aboev-a676.sviooeesmmttan.workers.dev Open in urlscan Pro
2606:4700:3037::ac43:d7ee  Malicious Activity! Public Scan

URL: https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium
Submission Tags: falconsandbox
Submission: On August 12 via api from US — Scanned from DE

Summary

This website contacted 4 IPs in 1 countries across 6 domains to perform 14 HTTP transactions. The main IP is 2606:4700:3037::ac43:d7ee, located in United States and belongs to CLOUDFLARENET, US. The main domain is aboev-a676.sviooeesmmttan.workers.dev.
TLS certificate: Issued by WE1 on June 27th 2024. Valid for: 3 months.
This is the only time aboev-a676.sviooeesmmttan.workers.dev was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Cloudflare (Online)

Domain & IP information

IP Address AS Autonomous System
1 7 2606:4700:303... 13335 (CLOUDFLAR...)
1 2a04:4e42:400... 54113 (FASTLY)
1 ()
14 4
Apex Domain
Subdomains
Transfer
8 workers.dev
aboev-a676.sviooeesmmttan.workers.dev
1 MB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 1211
30 KB
0 istockphoto.com Failed
media.istockphoto.com Failed
0 gstatic.com Failed
encrypted-tbn0.gstatic.com Failed
0 sftcdn.net Failed
images.sftcdn.net Failed
0 googleapis.com Failed
ajax.googleapis.com Failed
14 6
Domain Requested by
8 aboev-a676.sviooeesmmttan.workers.dev 1 redirects aboev-a676.sviooeesmmttan.workers.dev
1 code.jquery.com aboev-a676.sviooeesmmttan.workers.dev
0 media.istockphoto.com Failed aboev-a676.sviooeesmmttan.workers.dev
0 encrypted-tbn0.gstatic.com Failed aboev-a676.sviooeesmmttan.workers.dev
0 images.sftcdn.net Failed aboev-a676.sviooeesmmttan.workers.dev
0 ajax.googleapis.com Failed aboev-a676.sviooeesmmttan.workers.dev
14 6

This site contains no links.

Subject Issuer Validity Valid
sviooeesmmttan.workers.dev
WE1
2024-06-27 -
2024-09-25
3 months crt.sh
*.jquery.com
Sectigo ECC Domain Validation Secure Server CA
2024-06-25 -
2025-06-25
a year crt.sh

This page contains 1 frames:

Primary Page: https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium
Frame ID: 9EB61B15B109421B02AD08F41BED00CA
Requests: 14 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium Page URL
  2. https://aboev-a676.sviooeesmmttan.workers.dev/cdn-cgi/phish-bypass?atok=sZHUKQtvjwuWA_Aj_2exi3_Biwo4cacUTrdMvy0B42s-172346... HTTP 301
    https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

14
Requests

57 %
HTTPS

67 %
IPv6

6
Domains

6
Subdomains

4
IPs

1
Countries

1468 kB
Transfer

5766 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium Page URL
  2. https://aboev-a676.sviooeesmmttan.workers.dev/cdn-cgi/phish-bypass?atok=sZHUKQtvjwuWA_Aj_2exi3_Biwo4cacUTrdMvy0B42s-1723468885-0.0.1.1-%2F%2Cn%2Fa%2Chttps%3A%2Fopenphish.com%2Fphishing_feeds.html%2C9-aug-24%2Clow%2Cmedium HTTP 301
    https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

14 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
phishing_feeds.html,9-aug-24,low,medium
aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/
4 KB
2 KB
Document
General
Full URL
https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3037::ac43:d7ee , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cc91552213f879fd37afba6e3695944988b4ff172912019594fb25a04d15116b
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

cf-ray
8b20c4b41d1a3a5a-FRA
content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Mon, 12 Aug 2024 13:21:25 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kqUq3iXPA5ZOKi8NwJgLWF669TKgbuAq2qRF5%2FU7cC4%2Bdl3TlUxhC5SXRsKiOk0Yg2i2PfkOnrdpbCKTjI2j0l7tFhu6LPsvmzcdosCQuOafRZWIQrW2OeueRkjfI2dx1M%2FfSk4Df6v%2F9i8XqB%2FyEF3HcOvM9Zh0JjGEtZjXVFeR2WmL"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
x-frame-options
SAMEORIGIN
cf.errors.css
aboev-a676.sviooeesmmttan.workers.dev/cdn-cgi/styles/
23 KB
5 KB
Stylesheet
General
Full URL
https://aboev-a676.sviooeesmmttan.workers.dev/cdn-cgi/styles/cf.errors.css
Requested by
Host: aboev-a676.sviooeesmmttan.workers.dev
URL: https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3037::ac43:d7ee , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
84e3c77025ace5af143972b4a40fc834dcdfd4e449d4b36a57e62326f16b3091
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Referer
https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

date
Mon, 12 Aug 2024 13:21:25 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 07 Aug 2024 09:34:53 GMT
server
cloudflare
etag
W/"66b33fbd-5df3"
x-frame-options
DENY
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=7200, public
cf-ray
8b20c4b46d7d3a5a-FRA
expires
Mon, 12 Aug 2024 15:21:25 GMT
icon-exclamation.png
aboev-a676.sviooeesmmttan.workers.dev/cdn-cgi/images/
452 B
635 B
Image
General
Full URL
https://aboev-a676.sviooeesmmttan.workers.dev/cdn-cgi/images/icon-exclamation.png?1376755637
Requested by
Host: aboev-a676.sviooeesmmttan.workers.dev
URL: https://aboev-a676.sviooeesmmttan.workers.dev/cdn-cgi/styles/cf.errors.css
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3037::ac43:d7ee , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Referer
https://aboev-a676.sviooeesmmttan.workers.dev/cdn-cgi/styles/cf.errors.css
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

date
Mon, 12 Aug 2024 13:21:26 GMT
x-content-type-options
nosniff
last-modified
Wed, 07 Aug 2024 09:34:53 GMT
server
cloudflare
etag
"66b33fbd-1c4"
x-frame-options
DENY
vary
Accept-Encoding
content-type
image/png
cache-control
max-age=7200, public
accept-ranges
bytes
cf-ray
8b20c4befbd73a5a-FRA
content-length
452
expires
Mon, 12 Aug 2024 15:21:26 GMT
favicon.ico
aboev-a676.sviooeesmmttan.workers.dev/
1 MB
477 KB
Other
General
Full URL
https://aboev-a676.sviooeesmmttan.workers.dev/favicon.ico
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3037::ac43:d7ee , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9793e2897ed72dde15eeb0c0f070b0acb3c1c954221e8f141e6031b8c8d699e3

Request headers

Referer
https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

date
Mon, 12 Aug 2024 13:21:27 GMT
content-encoding
br
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=l1wnY09A%2Bn5rcXx%2B4%2FudtUz1BUF1QKLFiOdvLM0P4IHMYU9WQ6uskgzRTFeCb%2BnRf3X9v5HA7Gd2F0pYPS8LaZlLdA13ZXva7j14SLM3aiLYmsxBevV7WnhTGX41iErD%2BLOumr0cdV2p9mcaIrYoK77RQ7fpK8bR3Ttz7oL3K8xKeO5G"}],"group":"cf-nel","max_age":604800}
content-type
text/html;charset=UTF-8
cf-ray
8b20c4c57d6a3a5a-FRA
alt-svc
h3=":443"; ma=86400
Primary Request phishing_feeds.html,9-aug-24,low,medium
aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/
Redirect Chain
  • https://aboev-a676.sviooeesmmttan.workers.dev/cdn-cgi/phish-bypass?atok=sZHUKQtvjwuWA_Aj_2exi3_Biwo4cacUTrdMvy0B42s-1723468885-0.0.1.1-%2F%2Cn%2Fa%2Chttps%3A%2Fopenphish.com%2Fphishing_feeds.html%2...
  • https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium
1 MB
477 KB
Document
General
Full URL
https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3037::ac43:d7ee , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9793e2897ed72dde15eeb0c0f070b0acb3c1c954221e8f141e6031b8c8d699e3

Request headers

Referer
https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

alt-svc
h3=":443"; ma=86400
cf-ray
8b20c4e37f063a5a-FRA
content-encoding
br
content-type
text/html;charset=UTF-8
date
Mon, 12 Aug 2024 13:21:32 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ao3quf6M%2FqweMJC%2FUKqZ98xXZ9tYETPj%2FUWGqiQv5n%2FA8NVD1qrZM9z3fAfm4WkT%2BG9DsBAVJvSENf9p2l42oHkSf72yErnuEPGtWks6hOb4fb0OQy8S1C8mYIsSQELEdD0TH0mPxO6rzStmV0pe%2BN023JN4Rp1zEmiM6W7KtOWhRXL7"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding

Redirect headers

cache-control
private, no-cache
cf-ray
8b20c4e08a173a5a-FRA
content-length
167
content-type
text/html
date
Mon, 12 Aug 2024 13:21:32 GMT
location
https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium
server
cloudflare
x-content-type-options
nosniff
x-frame-options
DENY
jquery-3.4.1.min.js
code.jquery.com/
86 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.4.1.min.js
Requested by
Host: aboev-a676.sviooeesmmttan.workers.dev
URL: https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:400::649 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash

Request headers

Referer
https://aboev-a676.sviooeesmmttan.workers.dev/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

date
Mon, 12 Aug 2024 13:21:37 GMT
content-encoding
gzip
via
1.1 varnish, 1.1 varnish
age
3562634
x-cache
HIT, HIT
content-length
30638
x-served-by
cache-lga21923-LGA, cache-fra-etou8220132-FRA
last-modified
Fri, 18 Oct 1991 12:00:00 GMT
server
nginx
x-timer
S1723468898.873956,VS0,VE0
etag
W/"28feccc0-15851"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=604800
accept-ranges
bytes
x-cache-hits
34, 286457
4cc19928-5c33-4dc5-9064-6fd65c1932fb
https://aboev-a676.sviooeesmmttan.workers.dev/
1 MB
0
Document
General
Full URL
blob:https://aboev-a676.sviooeesmmttan.workers.dev/4cc19928-5c33-4dc5-9064-6fd65c1932fb
Requested by
Host: aboev-a676.sviooeesmmttan.workers.dev
URL: https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
93d6a1fb016c6ad5261b79afca254fc29a219c2e9e801c8eb3624ce92973b6d9

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

Content-Length
1156810
Content-Type
text/html
favicon.ico
aboev-a676.sviooeesmmttan.workers.dev/
1 MB
477 KB
Other
General
Full URL
https://aboev-a676.sviooeesmmttan.workers.dev/favicon.ico
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3037::ac43:d7ee , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

Referer
https://aboev-a676.sviooeesmmttan.workers.dev/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Response headers

date
Mon, 12 Aug 2024 13:21:39 GMT
content-encoding
br
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zwsDxPEYaWiMdMm2hilhTfzDbyGTGT6vRv%2BjnkwFYqBzQygLjxewSrl1ZQzTkTK5AtLklJwpuBiArAYPzsPG1wa4Zxrs785OsekTiOjkTAnUkjvh%2BiVScPMAocrrJwfzsAd6w00KjvBhseHaom5Z78EPZAgf1D877761CMjAb3v%2F9Q%2BM"}],"group":"cf-nel","max_age":604800}
content-type
text/html;charset=UTF-8
cf-ray
8b20c50cea383a5a-FRA
alt-svc
h3=":443"; ma=86400
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/
0
0

jquery-3.1.1.min.js
code.jquery.com/
0
0

adobe-document-cloud-adobe_document_cloud_icon.jpg
images.sftcdn.net/images/t_app-icon-m/p/1c15b909-815a-41d4-96ec-4b5e49df2bf5/1368911181/
0
0

images
encrypted-tbn0.gstatic.com/
0
0

images
encrypted-tbn0.gstatic.com/
0
0

email-marketing-icon-vector-graphics-vector-id1257404830
media.istockphoto.com/vectors/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
ajax.googleapis.com
URL
https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
Domain
code.jquery.com
URL
https://code.jquery.com/jquery-3.1.1.min.js
Domain
images.sftcdn.net
URL
https://images.sftcdn.net/images/t_app-icon-m/p/1c15b909-815a-41d4-96ec-4b5e49df2bf5/1368911181/adobe-document-cloud-adobe_document_cloud_icon.jpg
Domain
encrypted-tbn0.gstatic.com
URL
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcSji3uKkCIRNa58VvKNMk1J-nCZF2gpyVTw8h6jbk5Z3PKiV7Lxt0ZVOCJGcEs8a6gRfkY&usqp=CAU
Domain
encrypted-tbn0.gstatic.com
URL
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcT_nWscHt0NMdQ4G2yJql7JkGXaouoS5bKezYi3ioReBoW1VJo5gpINKDkf8ShxbjobVfs&usqp=CAU
Domain
media.istockphoto.com
URL
https://media.istockphoto.com/vectors/email-marketing-icon-vector-graphics-vector-id1257404830?k=20&m=1257404830&s=612x612&w=0&h=LOwm34ubd_vUzqIi5k3rxflh04NbZTZEnSTYSVmX2Jk=

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Cloudflare (Online)

74 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| _0x5b8f22 function| _0x4f7e function| _0x1d33 function| IiiI6Y4Ca56Nc1o2nfu6se6iiii function| lllLL6Y4cA56nc1o2nfu6se6llll string| qxsQon object| aKqpiHi function| RjXEfG object| HeVzJS number| khs3CEb object| lsFFXCH string| ivbfTY string| hRdtVJ string| Slw_Cdr string| gnsDrL string| aoZNSTM string| EinEb5W string| nEDdYJ string| VEksmT string| c9pQrfm string| Q4qSBG3 string| lv88fc6 string| C2vmURq string| lBhm6qL string| KCXxxo string| kcs9Rt4 string| DdOODm string| XPOnp5L string| lvDosp string| wklnG7_ string| Ow_OBL string| Uv8KUG4 string| UPPg7UH string| Ceo2ij string| qvmG_V string| GZOv45 string| CHnpJqR string| dtKYfz string| Tq4lwNL string| nG4okm string| MY_59x string| VtkQBuS string| lvplwR string| q51LUMG string| Mh7zAm string| TOlja_ string| VT3LX6 object| k7HXhLQ object| JcoOae object| ahCCfg object| GxmzLfr function| wEG1WXm function| lbBA_b function| liii6y4ca56nc1o2nfu6se6iiii number| KDgKeP string| tH843r1 string| WYigMkz number| FY68MeQ function| Ch31Gz string| uFNTLT string| Ql3Luar string| idkCD1G number| Y87yve function| lF3yi2 function| iiii6y4ca56nc1o2nfu6se6iiii function| lllll6y4ca56nc1o2nfu6se6llll function| aMcF0L function| ZNAgDU function| IS1Tvn function| hgZuXW function| Yq16kg function| TusYl4 function| hVTbifP function| llll6y4ca56nc1o2nfu6se6iii

1 Cookies

Domain/Path Name / Value
.aboev-a676.sviooeesmmttan.workers.dev/ Name: __cf_mw_byp
Value: sZHUKQtvjwuWA_Aj_2exi3_Biwo4cacUTrdMvy0B42s-1723468885-0.0.1.1-/,n/a,https:/openphish.com/phishing_feeds.html,9-aug-24,low,medium

3 Console Messages

Source Level URL
Text
javascript warning
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://code.jquery.com/jquery-3.1.1.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options SAMEORIGIN