feeds.feedburner.com
Open in
urlscan Pro
2a00:1450:4001:808::200e
Public Scan
Submission: On March 20 via manual from EG
Summary
This is the only time feeds.feedburner.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 2a00:1450:400... 2a00:1450:4001:808::200e | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
4 | 2a00:1450:400... 2a00:1450:4001:81a::200e | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
2 | 2606:4700:30:... 2606:4700:30::681c:2e7 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2a00:1288:7c:... 2a00:1288:7c:800::4000 | 43428 (YAHOO-ULS) (YAHOO-ULS) | |
1 | 104.20.59.241 104.20.59.241 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 193.189.143.34 193.189.143.34 | 34948 (TYPHON-AS) (TYPHON-AS) | |
1 | 54.230.202.169 54.230.202.169 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
5 | 2a00:1450:400... 2a00:1450:4001:817::200e | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
27 | 8 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
securityintelligence.com | |
original.securityintelligence.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
s3.feedly.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: server-54-230-202-169.fra50.r.cloudfront.net
www.subtome.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
feedburner.com
feeds.feedburner.com www.feedburner.com |
72 KB |
4 |
google.com
feedburner.google.com |
8 KB |
2 |
securityintelligence.com
securityintelligence.com original.securityintelligence.com |
2 KB |
1 |
subtome.com
www.subtome.com |
5 KB |
1 |
netvibes.com
www.netvibes.com |
984 B |
1 |
feedly.com
s3.feedly.com |
4 KB |
1 |
yimg.com
sp.yimg.com |
2 KB |
27 | 7 |
Domain | Requested by | |
---|---|---|
12 | feeds.feedburner.com |
feeds.feedburner.com
|
5 | www.feedburner.com |
feeds.feedburner.com
|
4 | feedburner.google.com |
feeds.feedburner.com
|
1 | original.securityintelligence.com |
feeds.feedburner.com
|
1 | www.subtome.com |
feeds.feedburner.com
|
1 | www.netvibes.com |
feeds.feedburner.com
|
1 | s3.feedly.com |
feeds.feedburner.com
|
1 | sp.yimg.com |
feeds.feedburner.com
|
1 | securityintelligence.com |
feeds.feedburner.com
|
27 | 9 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-02-20 - 2020-02-20 |
a year | crt.sh |
*.yimg.com DigiCert SHA2 High Assurance Server CA |
2019-02-19 - 2019-05-20 |
3 months | crt.sh |
*.feedly.com RapidSSL RSA CA 2018 |
2018-02-06 - 2021-05-01 |
3 years | crt.sh |
*.netvibes.com COMODO RSA Domain Validation Secure Server CA |
2018-07-23 - 2019-08-27 |
a year | crt.sh |
*.subtome.com Amazon |
2019-01-04 - 2020-02-04 |
a year | crt.sh |
misc.google.com Google Internet Authority G3 |
2019-03-01 - 2019-05-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://feeds.feedburner.com/SecurityIntelligence?format=xml
Frame ID: EC2C969A59CFC2B2481237C535DCD1A2
Requests: 27 HTTP requests in this frame
98 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Learn more about syndication and FeedBurner...
Search URL Search Domain Scan URL
Title: Why You Should Integrate IoT Security Into Your Vulnerability Management Program
Search URL Search Domain Scan URL
Title: integrating the IoT as a core component
Search URL Search Domain Scan URL
Title: properly acknowledging the vulnerabilities
Search URL Search Domain Scan URL
Title: security information and event management (SIEM)
Search URL Search Domain Scan URL
Title: your paperwork won’t be enough
Search URL Search Domain Scan URL
Title: Why You Should Integrate IoT Security Into Your Vulnerability Management Program
Search URL Search Domain Scan URL
Title: The Biggest Stories From RSAC 2019: What Scares the Cybersecurity Experts?
Search URL Search Domain Scan URL
Title: 31 keynotes
Search URL Search Domain Scan URL
Title: RSA show website
Search URL Search Domain Scan URL
Title: diverse viewpoints at RSAC
Search URL Search Domain Scan URL
Title: risks of deploying too many standalone solutions
Search URL Search Domain Scan URL
Title: ZDNet
Search URL Search Domain Scan URL
Title: Ghidra
Search URL Search Domain Scan URL
Title: X-Force Red Blockchain Testing service
Search URL Search Domain Scan URL
Title: mechanisms to ensure trust
Search URL Search Domain Scan URL
Title: public cloud services
Search URL Search Domain Scan URL
Title: Change Your Approach to Get It Right
Search URL Search Domain Scan URL
Title: public interest technologists
Search URL Search Domain Scan URL
Title: The Biggest Stories From RSAC 2019: What Scares the Cybersecurity Experts?
Search URL Search Domain Scan URL
Title: How Patch Posture Reporting Improves Security Landscapes
Search URL Search Domain Scan URL
Title: solution brief
Search URL Search Domain Scan URL
Title: How Patch Posture Reporting Improves Security Landscapes
Search URL Search Domain Scan URL
Title: Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019?
Search URL Search Domain Scan URL
Title: fileless malware
Search URL Search Domain Scan URL
Title: Trend Micro
Search URL Search Domain Scan URL
Title: propagation
Search URL Search Domain Scan URL
Title: Code Red
Search URL Search Domain Scan URL
Title: SentinelOne
Search URL Search Domain Scan URL
Title: WannaCry/WanaCrypt0r 2.0 ransomware attack
Search URL Search Domain Scan URL
Title: continually evolving their products
Search URL Search Domain Scan URL
Title: Endpoint detection solutions
Search URL Search Domain Scan URL
Title: Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019?
Search URL Search Domain Scan URL
Title: Application Security Has Nothing to Do With Luck
Search URL Search Domain Scan URL
Title: security issues in applications
Search URL Search Domain Scan URL
Title: Puppet Labs
Search URL Search Domain Scan URL
Title: most recent edition
Search URL Search Domain Scan URL
Title: Ponemon Institute
Search URL Search Domain Scan URL
Title: penetration testing
Search URL Search Domain Scan URL
Title: application security
Search URL Search Domain Scan URL
Title: Application Security Has Nothing to Do With Luck
Search URL Search Domain Scan URL
Title: Breaking Down the Incident Notification Requirements in the EU’s NIS Directive
Search URL Search Domain Scan URL
Title: NIS Directive
Search URL Search Domain Scan URL
Title: General Data Protection Regulation (GDPR)
Search URL Search Domain Scan URL
Title: incident reporting in Europe
Search URL Search Domain Scan URL
Title: detection capabilities
Search URL Search Domain Scan URL
Title: NIS Cooperation Group
Search URL Search Domain Scan URL
Title: IR plan
Search URL Search Domain Scan URL
Title: Breaking Down the Incident Notification Requirements in the EU’s NIS Directive
Search URL Search Domain Scan URL
Title: With AI for Cybersecurity, We Are Raising the Bar for Smart
Search URL Search Domain Scan URL
Title: artificial intelligence (AI)
Search URL Search Domain Scan URL
Title: talking to a 13-year old Ukrainian boy
Search URL Search Domain Scan URL
Title: Watson for Cybersecurity
Search URL Search Domain Scan URL
Title: make sense of the results
Search URL Search Domain Scan URL
Title: With AI for Cybersecurity, We Are Raising the Bar for Smart
Search URL Search Domain Scan URL
Title: How CISOs Can Facilitate the Advent of the Cognitive Enterprise
Search URL Search Domain Scan URL
Title: The Cognitive Enterprise: Reinventing your company with AI
Search URL Search Domain Scan URL
Title: trusted adviser
Search URL Search Domain Scan URL
Title: structured and unstructured
Search URL Search Domain Scan URL
Title: seamless customer and employee experiences
Search URL Search Domain Scan URL
Title: cognitive security
Search URL Search Domain Scan URL
Title: prevent and detect threats
Search URL Search Domain Scan URL
Title: 2018 Cost of a Data Breach Study
Search URL Search Domain Scan URL
Title: How CISOs Can Facilitate the Advent of the Cognitive Enterprise
Search URL Search Domain Scan URL
Title: Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities
Search URL Search Domain Scan URL
Title: critical hardware vulnerabilities
Search URL Search Domain Scan URL
Title: uncovering new potential impacts
Search URL Search Domain Scan URL
Title: three variants of critical hardware vulnerabilities
Search URL Search Domain Scan URL
Title: system failure
Search URL Search Domain Scan URL
Title: published seven new Spectre/Meltdown variants
Search URL Search Domain Scan URL
Title: Hardware vulnerabilities
Search URL Search Domain Scan URL
Title: released a series of patches
Search URL Search Domain Scan URL
Title: require local access for exploitation
Search URL Search Domain Scan URL
Title: threat intelligence feeds
Search URL Search Domain Scan URL
Title: threat intelligence
Search URL Search Domain Scan URL
Title: hardware penetration testing
Search URL Search Domain Scan URL
Title: Download the IBM X-Force Threat Intelligence Index Report – 2019
Search URL Search Domain Scan URL
Title: Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities
Search URL Search Domain Scan URL
Title: An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might
Search URL Search Domain Scan URL
Title: techno-fusion
Search URL Search Domain Scan URL
Title: augment our reality
Search URL Search Domain Scan URL
Title: 2.5 quintillion bytes of data every day
Search URL Search Domain Scan URL
Title: how much data we produce
Search URL Search Domain Scan URL
Title: explosion of internet of things (IoT) devices
Search URL Search Domain Scan URL
Title: maintain and monitor your organization’s security hygiene
Search URL Search Domain Scan URL
Title: Ponemon Institute
Search URL Search Domain Scan URL
Title: responding to so many alerts
Search URL Search Domain Scan URL
Title: security fatigue
Search URL Search Domain Scan URL
Title: the U.S. Department of Defense
Search URL Search Domain Scan URL
Title: intelligence-led analytics platforms
Search URL Search Domain Scan URL
Title: external assessment
Search URL Search Domain Scan URL
Title: An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
27 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
SecurityIntelligence
feeds.feedburner.com/ |
113 KB 34 KB |
Document
text/xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rss2full.xsl
feeds.feedburner.com/~d/styles/ |
11 KB 3 KB |
Stylesheet
text/xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
undohtml.css
feedburner.google.com/fb/lib/stylesheets/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bf30.css
feedburner.google.com/fb/feed-styles/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bf30.js
feedburner.google.com/fb/feed-styles/ |
11 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SI_primary_rgb-80x80.png
securityintelligence.com/wp-content/uploads/2016/04/ |
0 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
addtomyyahoo.gif
sp.yimg.com/j/assets/ipt/ |
1 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
feedly.png
s3.feedly.com/feedburner/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
add2netvibes.gif
www.netvibes.com/img/ |
832 B 984 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
subtome-feedburner.png
www.subtome.com/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2I4CeVd0aWE
feeds.feedburner.com/~r/SecurityIntelligence/~4/ |
43 B 294 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DM18TuHbDiU
feeds.feedburner.com/~r/SecurityIntelligence/~4/ |
43 B 294 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
TCLLM5KB-y0
feeds.feedburner.com/~r/SecurityIntelligence/~4/ |
43 B 294 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MdPY8vijJv8
feeds.feedburner.com/~r/SecurityIntelligence/~4/ |
43 B 294 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
xL3e2JeJk28
feeds.feedburner.com/~r/SecurityIntelligence/~4/ |
43 B 294 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_Z2713BDm6w
feeds.feedburner.com/~r/SecurityIntelligence/~4/ |
43 B 294 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1IhhBOZ5sOs
feeds.feedburner.com/~r/SecurityIntelligence/~4/ |
43 B 294 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ibm-institute-for-business-value_the-cognitive-enterprise_figure-1.jpg
original.securityintelligence.com/wp-content/uploads/2019/03/ |
0 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DGs7AUibZVs
feeds.feedburner.com/~r/SecurityIntelligence/~4/ |
43 B 294 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vypbO6s-F_0
feeds.feedburner.com/~r/SecurityIntelligence/~4/ |
43 B 294 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fo-EjJ0Opqg
feeds.feedburner.com/~r/SecurityIntelligence/~4/ |
43 B 294 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer_logo.gif
feedburner.google.com/fb/feed-styles/images/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
html.jpg
www.feedburner.com/fb/feed-styles/images/ |
378 B 469 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
body.jpg
www.feedburner.com/fb/feed-styles/images/ |
511 B 751 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bodycontainer.jpg
www.feedburner.com/fb/feed-styles/images/ |
5 KB 5 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg_rounded.gif
www.feedburner.com/fb/i/bg/ |
26 KB 26 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
itemqube2.gif
www.feedburner.com/fb/feed-styles/images/ |
215 B 313 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
24 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| userchoice object| anychoice undefined| savechoice string| jsFeedUrl object| jsFeedTitle boolean| is_decoding number| DEBUG function| complaining function| check_decoding function| go_decoding function| displayMajorSub function| encodeParam function| subscribeNowUltra function| subscribeNow function| loadSubscribeAreaUltra function| loadSubscribeArea function| clearUserchoice function| createCookie function| readCookie function| eraseCookie string| ampy0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
feedburner.google.com
feeds.feedburner.com
original.securityintelligence.com
s3.feedly.com
securityintelligence.com
sp.yimg.com
www.feedburner.com
www.netvibes.com
www.subtome.com
104.20.59.241
193.189.143.34
2606:4700:30::681c:2e7
2a00:1288:7c:800::4000
2a00:1450:4001:808::200e
2a00:1450:4001:817::200e
2a00:1450:4001:81a::200e
54.230.202.169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