www.computerfraudsecurity.com
Open in
urlscan Pro
118.139.180.125
Public Scan
Effective URL: https://www.computerfraudsecurity.com/index.php/journal
Submission: On August 03 via automatic, source certstream-suspicious — Scanned from SG
Summary
TLS certificate: Issued by R11 on July 26th 2024. Valid for: 3 months.
This is the only time www.computerfraudsecurity.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 12 | 118.139.180.125 118.139.180.125 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC) | |
11 | 1 |
ASN26496 (AS-26496-GO-DADDY-COM-LLC, US)
PTR: 125.180.139.118.host.secureserver.net
www.computerfraudsecurity.com | |
computerfraudsecurity.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
computerfraudsecurity.com
1 redirects
www.computerfraudsecurity.com computerfraudsecurity.com |
1 MB |
11 | 1 |
Domain | Requested by | |
---|---|---|
11 | www.computerfraudsecurity.com |
1 redirects
www.computerfraudsecurity.com
|
1 | computerfraudsecurity.com |
www.computerfraudsecurity.com
|
11 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
computerfraudsecurity.com |
www.sciencedirect.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
computerfraudsecurity.com R11 |
2024-07-26 - 2024-10-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.computerfraudsecurity.com/index.php/journal
Frame ID: 3306616DBA371B95604DAA6714018D39
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
Computer Fraud and SecurityPage URL History Show full URLs
-
https://www.computerfraudsecurity.com/
HTTP 302
https://www.computerfraudsecurity.com/index.php/journal Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- jquery-ui.*\.js
Page Statistics
34 Outgoing links
These are links going to different origins than the main page.
Title: Home
Search URL Search Domain Scan URL
Title: Instructions for Authors
Search URL Search Domain Scan URL
Title: New UK laws aim to boost communications and Internet of Things security
Search URL Search Domain Scan URL
Title: Editorial
Search URL Search Domain Scan URL
Title: Europol cracks down on fraudsters
Search URL Search Domain Scan URL
Title: Microsoft seizes Chinese APT domains
Search URL Search Domain Scan URL
Title: Europol: Internet Organised Crime Threat Assessment (IOCTA) 2021
Search URL Search Domain Scan URL
Title: In brief
Search URL Search Domain Scan URL
Title: The industrialisation of cyber extortion
Search URL Search Domain Scan URL
Title: Fintech's need for holistic security
Search URL Search Domain Scan URL
Title: Cyber incident response and planning: a flexible approach
Search URL Search Domain Scan URL
Title: Deconstructing the SolarWinds breach
Search URL Search Domain Scan URL
Title: Counteracting social engineering attacks
Search URL Search Domain Scan URL
Title: Zero-width text steganography in cybercrime attacks
Search URL Search Domain Scan URL
Title: Defending against insider threats with network security's eighth layer
Search URL Search Domain Scan URL
Title: Keep the dark web close and your cyber security tighter
Search URL Search Domain Scan URL
Title: IT/OT convergence and cyber security
Search URL Search Domain Scan URL
Title: Ransomware: to pay or not to pay?
Search URL Search Domain Scan URL
Title: Home working and cyber security – an outbreak of unpreparedness?
Search URL Search Domain Scan URL
Title: Open banking: opportunity and danger
Search URL Search Domain Scan URL
Title: The problem with Bitcoin
Search URL Search Domain Scan URL
Title: Overcoming the security risks of remote working
Search URL Search Domain Scan URL
Title: A basic malware analysis method
Search URL Search Domain Scan URL
Title: Information security architecture
Search URL Search Domain Scan URL
Title: Cybercrime as a service: a very modern business
Search URL Search Domain Scan URL
Title: A new response to escalating state threats
Search URL Search Domain Scan URL
Title: Archives
Search URL Search Domain Scan URL
Title: Aims & Scope
Search URL Search Domain Scan URL
Title: Publication Ethics & Policies
Search URL Search Domain Scan URL
Title: Peer Review Policy
Search URL Search Domain Scan URL
Title: Plagiarism Policy
Search URL Search Domain Scan URL
Title: Contact Us
Search URL Search Domain Scan URL
Title: Copyright Form
Search URL Search Domain Scan URL
Title: Paper Template
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.computerfraudsecurity.com/
HTTP 302
https://www.computerfraudsecurity.com/index.php/journal Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
journal
www.computerfraudsecurity.com/index.php/ Redirect Chain
|
17 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
www.computerfraudsecurity.com/index.php/journal/$$$call$$$/page/page/ |
132 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styleSheet.css
www.computerfraudsecurity.com/public/journals/1/ |
668 B 326 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
book-cover-b5ad48e207bac041c372bef935188e8a.jpg
computerfraudsecurity.com/public/site/images/admin_computerfraudsecurity/ |
515 KB 516 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
www.computerfraudsecurity.com/lib/pkp/lib/vendor/components/jquery/ |
87 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.min.js
www.computerfraudsecurity.com/lib/pkp/lib/vendor/components/jqueryui/ |
248 KB 63 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.tag-it.js
www.computerfraudsecurity.com/lib/pkp/js/lib/jquery/plugins/ |
23 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
www.computerfraudsecurity.com/plugins/themes/bootstrap3/bootstrap/js/ |
39 KB 10 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ubuntu-v15-latin-ext_latin_greek-ext_greek_cyrillic-ext_cyrillic-regular.woff2
www.computerfraudsecurity.com/plugins/themes/bootstrap3/fonts/ |
109 KB 109 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ubuntu-v15-latin-ext_latin_greek-ext_greek_cyrillic-ext_cyrillic-700.woff2
www.computerfraudsecurity.com/plugins/themes/bootstrap3/fonts/ |
94 KB 95 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon_en_US.png
www.computerfraudsecurity.com/public/journals/1/ |
453 KB 453 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.www.computerfraudsecurity.com/ | Name: OJSSID Value: 77f9a940040550c3eb68fbbf7713c3c2 |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
computerfraudsecurity.com
www.computerfraudsecurity.com
118.139.180.125
28be49eeb4ffc5511d5ae0222bf076f58bd3fec88947bf15163607d257fa153c
28ce75d953678c4942df47a11707a15e3c756021cf89090e3e6aa7ad6b6971c3
3a505c86f0cb3f21cf26f04a77d845434be90332938391f11138173050664a32
450a235e4617e79014b8124e7c0ac2ba9110bcc11ee512e5bcac5bdc0255bf92
69ec73747fd447beb25000064f23321502a64c03b22ec6d35412e6375c1fd09e
883c366e7b14094f12fcb587472661455f577f3e806901b294fedc7d7a89cbe8
9ee2fcff6709e4d0d24b09ca0fc56aade12b4961ed9c43fd13b03248bfb57afe
d195ba80074d70a7077b66ac96c7d6418ccc34a6d3b79e55f0993ef94cbff85c
d8d0cb77edd987f7950dc4f668d6e0461f7042ef9b7bdf3a7a96959fd5db7207
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d
f8f38eac23b440a8e8d4386a6beb93b2fc512ab595e1bf8a0188785a5f4b1241