48937adb8bc130d06ab91c5b86

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:44:17 GMT
server
Apache
etag
"2c2c-556ae7a321488-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
2235
galleries-shortcodes.css
www.onlinewarnungen.de/wp-content/plugins/shortcodes-ultimate/assets/css/
12 KB
2 KB
Stylesheet
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/shortcodes-ultimate/assets/css/galleries-shortcodes.css?ver=4.10.2
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
6e4604e8b5fc9fcccfcb88bd0179af60bca613803f1c1476a9d92622da9e4633

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:44:17 GMT
server
Apache
etag
"2e15-556ae7a321488-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
1620
Onlinewarnungen_Logo-Kopie.png
www.onlinewarnungen.de/wp-content/uploads/2016/07/
25 KB
25 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2016/07/Onlinewarnungen_Logo-Kopie.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
51e686181dd84105b5c2ffab8e814ef4fe27587cff1d7473f5c40d3a684531b2

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Thu, 14 Jul 2016 14:05:36 GMT
server
Apache
etag
"64d1-53798ff06f751"
content-type
image/png
status
200
accept-ranges
bytes
content-length
25809
Internetbetrug-melden-Banner.png
www.onlinewarnungen.de/wp-content/uploads/2016/10/
37 KB
38 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2016/10/Internetbetrug-melden-Banner.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
12347413ad17c7c2e45b01938dbd9597d68dd01cb080f3a1338dd9e87ea9a166

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Wed, 26 Oct 2016 15:08:56 GMT
server
Apache
etag
"9594-53fc600ff4592"
content-type
image/png
status
200
accept-ranges
bytes
content-length
38292
rss_icon.png
www.onlinewarnungen.de/wp-content/uploads/2016/10/
5 KB
5 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2016/10/rss_icon.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
aebad69efc516091cae70410e8d777a7b76180832b988d6d8e66365ef71ada4f

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Tue, 16 May 2017 08:16:30 GMT
server
Apache
etag
"14ce-54f9fc9f5eea9"
content-type
image/png
status
200
accept-ranges
bytes
content-length
5326
facebook-button-rund.png
www.onlinewarnungen.de/wp-content/uploads/2016/10/
4 KB
4 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2016/10/facebook-button-rund.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
50dc640f9d912f6bfddb4d91dc915efecd16c676482c673add4dc8586fb1b9b3

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Thu, 18 May 2017 18:40:03 GMT
server
Apache
etag
"e26-54fd0bba9090d"
content-type
image/png
status
200
accept-ranges
bytes
content-length
3622
twitter_icon.png
www.onlinewarnungen.de/wp-content/uploads/2016/10/
5 KB
5 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2016/10/twitter_icon.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
0972014f2d70b1a1cecb6a708ba33fd6f25782cdc87f953344815f581d33ed52

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Tue, 16 May 2017 08:16:28 GMT
server
Apache
etag
"132d-54f9fc9dcd8d5"
content-type
image/png
status
200
accept-ranges
bytes
content-length
4909
Symbolbild-Telefon-Handy-Smartphone-300x128.jpg
www.onlinewarnungen.de/wp-content/uploads/2019/03/
7 KB
7 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2019/03/Symbolbild-Telefon-Handy-Smartphone-300x128.jpg
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
fdefa6a2f3005d8a382e318c02117ae7bee603837622f796890092bd0e7c933a

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Wed, 27 Mar 2019 11:26:54 GMT
server
Apache
etag
"1ac0-58511b7041500"
content-type
image/jpeg
status
200
accept-ranges
bytes
content-length
6848
2019-11-12-Phishing-PayPal.png
www.onlinewarnungen.de/wp-content/uploads/2019/11/
42 KB
42 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2019/11/2019-11-12-Phishing-PayPal.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
9cc777cf786e9679f9de03b482b3e694cbd61ce0c0f9dd5f6bb2fd6d9ebf4ffa

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Tue, 12 Nov 2019 07:32:14 GMT
server
Apache
etag
"a7ab-597213f4734cf"
content-type
image/png
status
200
accept-ranges
bytes
content-length
42923
2019-08-11-PayPal-Fake-Mail-Bestaetigung-ZahlungStyleboom-Textilhandels-GmbH.png
www.onlinewarnungen.de/wp-content/uploads/2019/07/
19 KB
19 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2019/07/2019-08-11-PayPal-Fake-Mail-Bestaetigung-ZahlungStyleboom-Textilhandels-GmbH.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
15c72319818e82cfbdf576cd4e89133f965b0381f68974eae5147e76d501d6c0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Sun, 11 Aug 2019 11:34:26 GMT
server
Apache
etag
"4a5b-58fd5ca2ac2ac"
content-type
image/png
status
200
accept-ranges
bytes
content-length
19035
2019-10-27-Phishing-PayPal.png
www.onlinewarnungen.de/wp-content/uploads/2019/10/
44 KB
44 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2019/10/2019-10-27-Phishing-PayPal.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
3348bce4382f3e22689dca12a204fb1d6a6a0aa2f5983ca3d6d66c308d31d89f

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Sun, 27 Oct 2019 13:59:34 GMT
server
Apache
etag
"aed9-595e4cb0208bb"
content-type
image/png
status
200
accept-ranges
bytes
content-length
44761
2019-10-22-PayPal-Zahlungsbestaetigung-AFerry-Ltd.png
www.onlinewarnungen.de/wp-content/uploads/2019/10/
43 KB
43 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2019/10/2019-10-22-PayPal-Zahlungsbestaetigung-AFerry-Ltd.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
5f8150e72c84de8de6676aeea1c83124a405bcd73418713a4e9a879fe08a1d9f

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Tue, 22 Oct 2019 06:55:02 GMT
server
Apache
etag
"aa91-5957a478e8fa0"
content-type
image/png
status
200
accept-ranges
bytes
content-length
43665
2019-09-22-Spam-Mail-PayPal-Zahlung-an-Airbnb-Payments-UK-Limited.png
www.onlinewarnungen.de/wp-content/uploads/2019/09/
44 KB
44 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2019/09/2019-09-22-Spam-Mail-PayPal-Zahlung-an-Airbnb-Payments-UK-Limited.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
f142d7173c0b3b588f4899f091bd734f103724065584c22fc72a1320315c63ce

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Sun, 22 Sep 2019 17:57:26 GMT
server
Apache
etag
"af41-593280936a9a7"
content-type
image/png
status
200
accept-ranges
bytes
content-length
44865
2019-07-19-Phishing-PayPal-Sie-haben-eine-Zahlung-gesendet.png
www.onlinewarnungen.de/wp-content/uploads/2019/03/
95 KB
95 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2019/03/2019-07-19-Phishing-PayPal-Sie-haben-eine-Zahlung-gesendet.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
eecec7d6166fd68872737f46764117a5852f49036b98b602a9eb8542e6b994fa

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Fri, 19 Jul 2019 11:53:43 GMT
server
Apache
etag
"17a36-58e0760d02456"
content-type
image/png
status
200
accept-ranges
bytes
content-length
96822
2019-02-21-PayPal-Spam-Mail-Phishing-Bestaetigung-Ihrer-Zahlung-an-MediaMarkt-GmbH.png
www.onlinewarnungen.de/wp-content/uploads/2018/12/
43 KB
44 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2018/12/2019-02-21-PayPal-Spam-Mail-Phishing-Bestaetigung-Ihrer-Zahlung-an-MediaMarkt-GmbH.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
5dbddc80de01f2d697e228f2725e4ac67bb7d861a93127092fcddb601b300c77

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Thu, 21 Feb 2019 08:58:15 GMT
server
Apache
etag
"ad83-58263acbf585c"
content-type
image/png
status
200
accept-ranges
bytes
content-length
44419
glomex-player.js
player.glomex.com/integration/1.207.0/
Redirect Chain
  • https://player.glomex.com/integration/1/glomex-player.js
  • https://player.glomex.com/integration/1.207.0/glomex-player.js
5 KB
2 KB
Script
General
Full URL
https://player.glomex.com/integration/1.207.0/glomex-player.js
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:3800:2:3348:fcc0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
2ad46768590ea068cbbe72ab36363edbb5a29be8939ef43069fbad494680a2dc

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 11:38:32 GMT
content-encoding
gzip
last-modified
Wed, 08 Jan 2020 10:58:36 GMT
server
AmazonS3
x-amz-cf-pop
FRA50-C1
vary
Accept-Encoding
x-cache
RefreshHit from cloudfront
x-amz-version-id
X3YmKYvW812ecgmxoMIpeciE25ayeRcW
status
200
cache-control
max-age=31536000
content-type
application/javascript; charset=utf-8
x-amz-cf-id
R6Q0qkJaKUT8dgl7lfd-Qopw6nS0tt7hRyZSDVqiq2tB31MWDnXeZA==
via
1.1 9ab847fabb8c9edbd39cff57c2a2f4c0.cloudfront.net (CloudFront)

Redirect headers

date
Wed, 08 Jan 2020 16:49:33 GMT
via
1.1 9ab847fabb8c9edbd39cff57c2a2f4c0.cloudfront.net (CloudFront)
server
CloudFront
x-amz-cf-pop
FRA50-C1
location
/integration/1.207.0/glomex-player.js
x-cache
Miss from cloudfront
status
302
cache-control
max-age=600
access-control-allow-origin
*
content-length
0
x-amz-cf-id
V1YCFmQxu2HuW-nIF_K3xaaCvhJ73gW1M5TcBNGeym_mD2wuCKmAKQ==
Symbolbild-Paketzusteller-Postbote-300x128.jpg
www.onlinewarnungen.de/wp-content/uploads/2018/02/
6 KB
6 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2018/02/Symbolbild-Paketzusteller-Postbote-300x128.jpg
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
51ccf4925f7a01bfe288638aabf8047720d1962bbab56f7fbdb5f75d55604bfb

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Mon, 05 Feb 2018 15:50:32 GMT
server
Apache
etag
"18c1-5647905a9420c"
content-type
image/jpeg
status
200
accept-ranges
bytes
content-length
6337
Obstsalat-Symbolbild-300x200.jpg
www.onlinewarnungen.de/wp-content/uploads/2019/11/
20 KB
21 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2019/11/Obstsalat-Symbolbild-300x200.jpg
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
cc7643d6f7ed83de1caba9837ebc11b792fbf19fdf3d3e44f5720315c49a61dd

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Thu, 21 Nov 2019 21:43:10 GMT
server
Apache
etag
"5197-597e22efcaa9d"
content-type
image/jpeg
status
200
accept-ranges
bytes
content-length
20887
Symbolbild-Einkaufsgutschein-300x200.jpg
www.onlinewarnungen.de/wp-content/uploads/2019/11/
21 KB
21 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2019/11/Symbolbild-Einkaufsgutschein-300x200.jpg
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
0ddd5c44b1438604f1aedfdf954fe1a66319c6b6444bd3f3197bb27780085b71

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Mon, 18 Nov 2019 13:21:44 GMT
server
Apache
etag
"5394-5979ed42eeb93"
content-type
image/jpeg
status
200
accept-ranges
bytes
content-length
21396
Symbolbild-Onlinebanking-300x200.jpg
www.onlinewarnungen.de/wp-content/uploads/2019/11/
10 KB
10 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2019/11/Symbolbild-Onlinebanking-300x200.jpg
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
25916341663949dc37643d7914528dd33fb5bc0b5e60d6fdcc5e31311b127077

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Mon, 25 Nov 2019 08:05:45 GMT
server
Apache
etag
"284b-598273b0a8860"
content-type
image/jpeg
status
200
accept-ranges
bytes
content-length
10315
E-Scooter-Artikelbild-300x200.png
www.onlinewarnungen.de/wp-content/uploads/2020/01/
123 KB
124 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2020/01/E-Scooter-Artikelbild-300x200.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
7c62707a22c4aa84d415acee0080b6fde500587e8136e0e5909700532217f7db

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Thu, 02 Jan 2020 13:47:47 GMT
server
Apache
etag
"1eca5-59b28703dadd2"
content-type
image/png
status
200
accept-ranges
bytes
content-length
126117
Artikelbild-Silvester-300x200.png
www.onlinewarnungen.de/wp-content/uploads/2019/12/
105 KB
106 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2019/12/Artikelbild-Silvester-300x200.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
0a9f1b43033245db6d8a7bf9e738305ffdc5e06c04c1c121091e84eb7e6934df

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Tue, 31 Dec 2019 08:27:12 GMT
server
Apache
etag
"1a533-59afbba10fa40"
content-type
image/png
status
200
accept-ranges
bytes
content-length
107827
Symbolbild-Soziale-Netzwerke-Facebook-Twitter-300x200.jpg
www.onlinewarnungen.de/wp-content/uploads/2019/08/
15 KB
15 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2019/08/Symbolbild-Soziale-Netzwerke-Facebook-Twitter-300x200.jpg
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
cd13d6eb64d8bd783797e4e078a9f36978a6f8df89f862007ff6576771abe087

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Mon, 30 Dec 2019 13:27:35 GMT
server
Apache
etag
"3be9-59aebce7a7af6"
content-type
image/jpeg
status
200
accept-ranges
bytes
content-length
15337
wpua-96x96.png
www.onlinewarnungen.de/wp-content/plugins/wp-user-avatar/images/
2 KB
2 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/wp-user-avatar/images/wpua-96x96.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
c355aab05d3114f7aa4f7f256b62e9ce7169f48883227027630b53ff47068583

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Mon, 02 Jan 2017 05:56:30 GMT
server
Apache
etag
"95e-54516368b7ec2"
content-type
image/png
status
200
accept-ranges
bytes
content-length
2398
Logo_Allianz_fuer_Cyber-Sicherheit_Teilnehmer.jpg
www.onlinewarnungen.de/wp-content/uploads/2016/10/
13 KB
13 KB
Image
General
Full URL
https://www.onlinewarnungen.de/wp-content/uploads/2016/10/Logo_Allianz_fuer_Cyber-Sicherheit_Teilnehmer.jpg
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
5f787c55cee2e828f2c04702e79c0532d5f0278b230b489be6c6c86623c7ad2b

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Tue, 26 Feb 2019 08:37:10 GMT
server
Apache
etag
"33cc-582c7f6962dab"
content-type
image/jpeg
status
200
accept-ranges
bytes
content-length
13260
de-pp-logo-200px.png
www.paypalobjects.com/webstatic/de_DE/i/
5 KB
5 KB
Image
General
Full URL
https://www.paypalobjects.com/webstatic/de_DE/i/de-pp-logo-200px.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.210.248.226 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-248-226.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
9bdae15f518784758904f02eed3a7f2e0592794c4a4f1dc3e79a851fa107f70a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 08 Jan 2020 16:49:33 GMT
x-content-type-options
nosniff
last-modified
Wed, 09 Jul 2014 20:24:14 GMT
server
Apache
strict-transport-security
max-age=31536000
p3p
CP="NON DSP ADM DEV PSD OUR IND STP PHY PRE NAV UNI"
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-type
image/png
content-length
4743
expires
Wed, 08 Jan 2020 16:49:33 GMT
scripts.js
www.onlinewarnungen.de/wp-content/plugins/contact-form-7/includes/js/
13 KB
4 KB
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=4.8.1
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
782cb19eb10ee59950f853c883a86fde9b9e24acf2622ef7da4521101126543b

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:33:29 GMT
server
Apache
etag
"3592-556ae538871f3-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
3824
front.min.js
www.onlinewarnungen.de/wp-content/plugins/table-of-contents-plus/
6 KB
2 KB
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/table-of-contents-plus/front.min.js?ver=1509
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
4b179562b883c1257aabbad3a5641f965dd7331faa31fe06382a5d8c62d5ee19

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Wed, 15 Jun 2016 09:58:23 GMT
server
Apache
etag
"17cb-5354e2985813b-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
2349
common.min.js
www.onlinewarnungen.de/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/nextgen_gallery_display/static/
77 KB
22 KB
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/nextgen_gallery_display/static/common.min.js?ver=2.2.12
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
1ffebc78b21acad20eb8ed21ee78bb1fe24512543e802b7a9dbd35976b3665e2

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:38:29 GMT
server
Apache
etag
"1355f-556ae6573d0a5-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
22201
lightbox_context.min.js
www.onlinewarnungen.de/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/lightbox/static/
580 B
371 B
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/lightbox/static/lightbox_context.min.js?ver=2.2.12
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
8fefcb0fc84651f16eb03e3d75ba8a2a906d226c93b86ed3dbf18c90a5d4d7bb

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:38:29 GMT
server
Apache
etag
"244-556ae65726945-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
317
jquery.easing-1.3.pack.js
www.onlinewarnungen.de/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/lightbox/static/fancybox/
7 KB
2 KB
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/lightbox/static/fancybox/jquery.easing-1.3.pack.js?ver=2.2.12
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
9a7f76fdc1930049302dff8d3cb5e6e0cbfcf8feb6d1b1a06ef16a7445b05111

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:38:29 GMT
server
Apache
etag
"1a3d-556ae65726945-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
2193
jquery.fancybox-1.3.4.pack.js
www.onlinewarnungen.de/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/lightbox/static/fancybox/
15 KB
6 KB
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/lightbox/static/fancybox/jquery.fancybox-1.3.4.pack.js?ver=2.2.12
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
d84bac3710c2842dc8d5d5ae6e324007443cbd8ae26b909dd89bc2bdc31c8561

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:38:29 GMT
server
Apache
etag
"3d08-556ae65726945-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
5574
nextgen_fancybox_init.min.js
www.onlinewarnungen.de/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/lightbox/static/fancybox/
233 B
239 B
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/lightbox/static/fancybox/nextgen_fancybox_init.min.js?ver=2.2.12
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
9bb17af5ffce65f97d7130fa2b0e79c6111c855f2e686e0582bdfccbaaf25aef

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:38:29 GMT
server
Apache
etag
"e9-556ae65726945-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
186
main.js
www.onlinewarnungen.de/wp-content/plugins/wp-review/assets/js/
3 KB
1 KB
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/wp-review/assets/js/main.js?ver=4.0.6
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
b69681e019ab423995524ab6b15c9424c34e85167dfc7ee1b2ef3619c7677fe9

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Sun, 11 Jun 2017 04:35:58 GMT
server
Apache
etag
"cf1-551a7bd2cc5e8-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
1223
comment-reply.min.js
www.onlinewarnungen.de/wp-includes/js/
1 KB
666 B
Script
General
Full URL
https://www.onlinewarnungen.de/wp-includes/js/comment-reply.min.js?ver=4.8.12
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
1b1ca0f15010e0124bd4ca481404643c88f7eda1b276e9554d0ed83fb45b7e30

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Sat, 04 Jun 2016 17:46:31 GMT
server
Apache
etag
"436-534776b6e0a5a-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
589
wp-embed.min.js
www.onlinewarnungen.de/wp-includes/js/
1 KB
828 B
Script
General
Full URL
https://www.onlinewarnungen.de/wp-includes/js/wp-embed.min.js?ver=4.8.12
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
dcb5e540e62fc85857254a1066afb6a7e8999279c6d4c583eef855d39f9289c0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 23 Jan 2017 04:16:47 GMT
server
Apache
etag
"576-546bb44a022dc-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
751
star-input.js
www.onlinewarnungen.de/wp-content/plugins/wp-review/rating-types/
494 B
314 B
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/wp-review/rating-types/star-input.js?ver=4.8.12
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
8c92e119c20818bc19deec636f5d6c4e5e6e969b35f3247df919464cb7a7f111

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Sun, 11 Jun 2017 04:35:58 GMT
server
Apache
etag
"1ee-551a7bd2cc5e8-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
262
shariff.min.js
www.onlinewarnungen.de/wp-content/plugins/e-recht24-share/js/
1 KB
742 B
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/e-recht24-share/js/shariff.min.js?ver=2.0.3
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
66729888450cdd074bf40970ac299645f64fb7998be6aa2b98f1a0bbf2dc4b53

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Thu, 24 May 2018 19:30:34 GMT
server
Apache
etag
"5ff-56cf8af691128-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
688
shariff-popup.min.js
www.onlinewarnungen.de/wp-content/plugins/e-recht24-share/js/
607 B
460 B
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/e-recht24-share/js/shariff-popup.min.js?ver=2.0.3
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
afb47c50b95174f58d6895abe74ffaf17beaef598ffc024ff2fff1d575ebbce8

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Thu, 24 May 2018 19:30:34 GMT
server
Apache
etag
"25f-56cf8af691128-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
406
other-shortcodes.js
www.onlinewarnungen.de/wp-content/plugins/shortcodes-ultimate/assets/js/
7 KB
2 KB
Script
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/shortcodes-ultimate/assets/js/other-shortcodes.js?ver=4.10.2
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
8ddcb256e457bbe8112191b4b057574b320e66ec5e37e417c3a08780ce5e10c8

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Mon, 14 Aug 2017 03:44:17 GMT
server
Apache
etag
"1b04-556ae7a322428-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
2118
blank.gif
ssl-vg03.met.vgwort.de/
Redirect Chain
  • https://ssl-vg03.met.vgwort.de/na/4e292022a18f4b58987078e0fa6c8c4e
  • https://ssl-vg03.met.vgwort.de/blank.gif
43 B
310 B
Image
General
Full URL
https://ssl-vg03.met.vgwort.de/blank.gif
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
161.156.66.188 , United States, ASN36351 (SOFTLAYER - SoftLayer Technologies Inc., US),
Reverse DNS
bc.42.9ca1.ip4.static.sl-reverse.com
Software
s2.50.19 /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 08 Jan 2020 16:49:33 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
s2.50.19
Connection
keep-alive
Content-Length
43
Content-Type
image/gif

Redirect headers

Date
Wed, 08 Jan 2020 16:49:33 GMT
Last-Modified
Wed, 08 Jan 2020 16:49:33 GMT
Server
s2.50.19
Location
/blank.gif
Transfer-Encoding
chunked
Content-Type
text/html
Access-Control-Allow-Origin
*
Cache-Control
max-age=0, no-cache, must-revalidate, proxy-revalidate
Connection
keep-alive
Expires
Tue, 22 Aug 2000 15:05:01 GMT
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.onlinewarnungen.de
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.onlinewarnungen.de
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20200106/r20190131/
245 KB
89 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200106/r20190131/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
c4e6f0844019e3fbc787254589005b833b1379396b898662b8c0a8cd7920ff11
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
91029
x-xss-protection
0
server
cafe
etag
6870911772136061048
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Wed, 08 Jan 2020 16:49:33 GMT
index.js
cdntrf.com/lib/templates/
110 KB
21 KB
Script
General
Full URL
https://cdntrf.com/lib/templates/index.js
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/trf-onlinewarnungen.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::681a:2de , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e1ed17b0fc4bfcdff4cfadaef629a8b5c9f6b12ebc9bce28eaf7fe2836da23d9

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
br
cf-cache-status
HIT
age
4273
status
200
x-amz-request-id
65B3037B765C8E95
x-amz-id-2
Nvm5TXc4O/ERl7jN6I+LhXaW5yA6D0yjuV5ButFclmkrE4TSz2+m8Bz4glMszow0ZXbB6Heab9Y=
last-modified
Sat, 14 Dec 2019 11:14:39 GMT
server
cloudflare
etag
W/"2cc845fdb5319e52982666d39925198a"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
cache-control
max-age=7200
x-amz-version-id
k7HIEVUBu7Qtlv_jwxNdn2sW.88jqHJf
cf-ray
551faa592f1cd6e5-FRA
cf-bgj
minify
i.js
cmp.cdntrf.com/
225 KB
59 KB
Script
General
Full URL
https://cmp.cdntrf.com/i.js
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/trf-onlinewarnungen.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::681a:2de , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
053d194a738329de6fe292439f3cba39d62759d1e82732c45883a56ee11f7871

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
br
cf-cache-status
HIT
age
4245
cf-polished
origSize=230538
status
200
x-amz-request-id
F330EBCC82E6EA66
x-amz-id-2
HuS7h7LhLMWRecdmuwXwOWVkMWsoEVPds1fWw3s42nryqLMVMfdUOcswttrnsgYy69bqAyCZtCQ=
last-modified
Tue, 26 Nov 2019 05:32:59 GMT
server
cloudflare
etag
W/"bffc4de02a5604dbfb868a836ac1f49e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
cache-control
max-age=7200
x-amz-version-id
7A3tmE9jf6_pFoAbVMYDGn4YNX26cwgQ
cf-ray
551faa592f21d6e5-FRA
cf-bgj
minify
layout.css
cmp.cdntrf.com/
4 KB
1 KB
Stylesheet
General
Full URL
https://cmp.cdntrf.com/layout.css
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/trf-onlinewarnungen.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::681a:2de , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f5a4205b2ca5b47b2852492ec422c8512308fe47b4f693f9de24774b5ca3ce87

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
br
cf-cache-status
HIT
age
3332
status
200
x-amz-request-id
2AFE3AC84D5DF84A
x-amz-id-2
Eu9WZm2mscNz0U9/HR0YQdzZFpwDKopIrCzuSCfUouGiGYVJG/owPAtcPHdNDVHADKo25AqcTAA=
last-modified
Tue, 26 Nov 2019 05:33:04 GMT
server
cloudflare
etag
W/"ceadb82bcc57fe05e8b89fc1767430d6"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=7200
x-amz-version-id
1Z53Aec6vELQr9KCUmdkdDeemmRo0aaK
cf-ray
551faa58de16d6e5-FRA
cmp.css
cmp.cdntrf.com/4150/onlinewarnungen.de/
4 KB
1 KB
Stylesheet
General
Full URL
https://cmp.cdntrf.com/4150/onlinewarnungen.de/cmp.css
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/trf-onlinewarnungen.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::681a:2de , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c45110dc6c675e36826155b1f2eb475b2197da109ac61f773e4ecc90f690586b

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
br
cf-cache-status
HIT
age
3638
status
200
x-amz-request-id
0DCF80BBF29442D2
x-amz-id-2
deLoBqnNN0Gv1lCbGYd19NWxW20GNQJZok8dYdeEQc8F2JxYqfKxIk4F7uefNHYGOKaY5DdjzUQ=
last-modified
Fri, 15 Feb 2019 08:18:23 GMT
server
cloudflare
etag
W/"eeba2c40e187554fd04131d572111df7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=7200
x-amz-version-id
rhDKpl6wcBm8eyVRbPD7eq4qO1pHggfu
cf-ray
551faa58de12d6e5-FRA
x-amz-meta-originalfilename
cmp.css
gpt.js
securepubads.g.doubleclick.net/tag/js/
52 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/trf-onlinewarnungen.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
sffe /
Resource Hash
351ced9446abadebbea6900413664841aede0b85f2e1d028b757a7703097eb46
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"391 / 633 of 1000 / last-modified: 1578434528"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
15918
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:33 GMT
css
fonts.googleapis.com/
2 KB
545 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
e5b09ae4f391ccd8e04977e2330f1e533a2a507d95c609a3fd437a7ffc7cddfa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Wed, 08 Jan 2020 16:49:33 GMT
server
ESF
access-control-allow-origin
*
date
Wed, 08 Jan 2020 16:49:33 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:33 GMT
mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
54c64f3c66372027154f01fc9f24b4e25fdfe405b70d1994c79abbc2576ff775
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300,400,400italic,600,700
Origin
https://www.onlinewarnungen.de

Response headers

date
Thu, 21 Nov 2019 17:13:27 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:49 GMT
server
sffe
age
4145766
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
9132
x-xss-protection
0
expires
Fri, 20 Nov 2020 17:13:27 GMT
fontawesome-webfont.woff2
netdna.bootstrapcdn.com/font-awesome/4.4.0/fonts/
63 KB
63 KB
Font
General
Full URL
https://netdna.bootstrapcdn.com/font-awesome/4.4.0/fonts/fontawesome-webfont.woff2?v=4.4.0
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac19::1:b:3a , Netherlands, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
/
Resource Hash
3c4a1bb7ce3234407184f0d80cc4dec075e4ad616b44dcc5778e1cfb1bc24019

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://netdna.bootstrapcdn.com/font-awesome/4.4.0/css/font-awesome.min.css?ver=4.4.0
Origin
https://www.onlinewarnungen.de

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
last-modified
Wed, 12 Dec 2018 18:36:18 GMT
access-control-allow-origin
*
etag
"1544639778"
vary
Accept-Encoding
x-cache
HIT
content-type
font/woff2
status
200
cache-control
public, max-age=31536000
x-hello-human
Say hello back! @getBootstrapCDN on Twitter
accept-ranges
bytes
timing-allow-origin
*
content-length
64470
mem5YaGs126MiZpBA-UN7rgOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN7rgOUuhpKKSTjw.woff2
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
a48a6e4b14fe55f750c0a3dfb5a6f4941bdc06af0aa542b90de25c30c2b4625c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300,400,400italic,600,700
Origin
https://www.onlinewarnungen.de

Response headers

date
Thu, 21 Nov 2019 07:12:32 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:31:11 GMT
server
sffe
age
4181821
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
9080
x-xss-protection
0
expires
Fri, 20 Nov 2020 07:12:32 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20200106/r20190131/ Frame 37D3
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20200106/r20190131/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20200106/r20190131/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Mon, 06 Jan 2020 15:49:43 GMT
expires
Mon, 20 Jan 2020 15:49:43 GMT
content-type
text/html; charset=UTF-8
etag
14586270735327668295
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
6570
x-xss-protection
0
cache-control
public, max-age=1209600
age
176390
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
tagLoader.js
s.vi-serve.com/
1 KB
888 B
Script
General
Full URL
https://s.vi-serve.com/tagLoader.js
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
4872888105238016fa734b451219676ae7389a2168b96465846d52bd41e40a5c

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
status
200
access-control-allow-methods
GET,POST
x-trans-id
tx925e9809f51e46b38af83-005cabd7a7
accept-ranges
bytes
last-modified
Wed, 06 Mar 2019 14:01:05 GMT
etag
5c5f4f40e1bc59a7ca6c8c40be11ebb9
access-control-max-age
86400
x-hw
1578502173.dop008.wa1.t,1578502173.cds003.wa1.hn,1578502173.cds001.wa1.c
content-type
application/javascript
access-control-allow-origin
*
x-timestamp
1551880864.23222
cache-control
max-age=300, must-revalidate
access-control-allow-credentials
false
content-length
508
access-control-allow-headers
*
mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
b8e23a845bc6b7fd417d29182e0e38d353e64b5e12e06bb1de2b5ce063db1dcc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300,400,400italic,600,700
Origin
https://www.onlinewarnungen.de

Response headers

date
Thu, 21 Nov 2019 07:11:58 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:44 GMT
server
sffe
age
4181855
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
9180
x-xss-protection
0
expires
Fri, 20 Nov 2020 07:11:58 GMT
mem8YaGs126MiZpBA-UFW50bf8pkAp6a.woff2
fonts.gstatic.com/s/opensans/v17/
7 KB
7 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem8YaGs126MiZpBA-UFW50bf8pkAp6a.woff2
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
6446b6826bb6136c8782e74d99a2ea78cc9cb508cf61f4020fee5415f108c7e1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300,400,400italic,600,700
Origin
https://www.onlinewarnungen.de

Response headers

date
Wed, 20 Nov 2019 18:54:23 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:53 GMT
server
sffe
age
4226110
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
7292
x-xss-protection
0
expires
Thu, 19 Nov 2020 18:54:23 GMT
mem8YaGs126MiZpBA-UFUZ0bf8pkAp6a.woff2
fonts.gstatic.com/s/opensans/v17/
5 KB
6 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem8YaGs126MiZpBA-UFUZ0bf8pkAp6a.woff2
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
a017bfd8b7ff27e2fa869cb6beeacfd550ab2fa4955429bc460aeae8ddbf91e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300,400,400italic,600,700
Origin
https://www.onlinewarnungen.de

Response headers

date
Thu, 21 Nov 2019 04:29:48 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:48 GMT
server
sffe
age
4191585
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
5608
x-xss-protection
0
expires
Fri, 20 Nov 2020 04:29:48 GMT
default-config.json
cmp.cdntrf.com/
271 B
750 B
Fetch
General
Full URL
https://cmp.cdntrf.com/default-config.json
Requested by
Host: cmp.cdntrf.com
URL: https://cmp.cdntrf.com/i.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::681a:2de , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b1528042d323168311e6ff58660a9cc10886ba92d1868a97c3f5c661dc689e41

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
br
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method
cf-cache-status
DYNAMIC
x-amz-request-id
5915C37096C57084
cf-ray
551faa5a4926d725-FRA
status
200
x-amz-id-2
9S40ucTh53ovHSKrFf5s5RZQIArMJ8kMAZlMCBO2/RV/SoRYggFg6JaJD4c+OnW4fPpBG3DIVXI=
last-modified
Thu, 11 Oct 2018 06:05:36 GMT
server
cloudflare
etag
W/"a32b361adb45a6cbe33b3ff5e1dba217"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3000
access-control-allow-methods
GET
x-amz-version-id
gYhVT6k_bNn5Nntn1iBYNQnPRVvd3LMJ
access-control-allow-origin
*
content-type
application/json
domain-config.json
cmp.cdntrf.com/4150/onlinewarnungen.de/
2 KB
1 KB
Fetch
General
Full URL
https://cmp.cdntrf.com/4150/onlinewarnungen.de/domain-config.json
Requested by
Host: cmp.cdntrf.com
URL: https://cmp.cdntrf.com/i.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::681a:2de , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
11e5f6867c20a8d58320922a4b95cc0f67c9d35417db4ffe4afca9fd5efda2cd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
br
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method
cf-cache-status
DYNAMIC
x-amz-request-id
BBC4AB77B4CFDBD2
cf-ray
551faa5a4928d725-FRA
status
200
x-amz-id-2
OMRSUXzyvuJgMJZkd8t3J5WMcWdDfI49lXqy5W3hfNwP1BnSZP0ejtyV62SQimUzNTE5Yw/4vUE=
last-modified
Fri, 15 Feb 2019 08:18:23 GMT
server
cloudflare
etag
W/"f20a45430af58312c92d968dc021096c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3000
access-control-allow-methods
GET
x-amz-version-id
bcMmDlHgKGtTiEO22XpoDOmqXXFJstho
access-control-allow-origin
*
content-type
application/json
x-amz-meta-originalfilename
domain-config.json
mem5YaGs126MiZpBA-UN7rgOXOhpKKSTj5PW.woff2
fonts.gstatic.com/s/opensans/v17/
7 KB
7 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN7rgOXOhpKKSTj5PW.woff2
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
35327bcecf226f1e75d221cf9b537d5d8a127dd1e38298cc4596bcf638f6071a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300,400,400italic,600,700
Origin
https://www.onlinewarnungen.de

Response headers

date
Wed, 20 Nov 2019 19:13:48 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:50 GMT
server
sffe
age
4224945
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
7208
x-xss-protection
0
expires
Thu, 19 Nov 2020 19:13:48 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 58C2
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2610021889825704&output=html&adk=3826760629&adf=1341073466&lmt=1578502173&plat=0%3A32%2C1%3A32776%2C2%3A32776%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&ea=0&flash=0&pra=5&wgl=1&adsid=NT&dt=1578502173557&bpp=72&bdt=52&fdt=241&idt=241&shv=r20200106&cbv=r20190131&saldr=aa&abxe=1&nras=1&correlator=2430970769009&frm=20&pv=2&ga_vid=1346644779.1578502174&ga_sid=1578502174&ga_hid=1933471663&ga_fc=0&iag=0&icsg=148241973130&dssz=26&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=2804723033592515&rx=0&eae=2&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=0&uci=a!0&fsb=1&dtd=253
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200106/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-2610021889825704&output=html&adk=3826760629&adf=1341073466&lmt=1578502173&plat=0%3A32%2C1%3A32776%2C2%3A32776%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&ea=0&flash=0&pra=5&wgl=1&adsid=NT&dt=1578502173557&bpp=72&bdt=52&fdt=241&idt=241&shv=r20200106&cbv=r20190131&saldr=aa&abxe=1&nras=1&correlator=2430970769009&frm=20&pv=2&ga_vid=1346644779.1578502174&ga_sid=1578502174&ga_hid=1933471663&ga_fc=0&iag=0&icsg=148241973130&dssz=26&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=2804723033592515&rx=0&eae=2&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=0&uci=a!0&fsb=1&dtd=253
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 08 Jan 2020 16:49:33 GMT
server
cafe
content-length
44
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Wed, 08-Jan-2020 17:04:33 GMT; path=/; domain=.doubleclick.net
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
expires
Wed, 08 Jan 2020 16:49:33 GMT
cache-control
private
osd.js
www.googletagservices.com/activeview/js/current/
76 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200106/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
482be4cb0a6b75d6e67bf57c9f04660bf7010afbe3d6fb44b56e5885cb72ea6f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1578313968550048"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28663
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:33 GMT
glomex-player.b4c12214.js
player.glomex.com/integration/1.207.0/
40 KB
12 KB
Script
General
Full URL
https://player.glomex.com/integration/1.207.0/glomex-player.b4c12214.js
Requested by
Host: player.glomex.com
URL: https://player.glomex.com/integration/1.207.0/glomex-player.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:3800:2:3348:fcc0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a39a640f29cb919c791f2ea4251bf603d19e3720b90a528f1ab4d3266e29456d

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 11:38:33 GMT
content-encoding
gzip
last-modified
Wed, 08 Jan 2020 10:58:35 GMT
server
AmazonS3
x-amz-cf-pop
FRA50-C1
vary
Accept-Encoding
x-cache
RefreshHit from cloudfront
x-amz-version-id
i_wLifflgglE1hvGXKUkaahpWwoEzzH_
status
200
cache-control
max-age=31536000
content-type
application/javascript; charset=utf-8
x-amz-cf-id
rrSUQ5O_2ankGPQD5JbPngtDk-8YW3B5QPG_SKB7bJ_UCxvlxEpWBg==
via
1.1 9ab847fabb8c9edbd39cff57c2a2f4c0.cloudfront.net (CloudFront)
font-icons.woff
www.onlinewarnungen.de/wp-content/plugins/wp-review/assets/fonts/
3 KB
3 KB
Font
General
Full URL
https://www.onlinewarnungen.de/wp-content/plugins/wp-review/assets/fonts/font-icons.woff
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
d075970d07bf4f5152cff1fd11f5161b50313cb8570cf11375b5558e70e33f9a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/wp-content/plugins/wp-review/assets/css/wp-review.css?ver=4.0.6
Origin
https://www.onlinewarnungen.de

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
last-modified
Sun, 11 Jun 2017 04:35:58 GMT
server
Apache
etag
"b38-551a7bd2cb648"
content-type
application/font-woff
status
200
accept-ranges
bytes
content-length
2872
pubads_impl_2020010201.js
securepubads.g.doubleclick.net/gpt/
167 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010201.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
sffe /
Resource Hash
5481253979bbdc7be2309e36097180b9b57e91f7483afe804e1af7aa37ffb2fe
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 02 Jan 2020 19:56:18 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
62189
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:33 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame EE42
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2610021889825704&output=html&h=250&slotname=8875007275&adk=2511790096&adf=3126892548&w=300&lmt=1578502173&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&flash=0&wgl=1&adsid=NT&dt=1578502173673&bpp=51&bdt=168&fdt=202&idt=202&shv=r20200106&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0&nras=1&correlator=2430970769009&frm=20&pv=1&ga_vid=1346644779.1578502174&ga_sid=1578502174&ga_hid=1933471663&ga_fc=0&iag=0&icsg=44671858368680&dssz=30&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=988&ady=1854&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=2804723033592515&rx=0&eae=0&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=1&uci=a!1&btvi=1&fsb=1&xpc=c5eD19f7HS&p=https%3A//www.onlinewarnungen.de&dtd=206
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200106/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-2610021889825704&output=html&h=250&slotname=8875007275&adk=2511790096&adf=3126892548&w=300&lmt=1578502173&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&flash=0&wgl=1&adsid=NT&dt=1578502173673&bpp=51&bdt=168&fdt=202&idt=202&shv=r20200106&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0&nras=1&correlator=2430970769009&frm=20&pv=1&ga_vid=1346644779.1578502174&ga_sid=1578502174&ga_hid=1933471663&ga_fc=0&iag=0&icsg=44671858368680&dssz=30&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=988&ady=1854&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=2804723033592515&rx=0&eae=0&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=1&uci=a!1&btvi=1&fsb=1&xpc=c5eD19f7HS&p=https%3A//www.onlinewarnungen.de&dtd=206
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
accept-encoding
gzip, deflate, br
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 08 Jan 2020 16:49:34 GMT
server
cafe
content-length
6181
x-xss-protection
0
set-cookie
IDE=AHWqTUmoLcbYUIWM6Kvm9tcve9XiQYPO3aad94EVMZNjaFPqRd-itfn8ixTSBP9V; expires=Mon, 01-Feb-2021 16:49:33 GMT; path=/; domain=.doubleclick.net; HttpOnly test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
expires
Wed, 08 Jan 2020 16:49:34 GMT
cache-control
private
d3d3Lm9ubGluZXdhcm51bmdlbi5kZQ==
tcheck.outbrainimg.com/tcheck/check/
15 B
475 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/d3d3Lm9ubGluZXdhcm51bmdlbi5kZQ==
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.99.234.34 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-99-234-34.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
39d160e97e2bea07b0cf1c647259ffa4f0bd07069dba4e6c19a22d38b408510f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"f-ayLlCL3PuzXSThdu78iReSEjl6Y"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=15690
Date
Wed, 08 Jan 2020 16:49:33 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
15
Expires
Wed, 08 Jan 2020 21:11:03 GMT
async.js
static.plista.com/
62 KB
17 KB
Script
General
Full URL
https://static.plista.com/async.js
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
88.99.66.207 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.207.66.99.88.clients.your-server.de
Software
nginx /
Resource Hash
18eb8ae0d8291d70385b733db4f6fc463c40e2f86a368d5c70daa73bc78c1939
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-plista-versions
plista-plugin- libplista-php-0.0.0
date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-plista-node
plista855
age
129
status
200
content-length
16643
last-modified
Wed, 08 Jan 2020 16:47:23 GMT
server
nginx
vary
Accept-Encoding
x-varnish
1071821496 1071729112
via
1.1 varnish-v4
cache-control
public, must-revalidate, proxy-revalidate
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
expires
Thu, 09 Jan 2020 16:47:24 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame B97A
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2610021889825704&output=html&h=250&slotname=8875007275&adk=2511790096&adf=3045014838&w=300&lmt=1578502173&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&flash=0&wgl=1&adsid=NT&dt=1578502173743&bpp=13&bdt=239&fdt=170&idt=171&shv=r20200106&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&nras=1&correlator=2430970769009&frm=20&pv=1&ga_vid=1346644779.1578502174&ga_sid=1578502174&ga_hid=1933471663&ga_fc=0&iag=0&icsg=44671858368680&dssz=32&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=988&ady=3304&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=2804723033592515&rx=0&eae=0&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&btvi=2&fsb=1&xpc=KieIv2dImb&p=https%3A//www.onlinewarnungen.de&dtd=175
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200106/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-2610021889825704&output=html&h=250&slotname=8875007275&adk=2511790096&adf=3045014838&w=300&lmt=1578502173&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&flash=0&wgl=1&adsid=NT&dt=1578502173743&bpp=13&bdt=239&fdt=170&idt=171&shv=r20200106&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0%2C300x250&nras=1&correlator=2430970769009&frm=20&pv=1&ga_vid=1346644779.1578502174&ga_sid=1578502174&ga_hid=1933471663&ga_fc=0&iag=0&icsg=44671858368680&dssz=32&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=988&ady=3304&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=2804723033592515&rx=0&eae=0&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&btvi=2&fsb=1&xpc=KieIv2dImb&p=https%3A//www.onlinewarnungen.de&dtd=175
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
accept-encoding
gzip, deflate, br
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 08 Jan 2020 16:49:34 GMT
server
cafe
content-length
199
x-xss-protection
0
set-cookie
IDE=AHWqTUmT5lJ3Ki2_Kw7BH_NfUDIQ1jGa1WXO_6GEwyBdgeq7tEl-Sot0psNhUhQF; expires=Mon, 01-Feb-2021 16:49:33 GMT; path=/; domain=.doubleclick.net; HttpOnly test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
expires
Wed, 08 Jan 2020 16:49:34 GMT
cache-control
private
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
4279
date
Wed, 08 Jan 2020 15:38:14 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Wed, 08 Jan 2020 17:38:14 GMT
prebid-stg.js
cdntrf.com/
211 KB
63 KB
Script
General
Full URL
https://cdntrf.com/prebid-stg.js
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/trf-onlinewarnungen.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::681a:2de , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
634730e4b458e37022b3d22014a4707dd21406cc2831b608f0f42fc6037bc8c2

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:33 GMT
content-encoding
br
cf-cache-status
HIT
age
4273
cf-polished
origSize=216250
status
200
x-amz-request-id
0ABE3B1CF309AE55
x-amz-id-2
dTJA51Dx+kVU49NPD0wd3Z66czwy/USh5uWXGRMesauaP+3j1o6SJvtHxLJyAUTgsFUdGco5OvA=
last-modified
Fri, 25 Oct 2019 12:16:25 GMT
server
cloudflare
etag
W/"4de662f59cb5c62924147b9634b4b0e4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
cache-control
max-age=7200
x-amz-version-id
ZcXajKhK39dhVY00KrDeckDKdNLioIS.
cf-ray
551faa5b2df8d6e5-FRA
cf-bgj
minify
share_counts
www.onlinewarnungen.de/wp-json/shariff/v1/
225 B
506 B
XHR
General
Full URL
https://www.onlinewarnungen.de/wp-json/shariff/v1/share_counts?url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&services=facebook%7Ctwitter%7Cxing%7Clinkedin&timestamp=1578133408
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/wp-content/plugins/e-recht24-share/js/shariff.min.js?ver=2.0.3
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
85.13.148.62 , Germany, ASN34788 (NMM-AS D - 02742 Friedersdorf Hauptstrasse 68, DE),
Reverse DNS
dd30026.kasserver.com
Software
Apache /
Resource Hash
7a7bc4cc7d4106d22027739a08b9d15e1f545643c60d9240bbc035686b134dd5
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:34 GMT
x-content-type-options
nosniff
server
Apache
link
<https://www.onlinewarnungen.de/wp-json/>; rel="https://api.w.org/"
allow
GET
content-type
application/json; charset=UTF-8
status
200
vary
Accept-Encoding,Cookie,Origin
x-robots-tag
noindex
access-control-allow-headers
Authorization, Content-Type
access-control-expose-headers
X-WP-Total, X-WP-TotalPages
source.js
s.vi-serve.com/
212 KB
46 KB
Script
General
Full URL
https://s.vi-serve.com/source.js
Requested by
Host: s.vi-serve.com
URL: https://s.vi-serve.com/tagLoader.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
26d39e0543980d5821640d2ae273432eb123bfee8b62fdadbfeeea617fd34a94

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:34 GMT
content-encoding
gzip
status
200
access-control-allow-methods
GET,POST
x-trans-id
txf189100a1fb3419bac8ac-005e14aca6
accept-ranges
bytes
last-modified
Tue, 07 Jan 2020 16:06:51 GMT
etag
1072f94740cd3826514143e238e8d3e4
access-control-max-age
86400
x-hw
1578502174.dop008.wa1.t,1578502174.cds003.wa1.hn,1578502174.cds008.wa1.c
content-type
application/javascript
access-control-allow-origin
*
x-timestamp
1578413210.43833
cache-control
max-age=300, must-revalidate
access-control-allow-credentials
false
content-length
47016
access-control-allow-headers
*
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1578502174014&sessionId=d42eb537-9b8b-6b43-68c4-86bf27711b13&url=www.onlinewarnungen.de&cheqSource=1&cheqEvent=2
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.127 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:34 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
a9bb8063a22b3a620afb3a4d94a11c3f
Content-Length
4
Expires
0
placement_invocation
ob.cheqzone.com/
33 KB
14 KB
Script
General
Full URL
https://ob.cheqzone.com/placement_invocation?id=65349&idx=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:6ea0:cf04::2 , United Kingdom, ASN60068 (CDN77, GB),
Reverse DNS
Software
BunnyCDN-DE1-540 /
Resource Hash
aba3112e39c96d6a7462ef02e6b3c680cbfcb23ebaf3e1dd179ab803b001269f

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:34 GMT
content-encoding
br
server
BunnyCDN-DE1-540
vary
Accept-Encoding
cdn-edgestorageid
540
content-type
text/javascript; charset=utf-8
status
200
cdn-uid
2642aeaf-0ebf-4c43-9f87-c153981605b2
cache-control
public, max-age=43200
cdn-pullzone
62714
cdn-cachedat
2020-01-08 12:51:45
cdn-requestid
fd02c3e50162296d1e4a5930632df33f
cdn-requestcountrycode
DE
cdn-cache
HIT
collect
www.google-analytics.com/r/
35 B
111 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j79&aip=1&a=1933471663&t=pageview&_s=1&dl=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&ul=en-us&de=UTF-8&dt=PayPal%20Phishing%3A%20Es%20gibt%20keine%20Zahlung%20an%20Outfittery%20GmbH&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=YAhAAEAB~&jid=2017319443&gjid=2016758621&cid=1346644779.1578502174&tid=UA-80914241-1&_gid=595112015.1578502174&_r=1&z=1919016092
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 08 Jan 2020 16:49:34 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
latest.json
currency.prebid.org/
1 KB
2 KB
XHR
General
Full URL
https://currency.prebid.org/latest.json
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/prebid-stg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:5800:19:2cf2:a900:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c137183b1a7a90b05c55b625b78140da3e4ffcfc80e649d69d19d6bd30a15a29

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 08 Jan 2020 10:01:31 GMT
via
1.1 21a3da42c823b5a4a2d9c4c63248bbd6.cloudfront.net (CloudFront)
vary
Origin
age
24483
x-cache
Hit from cloudfront
status
200
content-length
1325
last-modified
Wed, 08 Jan 2020 10:01:05 GMT
server
AmazonS3
etag
"99e9efce3692b803e5f805426c7fe95c"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
x-amz-cf-pop
FRA2-C2
accept-ranges
bytes
x-amz-cf-id
FBH1gvIVOg5jjyGrv1dp0piNuHPJLzRFS61bMpAFBi_7oB7_D4PcTw==
expires
Thu, 09 Jan 2020 10:00:59 GMT
truncated
/
66 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b71c20271d9c80d1a71aa0ab9935281c4fa8ac404533f1a0747d7fb03fc68e79

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/webp
5169ee3af6a3cf63f28c6e8b.js
static.plista.com/async/pub/
37 KB
4 KB
Script
General
Full URL
https://static.plista.com/async/pub/5169ee3af6a3cf63f28c6e8b.js
Requested by
Host: static.plista.com
URL: https://static.plista.com/async.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
88.99.66.207 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.207.66.99.88.clients.your-server.de
Software
nginx /
Resource Hash
a502f95237ea5758d045604b643374e04c0c5bd20babf0d87a6e42a1967a7208
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 08 Jan 2020 16:49:31 GMT
server
nginx
age
1
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
status
200
cache-control
public, must-revalidate, proxy-revalidate
x-varnish
1071113930 1071663172
accept-ranges
bytes
content-length
3483
via
1.1 varnish-v4
expires
Thu, 09 Jan 2020 16:49:32 GMT
617345935087486.js
s.vi-serve.com/publishers/
789 B
973 B
Script
General
Full URL
https://s.vi-serve.com/publishers/617345935087486.js
Requested by
Host: s.vi-serve.com
URL: https://s.vi-serve.com/source.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
f3d3add3074d391ddb4f23db97995d17c46b767bd962501acb97e8c5cecf4531

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:34 GMT
status
200
x-trans-id
txb3f81f2d6fa04c6bb05a0-005e011371
x-hw
1578502174.dop008.wa1.t,1578502174.cds003.wa1.hn,1578502174.cds001.wa1.c
accept-ranges
bytes
last-modified
Mon, 23 Dec 2019 18:52:38 GMT
etag
037b6b19a1a58ad20b20f0728b933a48
access-control-max-age
86400
access-control-allow-methods
GET,POST
content-type
file
access-control-allow-origin
*
x-timestamp
1577127157.61989
cache-control
max-age=300, must-revalidate
access-control-allow-credentials
false
content-length
789
access-control-allow-headers
*
iframe-player.html
player.glomex.com/integration/1.207.0/ Frame 6A81
0
0
Document
General
Full URL
https://player.glomex.com/integration/1.207.0/iframe-player.html?integrationId=eexbs14jypxhqnf&playlistId=v-bvbbxi02hg8x&width=588&height=330&origin=glomex-player
Requested by
Host: player.glomex.com
URL: https://player.glomex.com/integration/1.207.0/glomex-player.b4c12214.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:3800:2:3348:fcc0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
player.glomex.com
:scheme
https
:path
/integration/1.207.0/iframe-player.html?integrationId=eexbs14jypxhqnf&playlistId=v-bvbbxi02hg8x&width=588&height=330&origin=glomex-player
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

status
200
content-type
text/html; charset=utf-8
date
Wed, 08 Jan 2020 11:38:33 GMT
cache-control
max-age=31536000
last-modified
Wed, 08 Jan 2020 10:58:36 GMT
x-amz-version-id
px7_Q1uLiyCzRYJX0ZnGaBQlUjwKxs_0
server
AmazonS3
content-encoding
gzip
vary
Accept-Encoding
x-cache
RefreshHit from cloudfront
via
1.1 9ab847fabb8c9edbd39cff57c2a2f4c0.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA50-C1
x-amz-cf-id
J_9Dr362-4ZdWprduI73_JGA1_NtjLYPGvb7MWL0shIVdepE4i9kEw==
show_pla
obs.cheqzone.com/
1 KB
1 KB
Script
General
Full URL
https://obs.cheqzone.com/show_pla?id=65349&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&sf=0&k=&idx=0&ch=&ext=&np=linux%20x86_64&nv=google%20inc.&rand=94076191583606821119567630228870049&nc=0&tsf=0&tsfmi=&pv=0&cb=1578502174119&ref=&pit=1&hl=2&op=0&fs=1600x1200&ss=1600x1200&pre=0&jsonp=OBR.extern.onCheqResponse&mr=&ag=1974912753&at=&bid=e30%3D&di=W1sxMiwie1wiZVwiOjAsXCJ3Z2xcIjoxfSJdLFstMSwiLSJdLFstMiwiMyxHTlRCSktLQUtCQkFU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%0D%0ALDAsMiwwLDAsMiwyLDIsMl19Il1d&tsfu=&fst=1600x1200&dep=0&cpos=%5B%7B%22x%22%3A277%2C%22y%22%3A7808%2C%22w%22%3A1030%2C%22h%22%3A0%7D%2C%7B%22w%22%3A1600%2C%22h%22%3A1200%7D%5D&ver=22&cri=GcrYuJPEZ3&sdd=%7B%7D&pto=740
Requested by
Host: ob.cheqzone.com
URL: https://ob.cheqzone.com/placement_invocation?id=65349&idx=0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
35.172.132.19 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-172-132-19.compute-1.amazonaws.com
Software
/
Resource Hash
08a58c0b09b1f88f8e97d6d1da44c69e1faf5bf07530fe481c35809298ae1f36

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 08 Jan 2020 16:49:34 GMT
content-encoding
gzip
content-type
text/javascript
status
200
cache-control
no-cache, no-store, must-revalidate
content-length
842
expires
Fri, 01 Jan 1990 00:00:00 GMT
default.js
s404-1.vi-serve.com/publishers/
Redirect Chain
  • https://s.vi-serve.com/publishers/617345935087486_onlinewarnungen.de.js
  • https://s404-1.vi-serve.com/publishers/default.js
74 B
257 B
Script
General
Full URL
https://s404-1.vi-serve.com/publishers/default.js
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
bc3f11b8948273a0c25e86b5a70ae4ebbd5dc0e31253249b50e7f991ae383177

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:34 GMT
content-encoding
gzip
status
200
access-control-allow-methods
GET,POST
x-trans-id
txbbaa1daccbc840a08c642-005cd2a5f3
accept-ranges
bytes
last-modified
Wed, 30 Jan 2019 08:19:48 GMT
etag
5f9eb8ecc5e6637d34ae047925eea3e2
access-control-max-age
86400
x-hw
1578502174.dop008.wa1.t,1578502174.cds003.wa1.hn,1578502174.cds007.wa1.c
content-type
application/javascript
access-control-allow-origin
*
x-timestamp
1548836387.53723
cache-control
max-age=300, must-revalidate
access-control-allow-credentials
false
content-length
77
access-control-allow-headers
*

Redirect headers

status
301
date
Wed, 08 Jan 2020 16:49:34 GMT
cache-control
max-age=0
accept-ranges
bytes
content-encoding
gzip
location
https://s404-1.vi-serve.com/publishers/default.js
x-hw
1578502174.dop008.wa1.t,1578502174.cds003.wa1.hn,1578502174.cds006.wa1.p
player.js
player.inforsea.com/
362 KB
109 KB
Script
General
Full URL
https://player.inforsea.com/player.js
Requested by
Host: s.vi-serve.com
URL: https://s.vi-serve.com/source.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.42 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
10d2ebe5554adf1f32424e9ce3602f931b0f7fe58714e3b1f0921d84e66f0127

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 08 Jan 2020 16:49:34 GMT
Content-Encoding
gzip
Last-Modified
Wed, 08 Jan 2020 10:54:59 GMT
X-Trans-Id
tx241238da6f984e4f836d8-005e15fc6a
Etag
336c475777ad04856054a80d11a261c2
X-HW
1578502174.dop002.wa1.t,1578502174.cds003.wa1.shn,1578502174.dop002.wa1.t,1578502174.cds004.wa1.c
Content-Type
application/javascript
X-Timestamp
1578480898.04048
Cache-Control
public, max-age=300
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
110996
jc.gif
obs.cheqzone.com/tracker/
43 B
79 B
Image
General
Full URL
https://obs.cheqzone.com/tracker/jc.gif?e=37dfbd8ee84e00106de6c235e8468d999225c741567d0695964c08be775fcad7a931f91d254faa4095933ae8b74bc964aae0789554148d683b19461d47ffafe390745590c0d015263e1efa7a6b16d96ecd68c604311931c00a1255271643d4fc3e0e77a826b036d84cf9c133f8513da85b2e2e16dd02ea44fb96d5da3cb42800f97bc4ac547f9216740628108bdc1037f071ade2d5b04a4bbe40dab33deb288e6b9753d35627ad2e07fa14445278cf5b32b49afea875e56faa419b0dac102d2ae782702879241cdb32dcc307a4512abfc2f37c08247595c27773d0d51e01781132435af2ca75373859f3e71021cefeb733d0b112324c70b6ecf4ccc432e08ac30bb54bd609623393bcc5a8a169c284ff32d4771391a1906f404fa93670ba8c0631a8caf166d555ed5aa0dd58d045d9c77dda3935948726d17b91d1ece193fda65a7fb47ee1eea46d433eaeae3cdaed1eef145904c95d4a9dad80c9caf0933dd92089dc9e846ee972391b877969b9a5d3746583ba4ef857dac706d454bd6f4c4c61cb369606ca8af92eedcb69935eada6f6ed48a0170663f65713115b4e7fcea128f664dedc8a2ba2d330a6dc7e96d3b2a82ac3eabd1d577d8cea4e4f96e0580f4ea5b8a27ab66ecff856eefc3ce16eaa23e726c608c5fa2ecd1b3bf6ebc374353d7c11694b4e1daaac&m=0&s=nav&u=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1578502174453&cri=GcrYuJPEZ3
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
35.172.132.19 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-172-132-19.compute-1.amazonaws.com
Software
/
Resource Hash
98b3d9d20e032f90aca49e9b116225d539ff6fbdb7e42c3c363f63896ac03d2a

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Wed, 08 Jan 2020 16:49:34 GMT
cache-control
no-cache, no-store, must-revalidate
expires
Fri, 01 Jan 1990 00:00:00 GMT
content-length
43
content-type
image/gif
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1578502174455&sessionId=d42eb537-9b8b-6b43-68c4-86bf27711b13&url=www.onlinewarnungen.de&cheqSource=1&cheqEvent=0&exitReason=4&responseTime=440
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.127 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:34 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
a5e6e6eeb256f2b447843d447a737b7d
Content-Length
4
Expires
0
get
odb.outbrain.com/utils/
6 KB
3 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&srcUrl=https%3A%2F%2Fwww.onlinewarnungen.de%2Ffeed%2F&settings=true&recs=true&widgetJSId=AR_1&key=NANOWDGT01&idx=0&version=1050107&apv=false&sig=umfWllqh&format=html&va=true&rand=26573&pdobuid=-1&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&clss=RJsMZTRzlWVXhcqZ1vjDmOahJvEP4GFK7GbXq6OXZp3QPUrpuJ7X5uV1T1zYybta925LZwb%2FlyYgty7Q&secured=true&cmpStat=1&ccpaStat=0&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
0fd01dd4bf87e313dfd8646922501b08751dc1adefb76dea6e25bf2cb89ae43d
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
CHIDC2, MDW, FRA, Europe2
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-traceid
702ce73d036683355c9ae9dfe30fe1d5
content-length
2570
x-served-by
cache-mdw17358-MDW, cache-fra19178-FRA
pragma
no-cache
x-timer
S1578502175.553418,VS0,VE115
date
Wed, 08 Jan 2020 16:49:34 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache
backend-ip
157.52.75.58
accept-ranges
bytes, bytes
x-cache-hits
0, 0
v2
vis.vi-serve.com/playlist/
6 KB
2 KB
XHR
General
Full URL
https://vis.vi-serve.com/playlist/v2?url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&session_id=16da447b-02c8-4dec-01b6-020087d29cc3&category=IAB19&publisherId=617345935087486&language=de-de&useAllCategories=false&useOnlyCategories=false&pageTitle=PayPal%20Phishing%3A%20Es%20gibt%20keine%20Zahlung%20an%20Outfittery%20GmbH&pageDescription=Erneut%20verunsichert%20eine%20Zahlungsbest%C3%A4tigung%20f%C3%BCr%20einen%20Onlineshop%20zahlreiche%20PayPal-Nutzer.%20Angeblich%20soll%20es%20eine%20PayPal-Zahlung%20an%20die%20Outfittery%20GmbH%20oder%20Fotografen%20Online%20Service%20GmbH%20geben.%20Aktueller%20Betreff%3A%20Bestellbest%C3%A4tigung%20von%20Best%C3%A4tigung%20zahlung%40deutschland.de&pageLanguage=de-DE&mobile=false&playlistLength=4
Requested by
Host: s.vi-serve.com
URL: https://s.vi-serve.com/source.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.51.20.189 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-51-20-189.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
baf819dd9350c5b28508181a133583d80bd79e27cf44ed34701bbb9d10c50a03

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Date
Wed, 08 Jan 2020 16:49:34 GMT
Content-Encoding
gzip
Server
nginx/1.15.8
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
X-Execution-Time
00:00.030 ms.
transfer-encoding
chunked
Connection
keep-alive
/
t.vi-serve.com/
0
110 B
Image
General
Full URL
https://t.vi-serve.com/?event=PLACEMENT&page_url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&pub_id=617345935087486&channel_id=5cf5098728a061234c7c83fc&placement_id=&ad_unit_type=2&session_id=16da447b-02c8-4dec-01b6-020087d29cc3&focus=true&player=playerVI&pageLanguage=de-de&placement_w=494&placement_h=0&time_delta=1316&ab_testing_id=testVI&position_on_page=5&playlist_pos=1&mobile=false&floating=false&cb=da51
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.48.67.153 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-48-67-153.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:34 GMT
Server
nginx/1.15.8
widgetGlobalEvent
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/widgetGlobalEvent?rId=1ecc78fadb5c5a8731a4202585722dfc&pvId=1ecc78fadb5c5a8731a4202585722dfc&sid=6930949&pid=34890&idx=0&wId=100&pad=0&org=0&tm=822&eT=0&widgetWidth=1030&widgetHeight=0&widgetX=278&widgetY=7783&wRV=1050107&pVis=0&lsd=a2171ce1-27f8-4b02-b2d3-3f8513e2925f&eIdx=&cheq=1&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.127 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:35 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
2fac21116dad52772c38eea92a0945d5
Content-Length
4
Expires
0
obUserSync.html
widgets.outbrain.com/widgetOBUserSync/ Frame 1FD0
0
0
Document
General
Full URL
https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.197.157 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-197-157.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Accept-Encoding
gzip, deflate, br
Cookie
akacd_widgets_routing=3755954972~rv=57~id=ece9fb4e5e1624b8ea619cb868df5b6d; obuid=a2171ce1-27f8-4b02-b2d3-3f8513e2925f
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

Accept-Ranges
bytes
Content-Type
text/html
ETag
"f01b8a7bd6b6de45f1ad36ce1d3a30cd:1577003167"
Last-Modified
Sun, 22 Dec 2019 08:23:47 GMT
Server
AkamaiNetStorage
Vary
Accept-Encoding
Content-Encoding
gzip
Cache-Control
max-age=604800
Date
Wed, 08 Jan 2020 16:49:34 GMT
Content-Length
3524
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
streamFeed.js
widgets.outbrain.com/nanoWidget/1050107/module/
42 KB
14 KB
Script
General
Full URL
https://widgets.outbrain.com/nanoWidget/1050107/module/streamFeed.js
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.197.157 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-197-157.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
585b44613d32c4e8c58cff33e7a2c4e748699984dde388537658686a61227205

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 08 Jan 2020 16:49:34 GMT
Content-Encoding
gzip
Last-Modified
Tue, 07 Jan 2020 08:11:23 GMT
Server
AkamaiNetStorage
ETag
"f57d6cf0ce42bcadaff0b3a0bad5db62:1578387390"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=345600
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
13822
get
mv.outbrain.com/Multivac/api/
23 KB
3 KB
Script
General
Full URL
https://mv.outbrain.com/Multivac/api/get?url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&settings=true&recs=true&widgetJSId=AR_1&key=NANOWDGT01&version=1050107&apv=false&sig=umfWllqh&format=html&rand=21787&lsd=a2171ce1-27f8-4b02-b2d3-3f8513e2925f&lsdt=1578502174709&pdobuid=0&osLang=en-US&va=true&cmpStat=1&ccpaStat=0&srcUrl=https%3A%2F%2Fwww.onlinewarnungen.de%2Ffeed%2F&scrW=1600&scrH=1200&t=MWVjYzc4ZmFkYjVjNWE4NzMxYTQyMDI1ODU3MjJkZmM=&winW=1600&winH=1200&adblck=false&clss=RJsMZTRzlWVXhcqZ1vjDmOahJvEP4GFK7GbXq6OXZp3QPUrpuJ7X5uV1T1zYybta925LZwb%2FlyYgty7Q&secured=true&feedIdx=0&lastIdx=0&lastCardIdx=0&fAB=no_abtest
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/nanoWidget/1050107/module/streamFeed.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
c46ad53122014a657df04d21d86e97d1c967effed05d65b8c2370429aca866e9

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:34 GMT
content-encoding
gzip
traffic-path
CHIDC2, MDW, FRA, Europe2
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-traceid
495b09e12c279360b4dcc99bc7a3475a
content-length
2699
x-served-by
cache-mdw17376-MDW, cache-fra19178-FRA
pragma
no-cache
x-timer
S1578502175.761395,VS0,VE188
vary
Accept-Encoding, User-Agent
content-type
application/json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache
backend-ip
157.52.75.76
accept-ranges
bytes, bytes
x-cache-hits
0, 0
/
t.vi-serve.com/
0
110 B
Image
General
Full URL
https://t.vi-serve.com/?event=NV_LOADED&page_url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&pub_id=617345935087486&channel_id=5cf5098728a061234c7c83fc&placement_id=&ad_unit_type=2&session_id=16da447b-02c8-4dec-01b6-020087d29cc3&focus=true&player=playerVI&pageLanguage=de-de&placement_w=494&placement_h=0&time_delta=1524&nv_video_id=j2tqsW4B_6S3bUqPhuqF&nv_source_id=718&nv_feed_id=1319&requestedCategories=IAB19&requestedLanguage=de-de&ab_testing_id=testVI&position_on_page=5&playlist_pos=1&mobile=false&floating=false&cb=07bf
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.48.67.153 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-48-67-153.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:34 GMT
Server
nginx/1.15.8
widgetGlobalEvent
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/widgetGlobalEvent?rId=15527eed7fe67173787e56d6617cfbd2&pvId=1ecc78fadb5c5a8731a4202585722dfc&sid=6930949&pid=34890&idx=1&wId=973&pad=0&org=0&tm=1074&eT=0&widgetWidth=1030&widgetHeight=0&widgetX=278&widgetY=7783&wRV=1050107&pVis=0&lsd=a2171ce1-27f8-4b02-b2d3-3f8513e2925f&eIdx=&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.127 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:35 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
ee2854e2fab251735f116a38aa87ce14
Content-Length
4
Expires
0
widgetGlobalEvent
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/widgetGlobalEvent?rId=b9f968c9b1a11facf7bdb88d64b6f455&pvId=1ecc78fadb5c5a8731a4202585722dfc&sid=6930949&pid=34890&idx=2&wId=978&pad=0&org=0&tm=1076&eT=0&widgetWidth=1030&widgetHeight=0&widgetX=278&widgetY=7783&wRV=1050107&pVis=0&lsd=a2171ce1-27f8-4b02-b2d3-3f8513e2925f&eIdx=&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.127 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:35 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
7bfd46de5aebd6ee47bedada4c49dae0
Content-Length
4
Expires
0
widgetGlobalEvent
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/widgetGlobalEvent?rId=5e3447a49c68ee8788e9667ebefacc5e&pvId=1ecc78fadb5c5a8731a4202585722dfc&sid=6930949&pid=34890&idx=3&wId=973&pad=0&org=0&tm=1077&eT=0&widgetWidth=1030&widgetHeight=0&widgetX=278&widgetY=7783&wRV=1050107&pVis=0&lsd=a2171ce1-27f8-4b02-b2d3-3f8513e2925f&eIdx=&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.127 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:35 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
d8e3e4cc9e20e93ade8651c3e9be3d2d
Content-Length
4
Expires
0
widgetGlobalEvent
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/widgetGlobalEvent?rId=daaf5c6f64ee3244447d823d2819580e&pvId=1ecc78fadb5c5a8731a4202585722dfc&sid=6930949&pid=34890&idx=4&wId=978&pad=0&org=0&tm=1079&eT=0&widgetWidth=1030&widgetHeight=0&widgetX=278&widgetY=7783&wRV=1050107&pVis=0&lsd=a2171ce1-27f8-4b02-b2d3-3f8513e2925f&eIdx=&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.127 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:35 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
977ed19245589ca9cd723b80b0179fc2
Content-Length
4
Expires
0
widgetGlobalEvent
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/widgetGlobalEvent?rId=3374cbc516559e8aa00c316bf52a3460&pvId=1ecc78fadb5c5a8731a4202585722dfc&sid=6930949&pid=34890&idx=5&wId=973&pad=0&org=0&tm=1080&eT=0&widgetWidth=1030&widgetHeight=0&widgetX=278&widgetY=7783&wRV=1050107&pVis=0&lsd=a2171ce1-27f8-4b02-b2d3-3f8513e2925f&eIdx=&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.127 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:35 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
d013f7e95112f1c22ee69e8db2000c24
Content-Length
4
Expires
0
cygnus
as-sec.casalemedia.com/
24 B
910 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=368005&v=7.2&r=%7B%22id%22%3A%2217199b7bf93a03%22%2C%22imp%22%3A%5B%7B%22id%22%3A%22223ad725a6c5f5%22%2C%22banner%22%3A%7B%22w%22%3A336%2C%22h%22%3A280%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A368005%2C%22sid%22%3A%22336x280%22%7D%7D%2C%7B%22id%22%3A%223391b00d65fd84%22%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A368005%2C%22sid%22%3A%22300x250%22%7D%7D%2C%7B%22id%22%3A%22415bb2a1e1aab8%22%2C%22banner%22%3A%7B%22w%22%3A1%2C%22h%22%3A1%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22siteID%22%3A368005%2C%22sid%22%3A%221x1%22%7D%7D%5D%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F%22%7D%2C%22ext%22%3A%7B%22source%22%3A%22prebid%22%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A0%7D%7D%2C%22user%22%3A%7B%22ext%22%3A%7B%22consent%22%3A%22%22%7D%7D%7D&ac=j&sd=1&
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/prebid-stg.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.197.53 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-197-53.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
022e100011865cdc09b8d6b88b7b540ee9c3c2dba9c742110e38a242ce1a0023

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:35 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
44
Expires
Wed, 08 Jan 2020 16:49:35 GMT
bid-request
a.teads.tv/hb/
16 B
368 B
XHR
General
Full URL
https://a.teads.tv/hb/bid-request
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/prebid-stg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.7 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6a7b0c8bf87b2bd5ca31557f25cf2a6c80f93af72bf68a6085e9b55a87fe908c

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 08 Jan 2020 16:49:35 GMT
content-encoding
gzip
status
200
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
https://www.onlinewarnungen.de
cache-control
max-age=0, no-cache, no-store
access-control-allow-credentials
true
content-length
42
expires
Wed, 08 Jan 2020 16:49:35 GMT
hb
ice.360yield.com/ul_cb/
Redirect Chain
  • https://ice.360yield.com/hb?jsonp=%7B%22bid_request%22%3A%7B%22secure%22%3A1%2C%22id%22%3A%2221c4e661bd8a48a%22%2C%22version%22%3A%225.2.0-JS-6.2.0%22%2C%22referrer%22%3A%22https%3A%2F%2Fwww.online...
  • https://ice.360yield.com/ul_cb/hb?jsonp=%7B%22bid_request%22%3A%7B%22secure%22%3A1%2C%22id%22%3A%2221c4e661bd8a48a%22%2C%22version%22%3A%225.2.0-JS-6.2.0%22%2C%22referrer%22%3A%22https%3A%2F%2Fwww....
0
-1 B
XHR
General
Full URL
https://ice.360yield.com/ul_cb/hb?jsonp=%7B%22bid_request%22%3A%7B%22secure%22%3A1%2C%22id%22%3A%2221c4e661bd8a48a%22%2C%22version%22%3A%225.2.0-JS-6.2.0%22%2C%22referrer%22%3A%22https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F%22%2C%22imp%22%3A%5B%7B%22id%22%3A%228fea591d4087ca%22%2C%22currency%22%3A%22EUR%22%2C%22pid%22%3A22094047%2C%22tid%22%3A%222bef7a25-704c-4be4-b1e4-d848c0af350e%22%2C%22banner%22%3A%7B%22format%22%3A%5B%7B%22w%22%3A336%2C%22h%22%3A280%7D%2C%7B%22w%22%3A300%2C%22h%22%3A250%7D%2C%7B%22w%22%3A1%2C%22h%22%3A1%7D%5D%7D%7D%5D%7D%7D
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.217.79 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-156-217-79.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:35 GMT
access-control-allow-origin
https://www.onlinewarnungen.de
location
https://ice.360yield.com:443/ul_cb/hb?jsonp=%7B%22bid_request%22%3A%7B%22secure%22%3A1%2C%22id%22%3A%2221c4e661bd8a48a%22%2C%22version%22%3A%225.2.0-JS-6.2.0%22%2C%22referrer%22%3A%22https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F%22%2C%22imp%22%3A%5B%7B%22id%22%3A%228fea591d4087ca%22%2C%22currency%22%3A%22EUR%22%2C%22pid%22%3A22094047%2C%22tid%22%3A%222bef7a25-704c-4be4-b1e4-d848c0af350e%22%2C%22banner%22%3A%7B%22format%22%3A%5B%7B%22w%22%3A336%2C%22h%22%3A280%7D%2C%7B%22w%22%3A300%2C%22h%22%3A250%7D%2C%7B%22w%22%3A1%2C%22h%22%3A1%7D%5D%7D%7D%5D%7D%7D
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
status
302
access-control-allow-credentials
true
content-type
text/plain
content-length
0

Redirect headers

date
Wed, 08 Jan 2020 16:49:35 GMT
status
302
location
https://ice.360yield.com:443/ul_cb/hb?jsonp=%7B%22bid_request%22%3A%7B%22secure%22%3A1%2C%22id%22%3A%2221c4e661bd8a48a%22%2C%22version%22%3A%225.2.0-JS-6.2.0%22%2C%22referrer%22%3A%22https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F%22%2C%22imp%22%3A%5B%7B%22id%22%3A%228fea591d4087ca%22%2C%22currency%22%3A%22EUR%22%2C%22pid%22%3A22094047%2C%22tid%22%3A%222bef7a25-704c-4be4-b1e4-d848c0af350e%22%2C%22banner%22%3A%7B%22format%22%3A%5B%7B%22w%22%3A336%2C%22h%22%3A280%7D%2C%7B%22w%22%3A300%2C%22h%22%3A250%7D%2C%7B%22w%22%3A1%2C%22h%22%3A1%7D%5D%7D%7D%5D%7D%7D
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
access-control-allow-origin
https://www.onlinewarnungen.de
access-control-allow-credentials
true
content-type
text/plain
content-length
0
8549787
ad.yieldlab.net/yp/
2 B
770 B
XHR
General
Full URL
https://ad.yieldlab.net/yp/8549787?ts=1578502175049&json=true&t=&gdpr=true&consent=undefined
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/prebid-stg.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.206.43 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-101-206-43.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:35 GMT
Content-Encoding
gzip
p3p
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa OUR IND COM NAV INT"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Language
de-DE
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
no-store,no-cache,max-age=-3600,must-revalidate,post-check=0,pre-check=0
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=UTF-8
Access-Control-Allow-Headers
Accept,Authorization,Cache-Control,Content-Type,DNT,If-Modified-Since,Keep-Alive,Origin,User-Agent,X-Mx-ReqToken,X-Requested-With
Content-Length
28
Expires
Tue, 07 Jan 2020 16:49:35 GMT
placementbid.json
an.facebook.com/v2/
105 B
1 KB
XHR
General
Full URL
https://an.facebook.com/v2/placementbid.json?placementids[]=784164482087854_784164522087850&adformats[]=300x250&testmode=false&pageurl=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&sdk[]=6.0.web&adapterver=1.3.0&platform=241394079772386&platver=2.36.0-pre&cb=76ab6ba9-f908-49f1-855f-c4c23f49138a
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/prebid-stg.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:800e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
0e0ce8d40b7966a6333ce30e01903ee67fb725031ddc88663d3e2ac09927621d
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
br
x-content-type-options
nosniff
x-fb-an-errors
No bids
x-fb-an-request-id
2141693897537319857
status
200
alt-svc
h3-24=":443"; ma=3600
x-xss-protection
0
pragma
no-cache
x-fb-debug
B1Go0DP22rv3fi9MIgNIVGZQth0G7rKcRtEnDmIvKUsfib2ilF8/issxq9WspJARRy2+gL/4rivsivBo1eBxJQ==
x-frame-options
DENY
date
Wed, 08 Jan 2020 16:49:35 GMT
vary
Accept-Encoding
content-type
text/javascript; charset=utf-8
access-control-allow-origin
https://www.onlinewarnungen.de
access-control-expose-headers
X-FB-AN-Request-ID, X-FB-AN-Errors, X-FB-AN-Bid-Count
cache-control
private, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
263 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=17628&site_id=260672&zone_id=1290102&size_id=15&alt_size_ids=16&p_pos=btf&rf=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&tg_i.position=Content_1&tk_flint=pbjs_lite_v2.36.0-pre&x_source.tid=2bef7a25-704c-4be4-b1e4-d848c0af350e&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.779622636881129
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/prebid-stg.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.140 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
b3a077152b8ecd6336e356a98ce4e7af392a5c1b373e0d4221dfdf8329c3cb71

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:35 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=109
Content-Length
263
Expires
Wed, 17 Sep 1975 21:32:10 GMT
translator
hbopenbid.pubmatic.com/
0
121 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/prebid-stg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC - PubMatic, Inc., US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Wed, 08 Jan 2020 16:49:35 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://www.onlinewarnungen.de
/
a.videoreach.com/hb/
363 B
543 B
XHR
General
Full URL
https://a.videoreach.com/hb/
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/prebid-stg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
195.201.205.233 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.233.205.201.195.clients.your-server.de
Software
nginx/1.13.10 /
Resource Hash
2a2379eb1965ae843abb214895d8c78541db1529313800f8562a4c496733ac90

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 08 Jan 2020 16:49:35 GMT
content-encoding
gzip
server
nginx/1.13.10
status
200
access-control-allow-methods
GET, POST
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.onlinewarnungen.de
access-control-allow-credentials
true
prebid
ib.adnxs.com/ut/v3/
145 B
1 KB
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/prebid-stg.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.200 , Netherlands, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
308.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
9bf583a9a201b53eb30ef05ec0c8607e120281be8c537e16be3e14e3bcd8ed27
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:37 GMT
X-Proxy-Origin
82.102.19.134; 82.102.19.134; 308.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.222.245:80
AN-X-Request-Uuid
cc1a16ce-9434-49db-9653-509117fc9870
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
145
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
hb
ice.360yield.com/ul_cb/
2 KB
2 KB
XHR
General
Full URL
https://ice.360yield.com/ul_cb/hb?jsonp=%7B%22bid_request%22%3A%7B%22secure%22%3A1%2C%22id%22%3A%2221c4e661bd8a48a%22%2C%22version%22%3A%225.2.0-JS-6.2.0%22%2C%22referrer%22%3A%22https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F%22%2C%22imp%22%3A%5B%7B%22id%22%3A%228fea591d4087ca%22%2C%22currency%22%3A%22EUR%22%2C%22pid%22%3A22094047%2C%22tid%22%3A%222bef7a25-704c-4be4-b1e4-d848c0af350e%22%2C%22banner%22%3A%7B%22format%22%3A%5B%7B%22w%22%3A336%2C%22h%22%3A280%7D%2C%7B%22w%22%3A300%2C%22h%22%3A250%7D%2C%7B%22w%22%3A1%2C%22h%22%3A1%7D%5D%7D%7D%5D%7D%7D
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.217.79 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-156-217-79.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
715695f4fbc5ac18557554eb48e764f555e5852d91cd90f5f7e8ac26fc81f251

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 08 Jan 2020 16:49:35 GMT
content-encoding
gzip
status
200
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
access-control-allow-origin
https://www.onlinewarnungen.de
access-control-allow-credentials
true
content-type
application/json; charset=UTF-8
content-length
1256
ads
securepubads.g.doubleclick.net/gampad/
169 KB
40 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2804723033592515&correlator=2457570135116083&output=ldjh&impl=fifs&adsid=NT&eid=21065336&vrg=2020010201&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200108&iu_parts=307308315%2Conlinewarnungen.de&enc_prev_ius=%2F0%2F1%2C%2F0%2F1%2C%2F0%2F1%2C%2F0%2F1%2C%2F0%2F1&prev_iu_szs=300x1050%7C300x600%7C160x600%7C120x600%2C320x50%7C336x280%7C300x250%7C250x250%7C1x1%2C320x50%7C970x250%7C800x250%7C728x90%7C1x1%2C320x50%7C250x250%2C1x1&fluid=0%2Cheight%2Cheight%2Cheight%2C0&ists=1&prev_scp=trafficSource%3Ddirect_type_in_desktop%26placement%3DSkyscraper%7CtrafficSource%3Ddirect_type_in_desktop%26placement%3DContent_1%7CtrafficSource%3Ddirect_type_in_desktop%26placement%3DContent_2%7CtrafficSource%3Ddirect_type_in_desktop%26placement%3DFooter_1%7CtrafficSource%3Ddirect_type_in_desktop%26placement%3DOutOfPage&cookie_enabled=1&bc=31&abxe=1&lmt=1578502175&dt=1578502175348&dlt=1578502173505&idt=540&frm=20&biw=1585&bih=1185&oid=3&adxs=1353%2C-12245933%2C-12245933%2C-12245933%2C278&adys=85%2C-12245933%2C-12245933%2C-12245933%2C12704&adks=996357360%2C1824244239%2C3427736393%2C2685908911%2C3308114638&ucis=1%7C2%7C3%7C4%7C5&ifi=3&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&dssz=63&icsg=44023414780&std=3&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1080x12629%7C0x0%7C1030x0%7C238x0%7C1030x210&msz=300x1050%7C336x280%7C65x25%7C250x250%7C1030x1&ga_vid=1346644779.1578502174&ga_sid=1578502174&ga_hid=1933471663&fws=0%2C132%2C132%2C132%2C0&ohw=0%2C1030%2C1030%2C238%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
cafe /
Resource Hash
f64a1dcb38f203448a6df995cbaecf5cafba4ec36fbb62d31942039baa4772c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

date
Wed, 08 Jan 2020 16:49:35 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
39902
x-xss-protection
0
google-lineitem-id
-1,4574128520,-1,4574128520,-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-1,138228266646,-1,138228517159,-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.onlinewarnungen.de
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020010201.js
securepubads.g.doubleclick.net/gpt/
62 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010201.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
sffe /
Resource Hash
a08a55c27259985289081c939725fc610910e790b37c7964189b76d10fa83f2a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 02 Jan 2020 19:56:18 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
23973
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:35 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

/
t.vi-serve.com/
0
110 B
Image
General
Full URL
https://t.vi-serve.com/?event=INFO&page_url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&pub_id=617345935087486&channel_id=5cf5098728a061234c7c83fc&placement_id=&ad_unit_type=2&session_id=16da447b-02c8-4dec-01b6-020087d29cc3&focus=true&player=playerVI&pageLanguage=de-de&placement_w=494&placement_h=0&time_delta=2524&cmpFramework=iab&gdprApplies=true&gdprStatus=timeout&consent=0&ab_testing_id=testVI&position_on_page=5&playlist_pos=1&mobile=false&floating=false&cb=ae64
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.48.67.153 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-48-67-153.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:35 GMT
Server
nginx/1.15.8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
j2tqsW4B_6S3bUqPhuqF.jpg
nv.vi-serve.com/vis-media/718/1319/
113 KB
113 KB
Image
General
Full URL
https://nv.vi-serve.com/vis-media/718/1319/j2tqsW4B_6S3bUqPhuqF.jpg
Requested by
Host: s.vi-serve.com
URL: https://s.vi-serve.com/source.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
eb95fdd19ee9c1e58cf222a93a0a1bf64e5997a31f94741fef4be91768493a8f

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:35 GMT
last-modified
Thu, 28 Nov 2019 10:49:05 GMT
access-control-allow-origin
*
etag
"1574938145"
x-hw
1578502175.dop008.wa1.t,1578502175.cds003.wa1.hn,1578502175.cds003.wa1.c
content-type
image/jpeg
status
200
cache-control
max-age=46622
accept-ranges
bytes
content-length
115906
truncated
/
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8336b53dc99df9b4743507d182dbb0db3b7b87ff8f229e29f5bd0a4430f9c314

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml
sources
call.inforsea.com/
3 KB
1 KB
XHR
General
Full URL
https://call.inforsea.com/sources?affiliate_id=5cf5098728a061234c7c83fc&VI_OS=OSX&VI_OSVERS=10.14.6&VI_DOMAIN=onlinewarnungen.de&VI_BROWSER=Chrome&VI_BROWSERVERS=79.0.3945.88&VI_PUBLISHERID=617345935087486&VI_CDIM2=617345935087486&VI_USERAGENT=Mozilla%252F5.0%2520(Macintosh%253B%2520Intel%2520Mac%2520OS%2520X%252010_14_6)%2520AppleWebKit%252F537.36%2520(KHTML%252C%2520like%2520Gecko)%2520Chrome%252F79.0.3945.88%2520Safari%252F537.36&VI_DNT=0&VI_CUSTOM4=1&VI_CUSTOM5=&VI_GDPR=1&VI_CONSENT=&VI_CDIM1=718&VI_CUSTOM10=IAB19
Requested by
Host: player.inforsea.com
URL: https://player.inforsea.com/player.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.33.176.23 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-63-33-176-23.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
d431d373aedadd920a738ad5b5a662be058afcbf5e2012bda9e5f7e34996b550
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

date
Wed, 08 Jan 2020 16:49:36 GMT
content-encoding
gzip
server
nginx/1.15.8
status
200
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
https://www.onlinewarnungen.de
strict-transport-security
max-age=15724800; includeSubDomains
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=p&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=0&cb=4418258721856&publisher_id=617345935087486
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:36 GMT
Server
nginx/1.15.8
/
t.vi-serve.com/
0
110 B
Image
General
Full URL
https://t.vi-serve.com/?event=INVENTORY&page_url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&pub_id=617345935087486&channel_id=5cf5098728a061234c7c83fc&placement_id=&ad_unit_type=2&session_id=16da447b-02c8-4dec-01b6-020087d29cc3&focus=true&player=playerVI&pageLanguage=de-de&placement_w=494&placement_h=278&video_w=494&video_h=278&time_delta=2535&ab_testing_id=testVI&position_on_page=5&playlist_pos=1&mobile=false&floating=false&cb=c1a5
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.48.67.153 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-48-67-153.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:35 GMT
Server
nginx/1.15.8
vi_logo.svg
s.vi-serve.com/
1 KB
739 B
Image
General
Full URL
https://s.vi-serve.com/vi_logo.svg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
3d98123e0840ba76b93bf92147d2664fb0bc23cf37d61561e48fd270bbd0d1de

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:35 GMT
content-encoding
gzip
status
200
access-control-allow-methods
GET,POST
x-trans-id
tx405bf5ea83be4ec5b84b6-005cacf064
accept-ranges
bytes
last-modified
Wed, 30 Jan 2019 08:20:50 GMT
etag
05a4f3361327a013163f93fd52d4f03e
access-control-max-age
86400
x-hw
1578502175.dop008.wa1.t,1578502175.cds003.wa1.hn,1578502175.cds002.wa1.c
content-type
image/svg+xml
access-control-allow-origin
*
x-timestamp
1548836449.07606
cache-control
max-age=300, must-revalidate
access-control-allow-credentials
false
content-length
558
access-control-allow-headers
*
vi_logo_white.svg
s.vi-serve.com/
1 KB
904 B
Image
General
Full URL
https://s.vi-serve.com/vi_logo_white.svg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
4361b2a1538cb174934df21621d2d24a586cb47752191c42ca4050eb0b0d2492

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:35 GMT
content-encoding
gzip
status
200
access-control-allow-methods
GET,POST
x-trans-id
tx38df7e43eb95409da18df-005cb4c7f3
accept-ranges
bytes
last-modified
Tue, 19 Feb 2019 13:28:02 GMT
etag
6cb84758c48dde23e325b1947e80f79e
access-control-max-age
86400
x-hw
1578502175.dop008.wa1.t,1578502175.cds003.wa1.hn,1578502175.cds010.wa1.c
content-type
image/svg+xml
access-control-allow-origin
*
x-timestamp
1550582881.93855
cache-control
max-age=300, must-revalidate
access-control-allow-credentials
false
content-length
687
access-control-allow-headers
*
/
t.vi-serve.com/
0
110 B
Image
General
Full URL
https://t.vi-serve.com/?event=INVIEW&page_url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&pub_id=617345935087486&channel_id=5cf5098728a061234c7c83fc&placement_id=&ad_unit_type=2&session_id=16da447b-02c8-4dec-01b6-020087d29cc3&focus=true&player=playerVI&pageLanguage=de-de&placement_w=494&placement_h=278&video_w=494&video_h=278&time_delta=2543&nv_video_id=j2tqsW4B_6S3bUqPhuqF&nv_source_id=718&nv_feed_id=1319&in_view=true&ab_testing_id=testVI&position_on_page=5&playlist_pos=1&mobile=false&floating=false&cb=e2de
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.48.67.153 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-48-67-153.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:36 GMT
Server
nginx/1.15.8
gen_204
pagead2.googlesyndication.com/pagead/
0
60 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=gpt_sz&pvsid=2804723033592515&r=300x1050%7C300x600%7C160x600%7C120x600&w=300&h=600
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 08 Jan 2020 16:49:35 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame CE39
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuBn1SxuLpB6rADpu8aiikuqEYVoV5icmtT8VgRJUsjNJlYom-emL22u6TOd4pjncGzCSp5SfmPk9X-Vv4PSyuYqgXo0fJ9NJpdDjLk8gvsmU2gLYhHTdVxCVKn70h7UAhd-QvT7oO60AGqR9VSVbRBS9Jn-Sdaqf7d8OnIw5JEwujPPtLBpALCCT7xRCEQ4AIDMCnEVFPIcpzvhgCZrubhDI32OopfthTCn48RsdkZcaNiiFiEVjFuhhq7tnXJbC-ftXMzlS6uNCXypQkjm8J1PxLa&sig=Cg0ArKJSzFidZLPCerznEAE&urlfix=1&adurl=
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 08 Jan 2020 16:49:35 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/ Frame CE39
105 KB
37 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
66b0361f5842889aa456703d5764af62a511fc5149fdf83f033f21d6fde39019
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
37890
x-xss-protection
0
server
cafe
etag
15235979499334503267
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 08 Jan 2020 16:49:35 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame CE39
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
4ced2e9874d3cd388e91c29b992b00dcbfc2dfcfe97427ead37b07119a5e88da
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1578313968550048"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28349
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:35 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 3F53
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Wed, 08 Jan 2020 16:22:48 GMT
expires
Thu, 07 Jan 2021 16:22:48 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
1607
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
view
securepubads.g.doubleclick.net/pcs/ Frame ECB8
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssD7r2PkXjNVB_K03dmONvfm1sRV40LqmfW8rBf7eH_P63lxri6QCVUM-cwf_gl15hvtDQitZkReSjuaITjwKPw7UYyQL8wxfATU3zlnowgy8TWvTdDrWO4MieYlhztCNPaNGrOhqrLUMEMVdWtWsTr-5Q4I45rZKfQVuP4O1UAgNBd0k90mzmYGvINziwxQzpq9Ox4KRaTmTCcGZkrlFKKo2JLGsBumW_YtTTDOmAdGZrxliFcYVPe4nk494T5f075ucLthsBZuWVnthaPDVHHZrN6&sig=Cg0ArKJSzBUS8tNdukHAEAE&urlfix=1&adurl=
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 08 Jan 2020 16:49:35 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/ Frame ECB8
105 KB
37 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
66b0361f5842889aa456703d5764af62a511fc5149fdf83f033f21d6fde39019
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
37890
x-xss-protection
0
server
cafe
etag
15235979499334503267
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 08 Jan 2020 16:49:35 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame ECB8
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
4ced2e9874d3cd388e91c29b992b00dcbfc2dfcfe97427ead37b07119a5e88da
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1578313968550048"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28349
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:35 GMT
amp4ads-host-v0.js
cdn.ampproject.org/rtv/011912050130240/
20 KB
7 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/amp4ads-host-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
b0e077c071d8cadd7f559a3bfba9b136c071a5a0bc7cb6d952171b5f427cfa11
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
5223
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
7140
x-xss-protection
0
server
sffe
date
Wed, 08 Jan 2020 15:22:33 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"d61e8113ad0598ef"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 07 Jan 2021 15:22:33 GMT
amp4ads-v0.js
cdn.ampproject.org/rtv/011912050130240/ Frame 24DB
200 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/amp4ads-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0289758c8c964fbe0ec421527203b54fa728f037f3e023b002691158c82d7f98
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
2664
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
55703
x-xss-protection
0
server
sffe
date
Wed, 08 Jan 2020 16:05:12 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"5d665c0313f255e6"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 07 Jan 2021 16:05:12 GMT
amp-ad-exit-0.1.js
cdn.ampproject.org/rtv/011912050130240/v0/ Frame 24DB
15 KB
6 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/v0/amp-ad-exit-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
b388700842c722b76892ae257a262436a354966566be5fc2fc06dcb7a006d49d
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
124922
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
5590
x-xss-protection
0
server
sffe
date
Tue, 07 Jan 2020 06:07:34 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"725cf1b04be851c6"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 06 Jan 2021 06:07:34 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/011912050130240/v0/ Frame 24DB
152 KB
41 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/v0/amp-analytics-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ab99b94ce42722a9b966906754075df92c870cb9ff1aa1c48920008806079153
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
2655
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
41415
x-xss-protection
0
server
sffe
date
Wed, 08 Jan 2020 16:05:21 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"66b88e0b1300c1e3"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 07 Jan 2021 16:05:21 GMT
amp-animation-0.1.js
cdn.ampproject.org/rtv/011912050130240/v0/ Frame 24DB
103 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/v0/amp-animation-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ae41bced418c14749e6488a5ee99fc411408d46fbcd5f92232ac012302829556
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
1668206
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
29113
x-xss-protection
0
server
sffe
date
Fri, 20 Dec 2019 09:26:10 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"9b49c9f0684a68ae"
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 19 Dec 2020 09:26:10 GMT
amp-fit-text-0.1.js
cdn.ampproject.org/rtv/011912050130240/v0/ Frame 24DB
3 KB
2 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/v0/amp-fit-text-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
627128aa43dc242642c6d678f53ebface174b2a3a3de58522b644fd5c61c5f67
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
124923
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1398
x-xss-protection
0
server
sffe
date
Tue, 07 Jan 2020 06:07:33 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"0b9648fcbc3c015a"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 06 Jan 2021 06:07:33 GMT
amp-form-0.1.js
cdn.ampproject.org/rtv/011912050130240/v0/ Frame 24DB
45 KB
14 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/011912050130240/v0/amp-form-0.1.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010201.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
816ec7f0b489b0fd32872606d9458c49ac0d3f3fcbb901bd0a38f797d2eb14b1
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
124922
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14335
x-xss-protection
0
server
sffe
date
Tue, 07 Jan 2020 06:07:34 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"e120bec091dd60ce"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 06 Jan 2021 06:07:34 GMT
truncated
/ Frame 24DB
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7f02cbc19311a8fe576d45bb17b168cfa44141874a92271c02b4ecc356037b15

Request headers

Referer
https://www.onlinewarnungen.de/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=gpt_sz&pvsid=2804723033592515&r=320x50%7C250x250&w=250&h=250
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 08 Jan 2020 16:49:36 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
de.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 24DB
3 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/de.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
8471f381394962167d7d0cbbd9ffbd1f19d3ef6c48a7d9e3209142e674481368
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 11:08:44 GMT
x-content-type-options
nosniff
content-type
image/png
server
cafe
age
20451
etag
6601037253665971276
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2958
x-xss-protection
0
expires
Thu, 09 Jan 2020 11:08:44 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 24DB
295 B
426 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 11:08:48 GMT
x-content-type-options
nosniff
content-type
image/png
server
cafe
age
20447
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
295
x-xss-protection
0
expires
Thu, 09 Jan 2020 11:08:48 GMT
l
www.google.com/ads/measurement/ Frame 24DB
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaQ7EeqwlxouQ95wjf3_Eoq5s8o9cXr5Au48W5xDcK0uUkyyAlbICnoagRmPoEIjhybfFhwsr1QH-WYhRDbLll8TqNxhAw
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

adview
securepubads.g.doubleclick.net/pagead/ Frame 24DB
0
0
Image
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CsXRvHwgWXsq3G5nzgAezipTYB4KHrtFa19eo9rEK37rn09oPEAEgg6mlIWCVAqABm4jRnwPIAQmpAgeIObnSqrI-4AIAqAMByAMIqgS4Ak_QlARdb3w3Kf0Z1yJCJyenbsi67gBu3Lb1Ou-5zAGOWVBmjpTJQRAa5cJhCGUmaH1f7kPxc8j50A92MlgQG_ECtfNq3bojIz-EH0LRxnCKjPgq1yYNWHKCuY9nUeXdD05XMkzmWJsOQl8Ap9l7vvmY4jKdK2pEJBSRA905vRWjtm4BTRpYChAhjA3FQDpwW06yr_if_jW7OiLqGTIwlDXfGEL8pCeuQlRM82S21LJ8hP3cGyGc_4qgfDOJnrhEtIxlNo907ha3Z4Wpb82nUdMxOLofdhHSi_n0M1QVso8vAnx-XCUXc77y20JnMvLx7R49o3nz6xeU_xrWN-RGP6wAShU5mQJrJc7W2u-1VyMXAGfAvKws4rpAexJwsIeDepU5j1dQCMrNWchZPlXLk9IHMUmz5g45a8AE3_yborUC4AQBkgUECAQYAZIFBAgFGASgBi6AB833rmCoB47OG6gH1ckbqAeT2BuoB7oGqAfy2RuoB6a-G6gH7NUb2AcA8gcEEKqmENIICQiA4YAQEAEYHfIIG2FkeC1zdWJzeW4tOTUyODExMTE5MTI5Njc1MYAKA8gLAdgTDA&sigh=0l5uVOirfBc&template_id=419&tpd=AGWhJmsUFSRXqpWRSIFMzToACrYGelSlm0xxjRvMTNbu0WvOiQ
Requested by
Host: www.onlinewarnungen.de
URL: https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.98 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s45-in-f2.1e100.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

truncated
/ Frame CE39
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ab3d0ec5ada2e3637bcb1679aa6b5926f08deb929b85772f21ce02907c584b37

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame ECB8
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a0e331788e94e627fcc39060dcd78f39feadcecb2c1cbe4556bd8deaca5fff3b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
integrator.js
adservice.google.de/adsid/ Frame CE39
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.onlinewarnungen.de
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame CE39
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.onlinewarnungen.de
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20200106/r20190131/ Frame CE39
245 KB
89 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200106/r20190131/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
c4e6f0844019e3fbc787254589005b833b1379396b898662b8c0a8cd7920ff11
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
91029
x-xss-protection
0
server
cafe
etag
6870911772136061048
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Wed, 08 Jan 2020 16:49:36 GMT
integrator.js
adservice.google.de/adsid/ Frame ECB8
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.onlinewarnungen.de
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame ECB8
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.onlinewarnungen.de
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20200106/r20190131/ Frame ECB8
245 KB
89 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200106/r20190131/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
c4e6f0844019e3fbc787254589005b833b1379396b898662b8c0a8cd7920ff11
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
91029
x-xss-protection
0
server
cafe
etag
6870911772136061048
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Wed, 08 Jan 2020 16:49:36 GMT
ytnKZHNmqtm43qzqVtnqAVpAWWTtFiKnN7T4YwkDCoM1A48wM80miw==
ads.adaptv.advertising.com/a/h/
3 KB
1 KB
XHR
General
Full URL
https://ads.adaptv.advertising.com/a/h/ytnKZHNmqtm43qzqVtnqAVpAWWTtFiKnN7T4YwkDCoM1A48wM80miw==?cb=1578502176132&gdpr=1&gdpr_consent=&pet=preroll&pageUrl=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&eov=eov
Requested by
Host: player.inforsea.com
URL: https://player.inforsea.com/player.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.124.138.137 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-124-138-137.eu-central-1.compute.amazonaws.com
Software
adaptv/1.0 /
Resource Hash
96f3e2fbc51454dec1fdbb61b3bf467240254d90101bc31375d0e4d553ae04e9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Content-Encoding
gzip
Server
adaptv/1.0
Content-Type
text/xml
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
no-cache, no-store, must-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
995
Expires
0
ac
www8.smartadserver.com/
Redirect Chain
  • https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502176133&pgDomain=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnung...
  • https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502176133&pgDomain=https%3a%2f%2fwww.onlinewarnungen.de%2fwarnung...
0
-1 B
XHR
General
Full URL
https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502176133&pgDomain=https%3a%2f%2fwww.onlinewarnungen.de%2fwarnungsticker%2fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2f&gdpr=1&gdpr_consent=&vaf=0&vpaidt=js&vpaidv=1%2c2&cklb=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.137.32 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:35 GMT
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Location
https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502176133&pgDomain=https%3a%2f%2fwww.onlinewarnungen.de%2fwarnungsticker%2fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2f&gdpr=1&gdpr_consent=&vaf=0&vpaidt=js&vpaidv=1%2c2&cklb=1
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
text/html; charset=utf-8
Content-Length
518
Expires
-1

Redirect headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:35 GMT
Location
https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502176133&pgDomain=https%3a%2f%2fwww.onlinewarnungen.de%2fwarnungsticker%2fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2f&gdpr=1&gdpr_consent=&vaf=0&vpaidt=js&vpaidv=1%2c2&cklb=1
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
text/html; charset=utf-8
Content-Length
518
Expires
-1
pixel
cm.g.doubleclick.net/
Redirect Chain
  • https://videointelligence-d.openx.net/v/1.0/av?auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=157850...
  • https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
0
-1 B
XHR
General
Full URL
https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.173.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:36 GMT
content-encoding
gzip
p3p
CP="CUR ADM OUR NOR STA NID", CP="CUR ADM OUR NOR STA NID"
status
302
alt-svc
clear
content-length
0
via
1.1 google
pragma
no-cache
server
OXGW/16.173.0
location
https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
vary
Accept-Encoding
content-type
text/xml
access-control-allow-origin
https://www.onlinewarnungen.de
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
expires
Mon, 26 Jul 1997 05:00:00 GMT

Redirect headers

date
Wed, 08 Jan 2020 16:49:36 GMT
content-encoding
gzip
vary
Accept-Encoding
access-control-allow-origin
https://www.onlinewarnungen.de
p3p
CP="CUR ADM OUR NOR STA NID", CP="CUR ADM OUR NOR STA NID"
status
302
alt-svc
clear
content-length
0
pragma
no-cache
server
OXGW/16.173.0
location
https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
content-type
text/xml
via
1.1 google
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
expires
Mon, 26 Jul 1997 05:00:00 GMT
vast.xml
video-ads.rubiconproject.com/video/15476/239056/1208800/201/
2 KB
2 KB
XHR
General
Full URL
https://video-ads.rubiconproject.com/video/15476/239056/1208800/201/vast.xml?tg_c.language=de&schain=1.0,1!vi.ai,617345935087486,1
Requested by
Host: player.inforsea.com
URL: https://player.inforsea.com/player.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.34.190.24 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-34-190-24.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash
9521f214883de7f7271b1a49b4f1cb0e25a0ad49cbcd387b7febc4a34b23c072

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:37 GMT
Content-Encoding
gzip
Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Access-Control-Allow-Methods
POST, GET, PUT, OPTIONS, PATCH, DELETE
Content-Type
text/xml
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
public, must-revalidate, max-age=0, s-maxage=600
Access-Control-Allow-Credentials
true
Connection
keep-alive
Access-Control-Allow-Headers
X-Accept-Charset,X-Accept,Content-Type
Content-Length
946
Expires
Wed, 08 Jan 2020 16:49:37 GMT
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=r&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=4603030936214&publisher_id=617345935087486&country=BE&ad_source_id=5d00ea2b28a0612f902e6104&sell_cpm=8.4&request_cost=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:36 GMT
Server
nginx/1.15.8
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=r&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=3622626712244&publisher_id=617345935087486&country=BE&ad_source_id=5d00e5ff28a0611dc803c6c1&sell_cpm=8.74&request_cost=0.0085
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:36 GMT
Server
nginx/1.15.8
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=r&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=4463802904590&publisher_id=617345935087486&country=BE&ad_source_id=5d00e61628a06146bf4f1be6&sell_cpm=7.88&request_cost=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:36 GMT
Server
nginx/1.15.8
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=r&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=2217291638602&publisher_id=617345935087486&country=BE&ad_source_id=5d14c18a28a06159e85621ff&sell_cpm=6.4&request_cost=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:36 GMT
Server
nginx/1.15.8
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=r&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=6027907881986&publisher_id=617345935087486&country=BE&ad_source_id=5d00d456073ef4433704a9ae&sell_cpm=6.16&request_cost=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:36 GMT
Server
nginx/1.15.8
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 0AE3
266 KB
91 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.inforsea.com
URL: https://player.inforsea.com/player.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
90a43b652ab91079e4fd2496b2808d68026812c8e48e868fe34122967fe8afd7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
92630
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:36 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 2824
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2610021889825704&output=html&h=250&slotname=8539990066&adk=2572337104&adf=3173046724&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1578502176066&bpp=13&bdt=111&fdt=117&idt=117&shv=r20200106&cbv=r20190131&saldr=aa&correlator=2430970769009&frm=23&ife=4&pv=1&ga_vid=1346644779.1578502174&ga_sid=1578502176&ga_hid=139417971&ga_fc=0&iag=3&icsg=682&nhd=1&dssz=12&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=278&ady=1202&biw=1585&bih=1200&isw=300&ish=250&ifk=59370869&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=4492729583185787&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.n247d5uyxmpk&btvi=1&fsb=1&dtd=124
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200106/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
Content-Security-Policy child-src 'unsafe-inline' cm.g.doubleclick.net googleads.g.doubleclick.net www.google.com accounts.google.com pagead2.googlesyndication.com/pagead/s/cookie_push.html gmsg: https://tpc.googlesyndication.com/sadbundle/$csp%3Der3$/11571269797630472266/Index_300x250.html;frame-src 'unsafe-inline' cm.g.doubleclick.net googleads.g.doubleclick.net www.google.com accounts.google.com pagead2.googlesyndication.com/pagead/s/cookie_push.html gmsg: https://tpc.googlesyndication.com/sadbundle/$csp%3Der3$/11571269797630472266/Index_300x250.html;report-uri https://pagead2.googlesyndication.com/pagead/gen_csp?id=adbundle&qqi=CM709eu69OYCFUVY5Qod72gPQQ&gqi=IAgWXrWdDNKN7_UP-vu-sA8&layout=/sadbundle/%24csp%253Der3%24/11571269797630472266/Index_300x250.html
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-2610021889825704&output=html&h=250&slotname=8539990066&adk=2572337104&adf=3173046724&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1578502176066&bpp=13&bdt=111&fdt=117&idt=117&shv=r20200106&cbv=r20190131&saldr=aa&correlator=2430970769009&frm=23&ife=4&pv=1&ga_vid=1346644779.1578502174&ga_sid=1578502176&ga_hid=139417971&ga_fc=0&iag=3&icsg=682&nhd=1&dssz=12&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=278&ady=1202&biw=1585&bih=1200&isw=300&ish=250&ifk=59370869&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=4492729583185787&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.n247d5uyxmpk&btvi=1&fsb=1&dtd=124
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
accept-encoding
gzip, deflate, br
cookie
IDE=AHWqTUmT5lJ3Ki2_Kw7BH_NfUDIQ1jGa1WXO_6GEwyBdgeq7tEl-Sot0psNhUhQF
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-security-policy
child-src 'unsafe-inline' cm.g.doubleclick.net googleads.g.doubleclick.net www.google.com accounts.google.com pagead2.googlesyndication.com/pagead/s/cookie_push.html gmsg: https://tpc.googlesyndication.com/sadbundle/$csp%3Der3$/11571269797630472266/Index_300x250.html;frame-src 'unsafe-inline' cm.g.doubleclick.net googleads.g.doubleclick.net www.google.com accounts.google.com pagead2.googlesyndication.com/pagead/s/cookie_push.html gmsg: https://tpc.googlesyndication.com/sadbundle/$csp%3Der3$/11571269797630472266/Index_300x250.html;report-uri https://pagead2.googlesyndication.com/pagead/gen_csp?id=adbundle&qqi=CM709eu69OYCFUVY5Qod72gPQQ&gqi=IAgWXrWdDNKN7_UP-vu-sA8&layout=/sadbundle/%24csp%253Der3%24/11571269797630472266/Index_300x250.html
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 08 Jan 2020 16:49:36 GMT
server
cafe
content-length
29028
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame CE39
76 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200106/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
482be4cb0a6b75d6e67bf57c9f04660bf7010afbe3d6fb44b56e5885cb72ea6f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1578313968550048"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28663
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:36 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 56EA
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2610021889825704&output=html&h=250&slotname=8506779597&adk=3419700416&adf=776186313&w=250&psa=0&guci=1.2.0.0.2.2.0.0&format=250x250&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1578502176086&bpp=5&bdt=114&fdt=132&idt=132&shv=r20200106&cbv=r20190131&saldr=aa&correlator=2430970769009&frm=23&ife=4&pv=1&ga_vid=1346644779.1578502174&ga_sid=1578502176&ga_hid=1674768030&ga_fc=0&iag=3&icsg=682&nhd=1&dssz=12&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=805&ady=12440&biw=1585&bih=1200&isw=238&ish=250&ifk=1621487864&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=593755614609074&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C238%2C250&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.54wjibfi386&btvi=1&fsb=1&dtd=136
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200106/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
Content-Security-Policy child-src 'unsafe-inline' cm.g.doubleclick.net googleads.g.doubleclick.net www.google.com accounts.google.com pagead2.googlesyndication.com/pagead/s/cookie_push.html gmsg: https://tpc.googlesyndication.com/sadbundle/$csp%3Der3$/11571269797630472266/Index_300x250.html;frame-src 'unsafe-inline' cm.g.doubleclick.net googleads.g.doubleclick.net www.google.com accounts.google.com pagead2.googlesyndication.com/pagead/s/cookie_push.html gmsg: https://tpc.googlesyndication.com/sadbundle/$csp%3Der3$/11571269797630472266/Index_300x250.html;report-uri https://pagead2.googlesyndication.com/pagead/gen_csp?id=adbundle&qqi=CKP79-u69OYCFcjGuwgdpyQEjQ&gqi=IAgWXqObDuGP7_UPiNW9yAM&layout=/sadbundle/%24csp%253Der3%24/11571269797630472266/Index_300x250.html
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-2610021889825704&output=html&h=250&slotname=8506779597&adk=3419700416&adf=776186313&w=250&psa=0&guci=1.2.0.0.2.2.0.0&format=250x250&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1578502176086&bpp=5&bdt=114&fdt=132&idt=132&shv=r20200106&cbv=r20190131&saldr=aa&correlator=2430970769009&frm=23&ife=4&pv=1&ga_vid=1346644779.1578502174&ga_sid=1578502176&ga_hid=1674768030&ga_fc=0&iag=3&icsg=682&nhd=1&dssz=12&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=805&ady=12440&biw=1585&bih=1200&isw=238&ish=250&ifk=1621487864&scr_x=0&scr_y=0&eid=21065125&oid=3&pvsid=593755614609074&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C238%2C250&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.54wjibfi386&btvi=1&fsb=1&dtd=136
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
accept-encoding
gzip, deflate, br
cookie
IDE=AHWqTUmT5lJ3Ki2_Kw7BH_NfUDIQ1jGa1WXO_6GEwyBdgeq7tEl-Sot0psNhUhQF
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-security-policy
child-src 'unsafe-inline' cm.g.doubleclick.net googleads.g.doubleclick.net www.google.com accounts.google.com pagead2.googlesyndication.com/pagead/s/cookie_push.html gmsg: https://tpc.googlesyndication.com/sadbundle/$csp%3Der3$/11571269797630472266/Index_300x250.html;frame-src 'unsafe-inline' cm.g.doubleclick.net googleads.g.doubleclick.net www.google.com accounts.google.com pagead2.googlesyndication.com/pagead/s/cookie_push.html gmsg: https://tpc.googlesyndication.com/sadbundle/$csp%3Der3$/11571269797630472266/Index_300x250.html;report-uri https://pagead2.googlesyndication.com/pagead/gen_csp?id=adbundle&qqi=CKP79-u69OYCFcjGuwgdpyQEjQ&gqi=IAgWXqObDuGP7_UPiNW9yAM&layout=/sadbundle/%24csp%253Der3%24/11571269797630472266/Index_300x250.html
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 08 Jan 2020 16:49:36 GMT
server
cafe
content-length
30165
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame ECB8
76 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200106/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
482be4cb0a6b75d6e67bf57c9f04660bf7010afbe3d6fb44b56e5885cb72ea6f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1578313968550048"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28663
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:36 GMT
de.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 24DB
3 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/de.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011912050130240/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
8471f381394962167d7d0cbbd9ffbd1f19d3ef6c48a7d9e3209142e674481368
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 11:08:44 GMT
x-content-type-options
nosniff
content-type
image/png
server
cafe
age
20452
etag
6601037253665971276
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2958
x-xss-protection
0
expires
Thu, 09 Jan 2020 11:08:44 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 24DB
295 B
360 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/011912050130240/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 11:08:48 GMT
x-content-type-options
nosniff
content-type
image/png
server
cafe
age
20448
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
295
x-xss-protection
0
expires
Thu, 09 Jan 2020 11:08:48 GMT
bridge3.355.4_en.html
imasdk.googleapis.com/js/core/ Frame 2D1D
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.355.4_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.355.4_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196298
date
Tue, 07 Jan 2020 10:39:02 GMT
expires
Wed, 06 Jan 2021 10:39:02 GMT
last-modified
Fri, 03 Jan 2020 15:54:04 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
108634
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 0AE3
26 KB
11 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:36 GMT
integrator.js
adservice.google.com/adsid/ Frame 0AE3
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.onlinewarnungen.de
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
ac
www8.smartadserver.com/
129 B
2 KB
XHR
General
Full URL
https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502176133&pgDomain=https%3a%2f%2fwww.onlinewarnungen.de%2fwarnungsticker%2fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2f&gdpr=1&gdpr_consent=&vaf=0&vpaidt=js&vpaidv=1%2c2&cklb=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.137.32 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
0d782e0d957a825f22dbac3cd223537a4b428d1bdd6118eb8f18007ba6fa4c76

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:37 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
text/xml; charset=utf-8
Content-Length
228
Expires
-1
o2shim
acds.prod.vidible.tv/ Frame FBE7
15 KB
7 KB
Script
General
Full URL
https://acds.prod.vidible.tv/o2shim?companionId=&cpmPassback=&placementId=1240293&orgId=24831&injectCompanionDummy=&pauseOnClick=&d.vw=&d.app=&r=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&vrid=0dc35799-55d4-4b41-aa1f-b7fb4648b9fe&pblob=
Requested by
Host: player.inforsea.com
URL: https://player.inforsea.com/player.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.200.166.248 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-200-166-248.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
a3e0626b196671f739e3456ba14c6433c82263b4666ebfd3e0f5c1813eee5323

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 08 Jan 2020 16:49:36 GMT
Content-Encoding
gzip
Access-Control-Max-Age
3600
Access-Control-Allow-Methods
POST, GET, HEAD, PUT, PATCH, DELETE
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Connection
keep-alive
Access-Control-Allow-Headers
Content-Length
6666
0.js
cdn-ssl.vidible.tv/prod/ad-client/js/10.2.16/ Frame FBE7
344 KB
111 KB
Script
General
Full URL
https://cdn-ssl.vidible.tv/prod/ad-client/js/10.2.16/0.js
Requested by
Host: acds.prod.vidible.tv
URL: https://acds.prod.vidible.tv/o2shim?companionId=&cpmPassback=&placementId=1240293&orgId=24831&injectCompanionDummy=&pauseOnClick=&d.vw=&d.app=&r=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&vrid=0dc35799-55d4-4b41-aa1f-b7fb4648b9fe&pblob=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1288:f03d:1fa::4000 , United Kingdom, ASN10310 (YAHOO-1 - Oath Holdings Inc., US),
Reverse DNS
Software
ATS /
Resource Hash
ec086bd82d6287b251c334281ee5c534959640432421aa7a6e3664ac3b90375a
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 12:29:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
15579
x-amz-server-side-encryption
AES256
status
200
content-length
113151
strict-transport-security
max-age=15552000
x-amz-request-id
7D813C3226786190
x-amz-id-2
uX/Vu3zeHLA6t20ugZ9nRUTTeud2QvMfMntxHbgEyH1dK3NMWgOf5QOup1ArpBxpNXvFLpmj6Gc=
referrer-policy
no-referrer-when-downgrade
last-modified
Wed, 08 Jan 2020 12:00:47 GMT
server
ATS
etag
"6e6ed520b634f2c7f3f494c90076175c-df"
expect-ct
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
vary
Accept-Encoding
access-control-allow-methods
GET
x-amz-version-id
null
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
max-age=1209600
accept-ranges
bytes
content-type
application/javascript
impression.gif
trk.vidible.tv/trk/ Frame FBE7
43 B
363 B
Image
General
Full URL
https://trk.vidible.tv/trk/impression.gif?pid=59947c0544a64b1a49e52a48&bcid=59fa23617cdce062bad2cec3&s=true&pv=10.2.16&ifr=true&cb=0.9373093480924344&pt=o2unit&sid=449ec833-2076-4ed4-aaf5-72283667345b&r=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.93.75.206 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-93-75-206.eu-central-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 08 Jan 2020 16:49:36 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx/1.10.3 (Ubuntu)
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
43
Expires
Wed, 08 Jan 2020 16:49:36 GMT
sd
us-u.openx.net/w/1.0/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
  • https://us-u.openx.net/w/1.0/sd?id=537072991&val=CAESEPJfA2NVmGtYaZzgnlHI_tU&google_cver=1
0
0

log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=e&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=3736239153421&publisher_id=617345935087486&country=BE&ad_source_id=5d00e61628a06146bf4f1be6&sell_cpm=7.88&request_cost=0&message=ad-player%20init%20error%3A%20name%3A%20TypeError%2C%20message%3A%20Network%20request%20failed
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:36 GMT
Server
nginx/1.15.8
411f1e96-3bde-4d85-b17e-63749e5f0695.js
dtm.advertising.com/ Frame FBE7
0
0

moatapi.js
z.moatads.com/aolvidibleapi29384728347/
133 KB
44 KB
Script
General
Full URL
https://z.moatads.com/aolvidibleapi29384728347/moatapi.js
Requested by
Host: cdn-ssl.vidible.tv
URL: https://cdn-ssl.vidible.tv/prod/ad-client/js/10.2.16/0.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.197.246 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-197-246.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ae8dd8617d923f0098d9278754faf1693030212d957544608a5ccf7f51c88079

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 08 Jan 2020 16:49:36 GMT
Content-Encoding
gzip
Last-Modified
Tue, 28 Nov 2017 15:04:46 GMT
Server
AmazonS3
x-amz-request-id
536D87EC542450F7
ETag
"b464a76f8a9370e63ef6d538d84c7ef7"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=12203
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
44278
x-amz-id-2
4EMBI9Z96/T6cNyZjwSVVciHN/8Ko2xldOpDhPYWVsXRN8HU6dQ2SPl2jDgQVh/m+9e3AbbqMiQ=
ytnKZHNmqtm43qzqVtnqAVpAWWTtFiKnN7T4YwkDCoM1A48wM80miw==
ads.adaptv.advertising.com/a/h/ Frame FBE7
249 B
0
XHR
General
Full URL
https://ads.adaptv.advertising.com/a/h/ytnKZHNmqtm43qzqVtnqAVpAWWTtFiKnN7T4YwkDCoM1A48wM80miw==?cb=1578502176132&gdpr=1&gdpr_consent=&pet=preroll&pageUrl=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&eov=eov&a.cluster=0&a.pvt=0&a.d.pageUrl=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&a.hasAppInfo=2&a.sdk=o2unit&a.sdkType=js&depth=0&height=278&moatViewableOpportunity=100&p.vw.active=1&p.vw.psize=2&p.vw.viewable=1&p.vw.viewableOpportunity=1&referrerUrl=&width=494
Requested by
Host: cdn-ssl.vidible.tv
URL: https://cdn-ssl.vidible.tv/prod/ad-client/js/10.2.16/0.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.124.138.137 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-124-138-137.eu-central-1.compute.amazonaws.com
Software
adaptv/1.0 /
Resource Hash

Request headers

Accept
text/javascript, application/json, text/html, application/xml, text/xml, */*
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Content-Encoding
gzip
Server
adaptv/1.0
Content-Type
text/xml
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
no-cache, no-store, must-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
192
Expires
0
display.gif
trk.vidible.tv/trk/ Frame FBE7
43 B
363 B
Image
General
Full URL
https://trk.vidible.tv/trk/display.gif?bcid=59fa23617cdce062bad2cec3&bid=56bcd17de4b0a5976ac0da12&pid=59947c0544a64b1a49e52a48&pt=o2unit&pv=10.2.16&r=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&s=true&sid=449ec833-2076-4ed4-aaf5-72283667345b&vvuid=9156c26a-5188-4e42-acfd-fc83ac9918ee&orgId=24831&plcid=1240293&vrid=0dc35799-55d4-4b41-aa1f-b7fb4648b9fe&ab=0&dt=161&h=278&spaceid=793604934&w=494&cb=0.5302512474652481
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.93.75.206 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-93-75-206.eu-central-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 08 Jan 2020 16:49:36 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx/1.10.3 (Ubuntu)
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
43
Expires
Wed, 08 Jan 2020 16:49:36 GMT
ad-request.gif
trk.vidible.tv/trk/ Frame FBE7
43 B
363 B
Image
General
Full URL
https://trk.vidible.tv/trk/ad-request.gif?bcid=59fa23617cdce062bad2cec3&bid=56bcd17de4b0a5976ac0da12&pid=59947c0544a64b1a49e52a48&pt=o2unit&pv=10.2.16&r=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&s=true&sid=449ec833-2076-4ed4-aaf5-72283667345b&vvuid=9156c26a-5188-4e42-acfd-fc83ac9918ee&orgId=24831&plcid=1240293&vrid=0dc35799-55d4-4b41-aa1f-b7fb4648b9fe&at=preroll&ps=html5-vpaid&spaceid=793604934&p.vw.active=1&p.vw.sound=0&vwa=100&vwm=-1&cb=0.1728369433314938
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.93.75.206 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-93-75-206.eu-central-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 08 Jan 2020 16:49:36 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx/1.10.3 (Ubuntu)
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
43
Expires
Wed, 08 Jan 2020 16:49:36 GMT
ad-engine-request.gif
trk.vidible.tv/trk/ Frame FBE7
43 B
363 B
Image
General
Full URL
https://trk.vidible.tv/trk/ad-engine-request.gif?bcid=59fa23617cdce062bad2cec3&bid=56bcd17de4b0a5976ac0da12&pid=59947c0544a64b1a49e52a48&pt=o2unit&pv=10.2.16&r=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&s=true&sid=449ec833-2076-4ed4-aaf5-72283667345b&vvuid=9156c26a-5188-4e42-acfd-fc83ac9918ee&orgId=24831&plcid=1240293&vrid=0dc35799-55d4-4b41-aa1f-b7fb4648b9fe&at=preroll&adIdx=-1&pbl=true&ps=html5-vpaid&seq=-1&spaceid=793604934&v=593fb311c214e33ec50202f0&w=494&p.vw.active=1&p.vw.sound=0&vwa=100&vwm=-1&h=278&cb=0.6460604737038469
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.93.75.206 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-93-75-206.eu-central-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 08 Jan 2020 16:49:36 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx/1.10.3 (Ubuntu)
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
43
Expires
Wed, 08 Jan 2020 16:49:36 GMT
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=e&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=6978903096921&publisher_id=617345935087486&country=BE&ad_source_id=5d00d456073ef4433704a9ae&sell_cpm=6.16&request_cost=0&message=ad-player%20init%20error%3A%20name%3A%20Error%2C%20message%3A%20adsLoader%20AD_ERROR%3A%20AdError%201009%3A%20The%20VAST%20response%20document%20is%20empty.
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:36 GMT
Server
nginx/1.15.8
pixel.gif
px.moatads.com/
43 B
419 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&ac=1&bq=7&i=AOL_VIDIBLE_API1&t=1578502176759&de=266624579928&d=248%3A-%3A-%3A-&bo=onlinewarnungen.de&bd=onlinewarnungen.de&f=0&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.197.246 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-197-246.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:37 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
AkamaiNetStorage
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Wed, 08 Jan 2020 16:49:37 GMT
ad-engine-response.gif
trk.vidible.tv/trk/ Frame FBE7
0
0

log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=e&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=7285653582987&publisher_id=617345935087486&country=BE&ad_source_id=5d00ea2b28a0612f902e6104&sell_cpm=8.4&request_cost=0&message=ad-player%20init%20error%3A%20name%3A%20Error%2C%20message%3A%20AdError%20before%20AdLoadedNo%20ads%20provided%2C%20ad%20engine%20did%20not%20finish%20loading
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:36 GMT
Server
nginx/1.15.8
bridge-30735.js
video-ads.rubiconproject.com/video/ Frame 68FB
63 KB
20 KB
Script
General
Full URL
https://video-ads.rubiconproject.com/video/bridge-30735.js
Requested by
Host: player.inforsea.com
URL: https://player.inforsea.com/player.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.34.190.24 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-34-190-24.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) /
Resource Hash
7490c867743ec0fa87816741bbd174e5789547feccd019fb485ecac42659f2ce

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 08 Jan 2020 16:49:37 GMT
Content-Encoding
gzip
Last-Modified
Wed, 11 Dec 2019 15:30:56 GMT
Server
Apache/2.2.15 (CentOS)
ETag
"12010b-fab2-5996f50964c00"
Vary
Accept-Encoding
Access-Control-Allow-Methods
POST, GET, PUT, OPTIONS, PATCH, DELETE
Content-Type
text/javascript
Access-Control-Allow-Origin
Access-Control-Allow-Credentials
true
Connection
keep-alive
Accept-Ranges
bytes
Access-Control-Allow-Headers
X-Accept-Charset,X-Accept,Content-Type
Content-Length
19516
activeview
pagead2.googlesyndication.com/pcs/ Frame 24DB
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssYTtfISynm3l5yzG9z9w8uyDZ5FfNVc1Equ7gHHwzfYN4bk1XEgzo7-eycbfSFOUxg4dGegES95mZn8y8A_QoFiMDm7IGiSpB2EWygZIUVEt6AVJ2qOWnD5gG_yQ&sai=AMfl-YSAm5kragfQsxCoKY_7qhGa5uJ0jc-h_DUbrCSGLxaJ6k6mavejQXN6kWysIcmNZoNu8NUGGudB9-YKLkp-HaChG45TELeyYDnIqzWU200S1q9Uf6N89CNEm9A&sig=Cg0ArKJSzCs8_rxzug-3EAE&cid=CAASF-Rovyamrmugop9CPVwNEjsw3DtGPneW&id=ampim&o=1353,85&d=0,600&ss=1600,1200&bs=1600,1200&mcvt=1001&mtos=0,0,1001,1001,1001&tos=0,0,1001,0,0&tfs=187&tls=1188&g=100&h=100&tt=1188&r=v&adk=996357360&avms=ampa
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 08 Jan 2020 16:49:37 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
shim.gif
creatives.sascdn.com/
43 B
378 B
Image
General
Full URL
https://creatives.sascdn.com/shim.gif
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a01:4a0:1338:28::c38a:ff18 , Germany, ASN201011 (NETZBETRIEB-GMBH, DE),
Reverse DNS
Software
Apache /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 08 Jan 2020 16:49:37 GMT
Last-Modified
Fri, 17 Aug 2018 12:23:00 GMT
Server
Apache
ETag
"221d8352905f2c38b3cb2bd191d630b0:1534508580"
Content-Type
image/gif
Cache-Control
max-age=31536000
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 07 Jan 2021 16:49:37 GMT
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=e&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=8174546207399&publisher_id=617345935087486&country=BE&ad_source_id=5d00e5ff28a0611dc803c6c1&sell_cpm=8.74&request_cost=0.0085&message=ad-player%20init%20error%3A%20name%3A%20Error%2C%20message%3A%20no%20ad%20found
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:37 GMT
Server
nginx/1.15.8
vast.xml
optimized-by.rubiconproject.com/a/api/ Frame 68FB
195 B
2 KB
XHR
General
Full URL
https://optimized-by.rubiconproject.com/a/api/vast.xml?account_id=15476&site_id=239056&zone_id=1208800&size_id=201&tg_c.language=de&schain=1.0,1!vi.ai,617345935087486,1&p_window.depth=0&rf=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&p_window.url=&p_window.w=1600&p_window.h=1200&p_aso.video.ext.ad.w=494&p_aso.video.ext.ad.h=278&width=494&height=278&p_aso.video.api=2&p_aso.video.mimes=application/javascript,video/mp4&tk_vpaid=1&cb=7057163744584218&rp_secure=1
Requested by
Host: video-ads.rubiconproject.com
URL: https://video-ads.rubiconproject.com/video/bridge-30735.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
38cc5e638623027e14d83d21653e26a5d1f005289c2c87645fadf419fa520dc3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:37 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/xml
Keep-Alive
timeout=5, max=367
Content-Length
195
Expires
Wed, 17 Sep 1975 21:32:10 GMT
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=e&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=7287087062603&publisher_id=617345935087486&country=BE&ad_source_id=5d14c18a28a06159e85621ff&sell_cpm=6.4&request_cost=0&message=ad-player%20init%20error%3A%20name%3A%20Error%2C%20message%3A%20AdError%20before%20AdLoadedunknown%20error
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:37 GMT
Server
nginx/1.15.8
async_lib.js
farm.plista.com/
83 B
1 KB
Script
General
Full URL
https://farm.plista.com/async_lib.js?json=%7B%22name%22%3A%22PLISTA_%5B0%5D%22%2C%22publickey%22%3A%225169ee3af6a3cf63f28c6e8b%22%2C%22objectid%22%3A%229773%22%2C%22rev%22%3A1551432521%2C%22req%22%3A%5B%5B%22isarticle%22%2C%7B%22updated_at%22%3A1578133408%7D%5D%5D%7D&x=1578502179127
Requested by
Host: static.plista.com
URL: https://static.plista.com/async.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a01:4f8:191:8075::2 Heidelberg, Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
Software
nginx /
Resource Hash
6522e8f23fbc41f55f4f8215011e7ce062e7aaeae1bfed26eb8bb773dadf3583

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 08 Jan 2020 16:49:39 GMT
content-encoding
gzip
last-modified
Wed, 08 Jan 2020 16:49:39 GMT
server
nginx
p3p
policyref="https://www.plista.com/w3c/p3p.xml", CP="CAO DSP COR TAIa PSAa PSDa IVAi IVDi CONi HISa OUR IND PHY ONL UNI COM NAV INT DEM STA PRE"
status
200
cache-control
no-cache, must-revalidate
content-type
application/javascript; charset=utf-8
content-length
101
expires
Mon, 26 Jul 1997 05:00:00 GMT
usync.html
eus.rubiconproject.com/ Frame 059D
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/prebid-stg.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.37.55.184 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-37-55-184.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Accept-Encoding
gzip, deflate, br
Cookie
khaos=K55JFV7P-27-GKG6; rsid=1|G9C2NkZC7frDQSirzNt8MRPvuJlRI6aSli1gEtfhZ1co9sDCaATiL5HZCune57OIAnOxtVOqC2asF0OnXCb6RTSlnhlV1wM1rEAVOJ3hQEJK/2msCb8MYvaTRc+LdQHAVOjOykUPOC7vxP0wYMc82J8pBOyeej/Cc7UKraMB; ses201=; vis201=239056^1; audit=1|hLZGFuTafB0oiNpWXXtyd81+1ZYfrZ/aTAFfC41scNm1lH5yE/tQy5aB+j6fr8oKngB+rozAmzx1+C6lA3E8Rzk+9qiovQvZZ23Q5evvzU4=
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 07 Jan 2020 22:21:23 GMT
Content-Encoding
gzip
Content-Length
7750
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=20010
Expires
Wed, 08 Jan 2020 22:23:10 GMT
Date
Wed, 08 Jan 2020 16:49:40 GMT
Connection
keep-alive
Vary
Accept-Encoding
Cookie set showad.js
ads.pubmatic.com/AdServer/js/ Frame 0AFF
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/showad.js
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/prebid-stg.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.196.250 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-196-250.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

Server
Apache/2.2.15 (CentOS)
Last-Modified
Tue, 07 Jan 2020 10:54:20 GMT
ETag
"13006b6-973e-59b8a991d1e73"
Accept-Ranges
bytes
Content-Encoding
gzip
Set-Cookie
KTPCACOOKIE=YES; domain=.pubmatic.com; path=/; max-age=7776000;
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
14477
Content-Type
text/html; charset=UTF-8
Cache-Control
public, max-age=65380
Expires
Thu, 09 Jan 2020 10:59:20 GMT
Date
Wed, 08 Jan 2020 16:49:40 GMT
Connection
keep-alive
Vary
Accept-Encoding
redirect
sync.teads.tv/iframe/ Frame 30DF
Redirect Chain
  • https://sync.teads.tv/iframe?hb_provider=prebid&hb_version=2.36.0-pre&gdprIab=%7B%22status%22%3A0%7D&
  • https://sync.teads.tv/iframe/redirect?hb_provider=prebid&hb_version=2.36.0-pre&gdprIab=%7B%22status%22:0%7D&
0
0
Document
General
Full URL
https://sync.teads.tv/iframe/redirect?hb_provider=prebid&hb_version=2.36.0-pre&gdprIab=%7B%22status%22:0%7D&
Requested by
Host: cdntrf.com
URL: https://cdntrf.com/prebid-stg.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.45.108.93 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-108-93.deploy.static.akamaitechnologies.com
Software
akka-http/10.1.5 /
Resource Hash

Request headers

:method
GET
:authority
sync.teads.tv
:scheme
https
:path
/iframe/redirect?hb_provider=prebid&hb_version=2.36.0-pre&gdprIab=%7B%22status%22:0%7D&
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
accept-encoding
gzip, deflate, br
cookie
tt_viewer=1f68c59c-c622-4ad9-9b10-ec45466ed4d4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

status
200
content-type
text/html; charset=UTF-8
server
akka-http/10.1.5
content-length
153
expires
Wed, 08 Jan 2020 16:49:40 GMT
cache-control
max-age=0, no-cache, no-store
pragma
no-cache
date
Wed, 08 Jan 2020 16:49:40 GMT
set-cookie
tt_exelate=; Expires=Thu, 09 Jan 2020 16:49:40 GMT; Domain=.teads.tv; Secure; SameSite=None tt_bluekai=; Expires=Thu, 09 Jan 2020 16:49:40 GMT; Domain=.teads.tv; Secure; SameSite=None tt_emetriq=; Expires=Thu, 09 Jan 2020 16:49:40 GMT; Domain=.teads.tv; Secure; SameSite=None tt_liveramp=; Expires=Thu, 09 Jan 2020 16:49:40 GMT; Domain=.teads.tv; Secure; SameSite=None tt_neustar=; Expires=Thu, 09 Jan 2020 16:49:40 GMT; Domain=.teads.tv; Secure; SameSite=None tt_salesforce=; Expires=Thu, 09 Jan 2020 16:49:40 GMT; Domain=.teads.tv; Secure; SameSite=None tt_dar=; Expires=Thu, 09 Jan 2020 16:49:40 GMT; Domain=.teads.tv; Secure; SameSite=None tt_skp=; Expires=Thu, 09 Jan 2020 16:49:40 GMT; Domain=.teads.tv; Secure; SameSite=None

Redirect headers

status
302
content-type
text/html; charset=UTF-8
location
/iframe/redirect?hb_provider=prebid&hb_version=2.36.0-pre&gdprIab=%7B%22status%22:0%7D&
server
akka-http/10.1.5
content-length
160
expires
Wed, 08 Jan 2020 16:49:40 GMT
cache-control
max-age=0, no-cache, no-store
pragma
no-cache
date
Wed, 08 Jan 2020 16:49:40 GMT
set-cookie
tt_viewer=1f68c59c-c622-4ad9-9b10-ec45466ed4d4; Expires=Wed, 06 Jan 2021 16:49:40 GMT; Max-Age=31449600; Domain=.teads.tv; Path=/; Secure; SameSite=None
async_usersync.html
acdn.adnxs.com/ib/static/usersync/v3/ Frame A117
0
0

/
dmp.videoreach.com/sync/update/
Redirect Chain
  • https://sync.smartadserver.com/getuid?url=https%3A%2F%2Fdmp.videoreach.com%2Fsync%2Fupdate%2F%3Fs%3Dsas%26sasid%3D[sas_uid]%26uuid%3D688471a0-4d3b-4dfa-8fb0-72fa57654030
  • https://dmp.videoreach.com/sync/update/?s=sas&sasid=8529236688608573628&uuid=688471a0-4d3b-4dfa-8fb0-72fa57654030
0
304 B
Image
General
Full URL
https://dmp.videoreach.com/sync/update/?s=sas&sasid=8529236688608573628&uuid=688471a0-4d3b-4dfa-8fb0-72fa57654030
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
195.201.205.233 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
static.233.205.201.195.clients.your-server.de
Software
nginx/1.13.10 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:40 GMT
content-encoding
gzip
server
nginx/1.13.10
access-control-allow-origin
https://www.onlinewarnungen.de
access-control-allow-methods
GET, POST
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
status
200
access-control-allow-credentials
true
content-type
application/x-javascript

Redirect headers

Location
https://dmp.videoreach.com/sync/update/?s=sas&sasid=8529236688608573628&uuid=688471a0-4d3b-4dfa-8fb0-72fa57654030
Date
Wed, 08 Jan 2020 16:49:39 GMT
Cache-Control
private
Content-Length
238
Content-Type
text/html; charset=utf-8
match
match.360yield.com/ul_cb/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=improve_digital_eb&google_hm=nfr7x0iETLeJoWDTsKATxw&google_cm&publisher_dsp_id=340
  • https://cm.g.doubleclick.net/pixel?google_nid=improve_digital_eb&google_hm=nfr7x0iETLeJoWDTsKATxw&google_cm=&publisher_dsp_id=340&google_tc=
  • https://match.360yield.com/match?publisher_dsp_id=340&google_gid=CAESEHTl3IDBB3yi5gSs7TG0tzc&google_cver=1
  • https://match.360yield.com/ul_cb/match?publisher_dsp_id=340&google_gid=CAESEHTl3IDBB3yi5gSs7TG0tzc&google_cver=1
43 B
621 B
Image
General
Full URL
https://match.360yield.com/ul_cb/match?publisher_dsp_id=340&google_gid=CAESEHTl3IDBB3yi5gSs7TG0tzc&google_cver=1
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.59.77.252 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-59-77-252.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Wed, 08 Jan 2020 16:49:40 GMT
access-control-allow-origin
*
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
content-length
43
content-type
image/gif

Redirect headers

status
302
date
Wed, 08 Jan 2020 16:49:40 GMT
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
content-length
0
location
https://match.360yield.com:443/ul_cb/match?publisher_dsp_id=340&google_gid=CAESEHTl3IDBB3yi5gSs7TG0tzc&google_cver=1
content-type
text/plain
match
ad.360yield.com/
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=improve-digital&ttd_tpi=1&publisher_user_id=9dfafbc7-4884-4cb7-89a1-60d3b0a013c7&publisher_dsp_id=167&publisher_call_type=redirect&gdpr=1&gdpr_con...
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=improve-digital&ttd_tpi=1&publisher_user_id=9dfafbc7-4884-4cb7-89a1-60d3b0a013c7&publisher_dsp_id=167&publisher_call_type=redirect&gdpr=1&gdpr_con...
  • https://ad.360yield.com/match?publisher_dsp_id=167&external_user_id=62418e21-826e-4959-9539-0b929b8b2324
43 B
484 B
Image
General
Full URL
https://ad.360yield.com/match?publisher_dsp_id=167&external_user_id=62418e21-826e-4959-9539-0b929b8b2324
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.217.79 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-156-217-79.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Wed, 08 Jan 2020 16:49:40 GMT
access-control-allow-origin
*
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
content-length
43
content-type
image/gif

Redirect headers

pragma
no-cache
date
Wed, 08 Jan 2020 16:49:40 GMT
x-aspnet-version
4.0.30319
location
https://ad.360yield.com/match?publisher_dsp_id=167&external_user_id=62418e21-826e-4959-9539-0b929b8b2324
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
status
302
cache-control
private,no-cache, must-revalidate
content-type
text/html
content-length
239
match
ad.360yield.com/ul_cb/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=improvedigital&google_cm&google_sc&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA
  • https://cm.g.doubleclick.net/pixel?google_nid=improvedigital&google_cm=&google_sc=&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA&google_tc=
  • https://ad.360yield.com/match?publisher_dsp_id=55&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA&external_user_id=CAESELf26hxXKo7OuuY3HX-H-fM&google_cver=1
  • https://ad.360yield.com/ul_cb/match?publisher_dsp_id=55&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA&external_user_id=CAESELf26hxXKo7OuuY3HX-H-fM&google_cver=1
43 B
402 B
Image
General
Full URL
https://ad.360yield.com/ul_cb/match?publisher_dsp_id=55&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA&external_user_id=CAESELf26hxXKo7OuuY3HX-H-fM&google_cver=1
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.217.79 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-156-217-79.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Wed, 08 Jan 2020 16:49:40 GMT
access-control-allow-origin
*
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
content-length
43
content-type
image/gif

Redirect headers

status
302
date
Wed, 08 Jan 2020 16:49:40 GMT
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
content-length
0
location
https://ad.360yield.com:443/ul_cb/match?publisher_dsp_id=55&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA&external_user_id=CAESELf26hxXKo7OuuY3HX-H-fM&google_cver=1
content-type
text/plain
match
ice.360yield.com/ul_cb/
Redirect Chain
  • https://ib.adnxs.com/getuid?https://ice.360yield.com/match?external_user_id=$UID&publisher_dsp_id=40&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fice.360yield.com%2Fmatch%3Fexternal_user_id%3D%24UID%26publisher_dsp_id%3D40%26gdpr%3D1%26gdpr_consent%3DBOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA
  • https://ice.360yield.com/match?external_user_id=8540796340330875199&publisher_dsp_id=40&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA
  • https://ice.360yield.com/ul_cb/match?external_user_id=8540796340330875199&publisher_dsp_id=40&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA
43 B
391 B
Image
General
Full URL
https://ice.360yield.com/ul_cb/match?external_user_id=8540796340330875199&publisher_dsp_id=40&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.217.79 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-156-217-79.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Wed, 08 Jan 2020 16:49:40 GMT
access-control-allow-origin
*
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
content-length
43
content-type
image/gif

Redirect headers

status
302
date
Wed, 08 Jan 2020 16:49:40 GMT
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
content-length
0
location
https://ice.360yield.com:443/ul_cb/match?external_user_id=8540796340330875199&publisher_dsp_id=40&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAAENC2-AAAAtHAAA
content-type
text/plain
getuid
secure.adnxs.com/
0
0

match
ice.360yield.com/
Redirect Chain
  • https://track.adform.net/serving/cookie/match/?party=5&publisher_user_id=9dfafbc7-4884-4cb7-89a1-60d3b0a013c7&publisher_dsp_id=42&publisher_call_type=redirect&gdpr=1&gdpr_consent=BOo5SD7Os1UfVCLAAA...
  • https://track.adform.net/serving/cookie/match/?CC=1&party=5&publisher_user_id=9dfafbc7-4884-4cb7-89a1-60d3b0a013c7&publisher_dsp_id=42&publisher_call_type=redirect&gdpr=1&gdpr_consent=BOo5SD7Os1UfV...
  • https://ice.360yield.com/match?publisher_dsp_id=42&Expiration=1579711780&external_user_id=1964704384595627577
43 B
547 B
Image
General
Full URL
https://ice.360yield.com/match?publisher_dsp_id=42&Expiration=1579711780&external_user_id=1964704384595627577
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.217.79 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-156-217-79.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Wed, 08 Jan 2020 16:49:40 GMT
access-control-allow-origin
*
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
content-length
43
content-type
image/gif

Redirect headers

pragma
no-cache
date
Wed, 08 Jan 2020 16:49:40 GMT
server
nginx
access-control-allow-origin
*
location
https://ice.360yield.com/match?publisher_dsp_id=42&Expiration=1579711780&external_user_id=1964704384595627577
status
302
cache-control
no-cache, no-store, must-revalidate, no-transform
content-length
0
expires
-1
ac
www8.smartadserver.com/
170 B
1 KB
XHR
General
Full URL
https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502180462&pgDomain=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&gdpr=1&gdpr_consent=&vaf=0&vpaidt=js&vpaidv=1,2
Requested by
Host: player.inforsea.com
URL: https://player.inforsea.com/player.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.137.32 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
59be2f179eb14e67fe06045354571f8ad530be041a2764b4a62e27d9a19d91c3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:40 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
text/xml; charset=utf-8
Content-Length
257
Expires
-1
av
videointelligence-d.openx.net/v/1.0/
Redirect Chain
  • https://videointelligence-d.openx.net/v/1.0/av?auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=157850...
  • https://videointelligence-d.openx.net/v/1.0/av?cc=1&auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1...
0
-1 B
XHR
General
Full URL
https://videointelligence-d.openx.net/v/1.0/av?cc=1&auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1578502180462&vwd=494&vht=278&schain=1.0,1!vi.ai,617345935087486,1
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.173.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:40 GMT
via
1.1 google
server
OXGW/16.173.0
access-control-allow-origin
https://www.onlinewarnungen.de
location
https://videointelligence-d.openx.net/v/1.0/av?cc=1&auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1578502180462&vwd=494&vht=278&schain=1.0,1!vi.ai,617345935087486,1
p3p
CP="CUR ADM OUR NOR STA NID"
status
302
access-control-allow-credentials
true
alt-svc
clear
content-length
0

Redirect headers

date
Wed, 08 Jan 2020 16:49:40 GMT
via
1.1 google
server
OXGW/16.173.0
status
302
location
https://videointelligence-d.openx.net/v/1.0/av?cc=1&auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1578502180462&vwd=494&vht=278&schain=1.0,1!vi.ai,617345935087486,1
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://www.onlinewarnungen.de
access-control-allow-credentials
true
alt-svc
clear
content-length
0
vast.xml
video-ads.rubiconproject.com/video/15476/239056/1208800/201/
2 KB
2 KB
XHR
General
Full URL
https://video-ads.rubiconproject.com/video/15476/239056/1208800/201/vast.xml?tg_c.language=de&schain=1.0,1!vi.ai,617345935087486,1
Requested by
Host: player.inforsea.com
URL: https://player.inforsea.com/player.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.34.190.24 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-34-190-24.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash
9521f214883de7f7271b1a49b4f1cb0e25a0ad49cbcd387b7febc4a34b23c072

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:40 GMT
Content-Encoding
gzip
Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Access-Control-Allow-Methods
POST, GET, PUT, OPTIONS, PATCH, DELETE
Content-Type
text/xml
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
public, must-revalidate, max-age=0, s-maxage=600
Access-Control-Allow-Credentials
true
Connection
keep-alive
Access-Control-Allow-Headers
X-Accept-Charset,X-Accept,Content-Type
Content-Length
946
Expires
Wed, 08 Jan 2020 16:49:40 GMT
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=r&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=3337873684748&publisher_id=617345935087486&country=BE&ad_source_id=5d00e5ff28a0611dc803c6c1&sell_cpm=8.74&request_cost=0.0085
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:40 GMT
Server
nginx/1.15.8
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=r&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=2088695249802&publisher_id=617345935087486&country=BE&ad_source_id=5d00e61628a06146bf4f1be6&sell_cpm=7.88&request_cost=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:40 GMT
Server
nginx/1.15.8
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=r&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=8219175830629&publisher_id=617345935087486&country=BE&ad_source_id=5d14c18a28a06159e85621ff&sell_cpm=6.4&request_cost=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:40 GMT
Server
nginx/1.15.8
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=r&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=9342355872520&publisher_id=617345935087486&country=BE&ad_source_id=5d00d456073ef4433704a9ae&sell_cpm=6.16&request_cost=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:40 GMT
Server
nginx/1.15.8
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 870B
266 KB
91 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.inforsea.com
URL: https://player.inforsea.com/player.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
90a43b652ab91079e4fd2496b2808d68026812c8e48e868fe34122967fe8afd7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
92630
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:40 GMT
bridge-30735.js
video-ads.rubiconproject.com/video/ Frame FFF2
63 KB
20 KB
Script
General
Full URL
https://video-ads.rubiconproject.com/video/bridge-30735.js
Requested by
Host: player.inforsea.com
URL: https://player.inforsea.com/player.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.34.190.24 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-34-190-24.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) /
Resource Hash
7490c867743ec0fa87816741bbd174e5789547feccd019fb485ecac42659f2ce

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 08 Jan 2020 16:49:40 GMT
Content-Encoding
gzip
Last-Modified
Wed, 11 Dec 2019 15:30:56 GMT
Server
Apache/2.2.15 (CentOS)
ETag
"12010b-fab2-5996f50964c00"
Vary
Accept-Encoding
Access-Control-Allow-Methods
POST, GET, PUT, OPTIONS, PATCH, DELETE
Content-Type
text/javascript
Access-Control-Allow-Origin
Access-Control-Allow-Credentials
true
Connection
keep-alive
Accept-Ranges
bytes
Access-Control-Allow-Headers
X-Accept-Charset,X-Accept,Content-Type
Content-Length
19516
pixel
cm.g.doubleclick.net/
Redirect Chain
  • https://videointelligence-d.openx.net/v/1.0/av?cc=1&auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1...
  • https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
0
-1 B
XHR
General
Full URL
https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.173.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:40 GMT
content-encoding
gzip
p3p
CP="CUR ADM OUR NOR STA NID", CP="CUR ADM OUR NOR STA NID"
status
302
alt-svc
clear
content-length
0
via
1.1 google
pragma
no-cache
server
OXGW/16.173.0
location
https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
vary
Accept-Encoding
content-type
text/xml
access-control-allow-origin
https://www.onlinewarnungen.de
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
expires
Mon, 26 Jul 1997 05:00:00 GMT

Redirect headers

date
Wed, 08 Jan 2020 16:49:40 GMT
content-encoding
gzip
vary
Accept-Encoding
access-control-allow-origin
https://www.onlinewarnungen.de
p3p
CP="CUR ADM OUR NOR STA NID", CP="CUR ADM OUR NOR STA NID"
status
302
alt-svc
clear
content-length
0
pragma
no-cache
server
OXGW/16.173.0
location
https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
content-type
text/xml
via
1.1 google
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
expires
Mon, 26 Jul 1997 05:00:00 GMT
bridge3.355.4_en.html
imasdk.googleapis.com/js/core/ Frame B13B
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.355.4_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.355.4_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196298
date
Tue, 07 Jan 2020 10:39:02 GMT
expires
Wed, 06 Jan 2021 10:39:02 GMT
last-modified
Fri, 03 Jan 2020 15:54:04 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
108638
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 870B
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:40 GMT
integrator.js
adservice.google.com/adsid/ Frame 870B
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.onlinewarnungen.de
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
sd
us-u.openx.net/w/1.0/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
  • https://us-u.openx.net/w/1.0/sd?id=537072991&val=CAESEGGRCzIhZNnK1BhJsHxxkns&google_cver=1
0
0

log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=e&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=3089448448000&publisher_id=617345935087486&country=BE&ad_source_id=5d00e61628a06146bf4f1be6&sell_cpm=7.88&request_cost=0&message=ad-player%20init%20error%3A%20name%3A%20TypeError%2C%20message%3A%20Network%20request%20failed
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:40 GMT
Server
nginx/1.15.8
/
rtb-csync.smartadserver.com/redir/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=smartrtb_dbm&google_cm&google_sc
  • https://rtb-csync.smartadserver.com/redir/?partnerid=76&partneruserid=CAESEP7S3i3HGOVLSpJZElrBAvU&google_cver=1
43 B
411 B
Image
General
Full URL
https://rtb-csync.smartadserver.com/redir/?partnerid=76&partneruserid=CAESEP7S3i3HGOVLSpJZElrBAvU&google_cver=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.139.89 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:40 GMT
Cache-Control
no-cache, no-store
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Content-Type
image/gif
Content-Length
43
Expires
-1

Redirect headers

pragma
no-cache
date
Wed, 08 Jan 2020 16:49:40 GMT
server
HTTP server (unknown)
location
https://rtb-csync.smartadserver.com/redir/?partnerid=76&partneruserid=CAESEP7S3i3HGOVLSpJZElrBAvU&google_cver=1
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
302
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
316
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=e&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=6148978868105&publisher_id=617345935087486&country=BE&ad_source_id=5d00e5ff28a0611dc803c6c1&sell_cpm=8.74&request_cost=0.0085&message=ad-player%20init%20error%3A%20name%3A%20Error%2C%20message%3A%20no%20ad%20found
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:40 GMT
Server
nginx/1.15.8
vast.xml
optimized-by.rubiconproject.com/a/api/ Frame FFF2
195 B
1 KB
XHR
General
Full URL
https://optimized-by.rubiconproject.com/a/api/vast.xml?account_id=15476&site_id=239056&zone_id=1208800&size_id=201&tg_c.language=de&schain=1.0,1!vi.ai,617345935087486,1&p_window.depth=0&rf=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&p_window.url=&p_window.w=1600&p_window.h=1200&p_aso.video.ext.ad.w=494&p_aso.video.ext.ad.h=278&width=494&height=278&p_aso.video.api=2&p_aso.video.mimes=application/javascript,video/mp4&tk_vpaid=1&cb=4189927532031261&rp_secure=1
Requested by
Host: video-ads.rubiconproject.com
URL: https://video-ads.rubiconproject.com/video/bridge-30735.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
38cc5e638623027e14d83d21653e26a5d1f005289c2c87645fadf419fa520dc3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:40 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/xml
Keep-Alive
timeout=5, max=464
Content-Length
195
Expires
Wed, 17 Sep 1975 21:32:10 GMT
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=e&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=5043122632324&publisher_id=617345935087486&country=BE&ad_source_id=5d00d456073ef4433704a9ae&sell_cpm=6.16&request_cost=0&message=ad-player%20init%20error%3A%20name%3A%20Error%2C%20message%3A%20adsLoader%20AD_ERROR%3A%20AdError%201009%3A%20The%20VAST%20response%20document%20is%20empty.
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:40 GMT
Server
nginx/1.15.8
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=e&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=9255378056690&publisher_id=617345935087486&country=BE&ad_source_id=5d14c18a28a06159e85621ff&sell_cpm=6.4&request_cost=0&message=ad-player%20init%20error%3A%20name%3A%20Error%2C%20message%3A%20AdError%20before%20AdLoadedunknown%20error
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:41 GMT
Server
nginx/1.15.8
ac
www8.smartadserver.com/
Redirect Chain
  • https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502183788&pgDomain=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnung...
  • https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502183788&pgDomain=https%3a%2f%2fwww.onlinewarnungen.de%2fwarnung...
0
-1 B
XHR
General
Full URL
https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502183788&pgDomain=https%3a%2f%2fwww.onlinewarnungen.de%2fwarnungsticker%2fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2f&gdpr=1&gdpr_consent=&vaf=0&vpaidt=js&vpaidv=1%2c2&cklb=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.137.32 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:43 GMT
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Location
https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502183788&pgDomain=https%3a%2f%2fwww.onlinewarnungen.de%2fwarnungsticker%2fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2f&gdpr=1&gdpr_consent=&vaf=0&vpaidt=js&vpaidv=1%2c2&cklb=1
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
text/html; charset=utf-8
Content-Length
518
Expires
-1

Redirect headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:43 GMT
Location
https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502183788&pgDomain=https%3a%2f%2fwww.onlinewarnungen.de%2fwarnungsticker%2fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2f&gdpr=1&gdpr_consent=&vaf=0&vpaidt=js&vpaidv=1%2c2&cklb=1
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
text/html; charset=utf-8
Content-Length
518
Expires
-1
av
videointelligence-d.openx.net/v/1.0/
Redirect Chain
  • https://videointelligence-d.openx.net/v/1.0/av?auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=157850...
  • https://videointelligence-d.openx.net/v/1.0/av?cc=1&auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1...
0
-1 B
XHR
General
Full URL
https://videointelligence-d.openx.net/v/1.0/av?cc=1&auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1578502183788&vwd=494&vht=278&schain=1.0,1!vi.ai,617345935087486,1
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.173.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:43 GMT
via
1.1 google
server
OXGW/16.173.0
access-control-allow-origin
https://www.onlinewarnungen.de
location
https://videointelligence-d.openx.net/v/1.0/av?cc=1&auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1578502183788&vwd=494&vht=278&schain=1.0,1!vi.ai,617345935087486,1
p3p
CP="CUR ADM OUR NOR STA NID"
status
302
access-control-allow-credentials
true
alt-svc
clear
content-length
0

Redirect headers

date
Wed, 08 Jan 2020 16:49:43 GMT
via
1.1 google
server
OXGW/16.173.0
status
302
location
https://videointelligence-d.openx.net/v/1.0/av?cc=1&auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1578502183788&vwd=494&vht=278&schain=1.0,1!vi.ai,617345935087486,1
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://www.onlinewarnungen.de
access-control-allow-credentials
true
alt-svc
clear
content-length
0
vast.xml
video-ads.rubiconproject.com/video/15476/239056/1208800/201/
2 KB
2 KB
XHR
General
Full URL
https://video-ads.rubiconproject.com/video/15476/239056/1208800/201/vast.xml?tg_c.language=de&schain=1.0,1!vi.ai,617345935087486,1
Requested by
Host: player.inforsea.com
URL: https://player.inforsea.com/player.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.34.190.24 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-34-190-24.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash
617f27fa822bf24ed4349afbcc1e80870c145793c827341f2b2a0722aa161a6a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:43 GMT
Content-Encoding
gzip
Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Access-Control-Allow-Methods
POST, GET, PUT, OPTIONS, PATCH, DELETE
Content-Type
text/xml
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
public, must-revalidate, max-age=0, s-maxage=600
Access-Control-Allow-Credentials
true
Connection
keep-alive
Access-Control-Allow-Headers
X-Accept-Charset,X-Accept,Content-Type
Content-Length
945
Expires
Wed, 08 Jan 2020 16:49:43 GMT
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=r&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=7204772527837&publisher_id=617345935087486&country=BE&ad_source_id=5d00e5ff28a0611dc803c6c1&sell_cpm=8.74&request_cost=0.0085
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:43 GMT
Server
nginx/1.15.8
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=r&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=3977369009987&publisher_id=617345935087486&country=BE&ad_source_id=5d00e61628a06146bf4f1be6&sell_cpm=7.88&request_cost=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:43 GMT
Server
nginx/1.15.8
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=r&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=5178626911158&publisher_id=617345935087486&country=BE&ad_source_id=5d14c18a28a06159e85621ff&sell_cpm=6.4&request_cost=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:43 GMT
Server
nginx/1.15.8
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=r&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=4582803906678&publisher_id=617345935087486&country=BE&ad_source_id=5d00d456073ef4433704a9ae&sell_cpm=6.16&request_cost=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:43 GMT
Server
nginx/1.15.8
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 07C2
266 KB
91 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.inforsea.com
URL: https://player.inforsea.com/player.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
90a43b652ab91079e4fd2496b2808d68026812c8e48e868fe34122967fe8afd7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:43 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
92630
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:43 GMT
ac
www8.smartadserver.com/
129 B
2 KB
XHR
General
Full URL
https://www8.smartadserver.com/ac?siteid=166085&pgid=1108607&fmtid=57920&ab=1&tgt=&oc=1&out=vast3&ps=1&pb=0&visit=S&vcn=s&tmstp=1578502183788&pgDomain=https%3a%2f%2fwww.onlinewarnungen.de%2fwarnungsticker%2fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2f&gdpr=1&gdpr_consent=&vaf=0&vpaidt=js&vpaidv=1%2c2&cklb=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.86.137.32 , France, ASN201081 (SMARTADSERVER, FR),
Reverse DNS
Software
/
Resource Hash
0d782e0d957a825f22dbac3cd223537a4b428d1bdd6118eb8f18007ba6fa4c76

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:43 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
P3P
CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Content-Type
text/xml; charset=utf-8
Content-Length
228
Expires
-1
bridge-30735.js
video-ads.rubiconproject.com/video/ Frame FAF8
63 KB
20 KB
Script
General
Full URL
https://video-ads.rubiconproject.com/video/bridge-30735.js
Requested by
Host: player.inforsea.com
URL: https://player.inforsea.com/player.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.34.190.24 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-34-190-24.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) /
Resource Hash
7490c867743ec0fa87816741bbd174e5789547feccd019fb485ecac42659f2ce

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 08 Jan 2020 16:49:43 GMT
Content-Encoding
gzip
Last-Modified
Wed, 11 Dec 2019 15:30:56 GMT
Server
Apache/2.2.15 (CentOS)
ETag
"12010b-fab2-5996f50964c00"
Vary
Accept-Encoding
Access-Control-Allow-Methods
POST, GET, PUT, OPTIONS, PATCH, DELETE
Content-Type
text/javascript
Access-Control-Allow-Origin
Access-Control-Allow-Credentials
true
Connection
keep-alive
Accept-Ranges
bytes
Access-Control-Allow-Headers
X-Accept-Charset,X-Accept,Content-Type
Content-Length
19516
bridge3.355.4_en.html
imasdk.googleapis.com/js/core/ Frame F6BB
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.355.4_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.355.4_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
196298
date
Tue, 07 Jan 2020 10:39:02 GMT
expires
Wed, 06 Jan 2021 10:39:02 GMT
last-modified
Fri, 03 Jan 2020 15:54:04 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
108641
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 07C2
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:43 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Wed, 08 Jan 2020 16:49:43 GMT
integrator.js
adservice.google.com/adsid/ Frame 07C2
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.onlinewarnungen.de
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:43 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pixel
cm.g.doubleclick.net/
Redirect Chain
  • https://videointelligence-d.openx.net/v/1.0/av?cc=1&auid=540782736&url=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&cb=1...
  • https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
0
-1 B
XHR
General
Full URL
https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.173.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:49:43 GMT
content-encoding
gzip
p3p
CP="CUR ADM OUR NOR STA NID", CP="CUR ADM OUR NOR STA NID"
status
302
alt-svc
clear
content-length
0
via
1.1 google
pragma
no-cache
server
OXGW/16.173.0
location
https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
vary
Accept-Encoding
content-type
text/xml
access-control-allow-origin
https://www.onlinewarnungen.de
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
expires
Mon, 26 Jul 1997 05:00:00 GMT

Redirect headers

date
Wed, 08 Jan 2020 16:49:43 GMT
content-encoding
gzip
vary
Accept-Encoding
access-control-allow-origin
https://www.onlinewarnungen.de
p3p
CP="CUR ADM OUR NOR STA NID", CP="CUR ADM OUR NOR STA NID"
status
302
alt-svc
clear
content-length
0
pragma
no-cache
server
OXGW/16.173.0
location
https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
content-type
text/xml
via
1.1 google
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
expires
Mon, 26 Jul 1997 05:00:00 GMT
vast.xml
optimized-by.rubiconproject.com/a/api/ Frame FAF8
195 B
2 KB
XHR
General
Full URL
https://optimized-by.rubiconproject.com/a/api/vast.xml?account_id=15476&site_id=239056&zone_id=1208800&size_id=201&tg_c.language=de&schain=1.0,1!vi.ai,617345935087486,1&p_window.depth=0&rf=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&p_window.url=&p_window.w=1600&p_window.h=1200&p_aso.video.ext.ad.w=494&p_aso.video.ext.ad.h=278&width=494&height=278&p_aso.video.api=2&p_aso.video.mimes=application/javascript,video/mp4&tk_vpaid=1&cb=6440811834024247&rp_secure=1
Requested by
Host: video-ads.rubiconproject.com
URL: https://video-ads.rubiconproject.com/video/bridge-30735.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
38cc5e638623027e14d83d21653e26a5d1f005289c2c87645fadf419fa520dc3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
Origin
https://www.onlinewarnungen.de

Response headers

Pragma
no-cache
Date
Wed, 08 Jan 2020 16:49:43 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://www.onlinewarnungen.de
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/xml
Keep-Alive
timeout=5, max=331
Content-Length
195
Expires
Wed, 17 Sep 1975 21:32:10 GMT
pixel
cm.g.doubleclick.net/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm&google_sc
  • https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm=&google_sc=&google_tc=
0
0

log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=e&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=3562126902112&publisher_id=617345935087486&country=BE&ad_source_id=5d00e61628a06146bf4f1be6&sell_cpm=7.88&request_cost=0&message=ad-player%20init%20error%3A%20name%3A%20TypeError%2C%20message%3A%20Network%20request%20failed
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:44 GMT
Server
nginx/1.15.8
shim.gif
creatives.sascdn.com/
43 B
378 B
Image
General
Full URL
https://creatives.sascdn.com/shim.gif
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a01:4a0:1338:28::c38a:ff18 , Germany, ASN201011 (NETZBETRIEB-GMBH, DE),
Reverse DNS
Software
Apache /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 08 Jan 2020 16:49:44 GMT
Last-Modified
Fri, 17 Aug 2018 12:23:00 GMT
Server
Apache
ETag
"221d8352905f2c38b3cb2bd191d630b0:1534508580"
Content-Type
image/gif
Cache-Control
max-age=31536000
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 07 Jan 2021 16:49:44 GMT
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=e&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=9569906067651&publisher_id=617345935087486&country=BE&ad_source_id=5d00e5ff28a0611dc803c6c1&sell_cpm=8.74&request_cost=0.0085&message=ad-player%20init%20error%3A%20name%3A%20Error%2C%20message%3A%20no%20ad%20found
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:44 GMT
Server
nginx/1.15.8
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=e&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=8094924466275&publisher_id=617345935087486&country=BE&ad_source_id=5d00d456073ef4433704a9ae&sell_cpm=6.16&request_cost=0&message=ad-player%20init%20error%3A%20name%3A%20Error%2C%20message%3A%20adsLoader%20AD_ERROR%3A%20AdError%201009%3A%20The%20VAST%20response%20document%20is%20empty.
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:44 GMT
Server
nginx/1.15.8
log
pixel.inforsea.com/server/
0
110 B
Image
General
Full URL
https://pixel.inforsea.com/server/log?event=e&dim9=7830291542837-1578502175908&affiliate_id=5cf5098728a061234c7c83fc&os=OSX&os_version=10.14.6&domainapp=onlinewarnungen.de&browser=Chrome&browser_version=79.0.3945.88&width=494&height=278&visible=100&cb=4967511013779&publisher_id=617345935087486&country=BE&ad_source_id=5d14c18a28a06159e85621ff&sell_cpm=6.4&request_cost=0&message=ad-player%20init%20error%3A%20name%3A%20Error%2C%20message%3A%20AdError%20before%20AdLoadedunknown%20error
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.129.3.32 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-129-3-32.eu-west-1.compute.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Connection
keep-alive
Date
Wed, 08 Jan 2020 16:49:44 GMT
Server
nginx/1.15.8

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
us-u.openx.net
URL
https://us-u.openx.net/w/1.0/sd?id=537072991&val=CAESEPJfA2NVmGtYaZzgnlHI_tU&google_cver=1
Domain
dtm.advertising.com
URL
https://dtm.advertising.com/411f1e96-3bde-4d85-b17e-63749e5f0695.js
Domain
trk.vidible.tv
URL
https://trk.vidible.tv/trk/ad-engine-response.gif?bcid=59fa23617cdce062bad2cec3&bid=56bcd17de4b0a5976ac0da12&pid=59947c0544a64b1a49e52a48&pt=o2unit&pv=10.2.16&r=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&s=true&sid=449ec833-2076-4ed4-aaf5-72283667345b&vvuid=9156c26a-5188-4e42-acfd-fc83ac9918ee&orgId=24831&plcid=1240293&vrid=0dc35799-55d4-4b41-aa1f-b7fb4648b9fe&at=preroll&adIdx=-1&pbl=true&ps=html5-vpaid&seq=-1&spaceid=793604934&v=593fb311c214e33ec50202f0&w=494&aert=113&ar=no&fo=0&ft=0&h=278&cb=0.4827392039874052
Domain
acdn.adnxs.com
URL
https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Domain
secure.adnxs.com
URL
https://secure.adnxs.com/getuid?https%3A%2F%2Fdmp.videoreach.com%2Fsync%2Fupdate%2F%3Fs%3Dapn%26apnid%3D%24UID%26uuid%3D688471a0-4d3b-4dfa-8fb0-72fa57654030
Domain
us-u.openx.net
URL
https://us-u.openx.net/w/1.0/sd?id=537072991&val=CAESEGGRCzIhZNnK1BhJsHxxkns&google_cver=1
Domain
cm.g.doubleclick.net
URL
https://cm.g.doubleclick.net/pixel?google_nid=openx&google_cm=&google_sc=&google_tc=

Verdicts & Comments Add Verdict or Comment

145 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| adsbygoogle object| _wpemojiSettings object| google_js_reporting_queue number| google_srt object| google_ad_modifications object| google_logging_queue object| ggeac boolean| google_measure_js_timing object| googleToken object| googleIMState function| processGoogleToken object| google_reactive_ads_global_state boolean| _gfp_a_ object| google_sa_queue object| google_sl_win function| google_process_slots object| traffectiveLib object| TRFREADY object| googletag object| traffective function| __cmp undefined| $ function| jQuery object| photocrati_ajax object| EasyCookie object| Ngg_Store object| html5 object| Modernizr function| yepnope object| jQuery112408762801273815468 function| si_captcha_refresh object| dynamicgoogletags function| google_spfd object| google_sv_map object| google_t12n_vars boolean| _gfp_p_ number| google_lpabyc number| google_unique_id function| TrfAdManager function| webpackHotUpdateTrfAdManager object| core object| __core-js_shared__ function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| google_sa_impl object| google_jobrunner object| google_persistent_state_async object| __google_ad_urls number| google_global_correlator number| __google_ad_urls_id object| google_prev_clients object| gaGlobal object| ampInaboxIframes object| ampInaboxPendingMessages object| google_iframe_oncopy boolean| google_osd_loaded boolean| google_onload_fired boolean| __glomexPlayerAvailable boolean| __glomexPlayerComponent string| GLOMEX_PLAYER_VERSION function| parcelRequire object| twemoji object| wp object| closure_memoize_cache_ object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater object| PLISTA object| wpcf7 object| tocplus object| nextgen_lightbox_settings function| P function| NggPaginatedGallery function| nextgen_lightbox_filter_selector object| wpreview function| wp_review_rate object| addComment function| shariff_share_counts function| shariff_get_share_counts function| shariff_add_share_counts function| shariff_click function| shariff_popup object| su_other_shortcodes string| gaProperty string| disableStr function| gaOptout string| GoogleAnalyticsObject function| ga object| pbjs object| hash object| qs object| pathname object| hostname object| dmlkZW8gaW50ZWxsaWdlbmNlIHN0YXJ0 function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| trfCmpLog object| google_tag_data object| gaplugins object| gaData function| pbjsChunk function| PLISTA_JSONP_FA73A1 object| PLISTA_ object| vi object| dmlkZW8gaW50ZWxsaWdlbmNl number| __vi__ad__unit object| __ctcg_65349_0_exec function| setImmediate function| clearImmediate function| _ object| platform boolean| omsv_centered boolean| google_noFetch object| google_image_requests object| __AMP_LOG object| __AMP_ERRORS boolean| ampInaboxInitialized object| __AMP_MODE function| __AMP_REPORT_ERROR object| ampInaboxPositionObserver object| ampInaboxFrameOverlayManager object| AMP object| closure_lm_981575 undefined| moatApiInit1578502176664 undefined| ct undefined| et undefined| hourElapsed undefined| msg undefined| pixelDomain undefined| pxSrc undefined| px object| Moat#G26 object| MoatSuperV26 object| Moat#PML#26#1.2 boolean| Moat#EVA string| prop object| callbacks object| time object| closure_lm_443188 object| closure_lm_483633

8 Cookies

Domain/Path Name / Value
.redintelligence.net/ Name: 8lcfmzhxc8d6_uid
Value: 8231672d8ea851a8
.outbrain.com/ Name: obuid
Value: a2171ce1-27f8-4b02-b2d3-3f8513e2925f
.onlinewarnungen.de/ Name: OB-USER-TOKEN
Value: a2171ce1-27f8-4b02-b2d3-3f8513e2925f
widgets.outbrain.com/ Name: akacd_widgets_routing
Value: 3755954972~rv=57~id=ece9fb4e5e1624b8ea619cb868df5b6d
.onlinewarnungen.de/ Name: _gid
Value: GA1.2.595112015.1578502174
.doubleclick.net/ Name: IDE
Value: AHWqTUmT5lJ3Ki2_Kw7BH_NfUDIQ1jGa1WXO_6GEwyBdgeq7tEl-Sot0psNhUhQF
.onlinewarnungen.de/ Name: _gat
Value: 1
.onlinewarnungen.de/ Name: _ga
Value: GA1.2.1346644779.1578502174

7 Console Messages

Source Level URL
Text
console-api log URL: https://www.onlinewarnungen.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1(Line 2)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1
console-api warning URL: https://cmp.cdntrf.com/i.js(Line 1)
Message:
Possible Unhandled Promise Rejection: TypeError: Cannot read property 'getItem' of null
console-api warning URL: https://cmp.cdntrf.com/i.js(Line 1)
Message:
Possible Unhandled Promise Rejection: TypeError: Cannot read property 'getItem' of null
console-api info URL: https://cdn.ampproject.org/rtv/011912050130240/amp4ads-v0.js(Line 412)
Message:
Powered by AMP ⚡ HTML – Version 1912050130240 https://www.onlinewarnungen.de/warnungsticker/bestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing/
console-api log URL: https://video-ads.rubiconproject.com/video/bridge-30735.js(Line 1)
Message:
com.rubiconproject.vpaid: XHR - https://optimized-by.rubiconproject.com/a/api/vast.xml?account_id=15476&site_id=239056&zone_id=1208800&size_id=201&tg_c.language=de&schain=1.0,1!vi.ai,617345935087486,1&p_window.depth=0&rf=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&p_window.url=&p_window.w=1600&p_window.h=1200&p_aso.video.ext.ad.w=494&p_aso.video.ext.ad.h=278&width=494&height=278&p_aso.video.api=2&p_aso.video.mimes=application/javascript,video/mp4&tk_vpaid=1&cb=7057163744584218&rp_secure=1
console-api log URL: https://video-ads.rubiconproject.com/video/bridge-30735.js(Line 1)
Message:
com.rubiconproject.vpaid: XHR - https://optimized-by.rubiconproject.com/a/api/vast.xml?account_id=15476&site_id=239056&zone_id=1208800&size_id=201&tg_c.language=de&schain=1.0,1!vi.ai,617345935087486,1&p_window.depth=0&rf=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&p_window.url=&p_window.w=1600&p_window.h=1200&p_aso.video.ext.ad.w=494&p_aso.video.ext.ad.h=278&width=494&height=278&p_aso.video.api=2&p_aso.video.mimes=application/javascript,video/mp4&tk_vpaid=1&cb=4189927532031261&rp_secure=1
console-api log URL: https://video-ads.rubiconproject.com/video/bridge-30735.js(Line 1)
Message:
com.rubiconproject.vpaid: XHR - https://optimized-by.rubiconproject.com/a/api/vast.xml?account_id=15476&site_id=239056&zone_id=1208800&size_id=201&tg_c.language=de&schain=1.0,1!vi.ai,617345935087486,1&p_window.depth=0&rf=https%3A%2F%2Fwww.onlinewarnungen.de%2Fwarnungsticker%2Fbestaetigung-ihrer-paypal-zahlung-an-zalando-gmbh-ist-phishing%2F&p_window.url=&p_window.w=1600&p_window.h=1200&p_aso.video.ext.ad.w=494&p_aso.video.ext.ad.h=278&width=494&height=278&p_aso.video.api=2&p_aso.video.mimes=application/javascript,video/mp4&tk_vpaid=1&cb=6440811834024247&rp_secure=1

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

a.teads.tv
a.videoreach.com
acdn.adnxs.com
acds.prod.vidible.tv
ad.360yield.com
ad.yieldlab.net
ads.adaptv.advertising.com
ads.pubmatic.com
adservice.google.com
adservice.google.de
an.facebook.com
as-sec.casalemedia.com
call.inforsea.com
cdn-ssl.vidible.tv
cdn.ampproject.org
cdntrf.com
cm.g.doubleclick.net
cmp.cdntrf.com
creatives.sascdn.com
currency.prebid.org
dmp.videoreach.com
dtm.advertising.com
eus.rubiconproject.com
farm.plista.com
fastlane.rubiconproject.com
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
hbopenbid.pubmatic.com
ib.adnxs.com
ice.360yield.com
imasdk.googleapis.com
log.outbrainimg.com
match.360yield.com
match.adsrvr.org
mv.outbrain.com
netdna.bootstrapcdn.com
nv.vi-serve.com
ob.cheqzone.com
obs.cheqzone.com
odb.outbrain.com
optimized-by.rubiconproject.com
pagead2.googlesyndication.com
pixel.inforsea.com
player.glomex.com
player.inforsea.com
px.moatads.com
rtb-csync.smartadserver.com
s.vi-serve.com
s0.2mdn.net
s404-1.vi-serve.com
secure.adnxs.com
securepubads.g.doubleclick.net
ssl-vg03.met.vgwort.de
static.plista.com
sync.smartadserver.com
sync.teads.tv
t.vi-serve.com
tcheck.outbrainimg.com
tpc.googlesyndication.com
track.adform.net
trk.vidible.tv
us-u.openx.net
video-ads.rubiconproject.com
videointelligence-d.openx.net
vis.vi-serve.com
widgets.outbrain.com
www.google-analytics.com
www.google.com
www.googletagservices.com
www.onlinewarnungen.de
www.paypalobjects.com
www8.smartadserver.com
z.moatads.com
acdn.adnxs.com
cm.g.doubleclick.net
dtm.advertising.com
secure.adnxs.com
trk.vidible.tv
us-u.openx.net
104.99.234.34
108.129.3.32
151.101.14.2
161.156.66.188
172.217.23.98
18.200.166.248
185.33.223.200
185.64.189.112
185.86.137.32
185.86.139.89
195.201.205.233
2.18.232.7
2001:4de0:ac19::1:b:3a
205.185.216.10
205.185.216.42
216.58.207.66
23.210.248.226
23.34.190.24
23.37.55.184
23.45.108.93
2600:9000:2156:3800:2:3348:fcc0:93a1
2600:9000:21f3:5800:19:2cf2:a900:93a1
2606:4700:20::681a:2de
2a00:1288:f03d:1fa::4000
2a00:1450:4001:800::2002
2a00:1450:4001:800::2006
2a00:1450:4001:816::200e
2a00:1450:4001:817::2003
2a00:1450:4001:819::2001
2a00:1450:4001:819::2002
2a00:1450:4001:81b::200a
2a00:1450:4001:81d::2004
2a00:1450:4001:81e::2002
2a00:1450:4001:825::2001
2a00:1450:4001:825::200a
2a01:4a0:1338:28::c38a:ff18
2a01:4f8:191:8075::2
2a02:6ea0:cf04::2
2a03:2880:f01c:800e:face:b00c:0:2
3.124.138.137
34.95.120.147
35.156.217.79
35.172.132.19
37.157.2.239
52.48.67.153
52.51.104.248
52.51.20.189
52.59.77.252
54.93.75.206
63.33.176.23
69.173.144.140
69.173.144.143
70.42.32.127
85.13.148.62
88.99.66.207
95.100.196.250
95.100.197.157
95.100.197.246
95.100.197.53
95.101.206.43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