URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-ac...
Submission: On August 13 via api from GB

Summary

This website contacted 10 IPs in 3 countries across 7 domains to perform 40 HTTP transactions. The main IP is 83.217.80.169, located in Antwerp, Belgium and belongs to COMBELL-AS, BE. The main domain is icct.nl.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on July 3rd 2021. Valid for: a year.
This is the only time icct.nl was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

Domain Requested by
28 icct.nl icct.nl
5 use.typekit.net icct.nl
2 www.google-analytics.com icct.nl
www.google-analytics.com
1 p.typekit.net
1 stats.g.doubleclick.net www.google-analytics.com
1 www.googletagmanager.com icct.nl
1 stackpath.bootstrapcdn.com icct.nl
1 cdn.jsdelivr.net icct.nl
40 8

This site contains links to these domains. Also see Links.

Domain
www.facebook.com
www.linkedin.com
twitter.com
icct.us10.list-manage.com
Subject Issuer Validity Valid
www.icct.nl
Sectigo RSA Domain Validation Secure Server CA
2021-07-03 -
2022-07-15
a year crt.sh
use.typekit.net
DigiCert TLS RSA SHA256 2020 CA1
2020-11-03 -
2021-11-07
a year crt.sh
jsdelivr.net
GlobalSign Atlas R3 DV TLS CA 2020
2021-04-30 -
2022-06-01
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-03-01 -
2022-02-28
a year crt.sh
*.google-analytics.com
GTS CA 1C3
2021-07-12 -
2021-10-04
3 months crt.sh
*.g.doubleclick.net
GTS CA 1C3
2021-07-12 -
2021-10-04
3 months crt.sh
*.typekit.net
DigiCert TLS RSA SHA256 2020 CA1
2021-07-16 -
2022-07-21
a year crt.sh

This page contains 1 frames:

Primary Page: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Frame ID: 82833A7C69FB0FB6EA9B799DC74046B4
Requests: 46 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<!-- (?:End )?Google Tag Manager -->/i

Overall confidence: 100%
Detected patterns
  • script /tracker\.js/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
  • script /jquery[.-]migrate(?:-([\d.]+))?(?:\.min)?\.js(?:\?ver=([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]migrate(?:-([\d.]+))?(?:\.min)?\.js(?:\?ver=([\d.]+))?/i

Page Statistics

40
Requests

100 %
HTTPS

89 %
IPv6

7
Domains

8
Subdomains

10
IPs

3
Countries

1664 kB
Transfer

2670 kB
Size

3
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

40 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
icct.nl/app/uploads/2021/05/
31 KB
7 KB
Document
General
Full URL
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
2996476ce49a6ea4bac11fe1ee2baca3377709a27700b9305cf7b1a80cedfcc4

Request headers

:method
GET
:authority
icct.nl
:scheme
https
:path
/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

server
nginx
date
Fri, 13 Aug 2021 06:06:19 GMT
content-type
text/html; charset=UTF-8
expires
Wed, 11 Jan 1984 05:00:00 GMT
cache-control
no-cache, must-revalidate, max-age=0
link
<https://icct.nl/wp-json/>; rel="https://api.w.org/"
content-encoding
gzip
mma2gnx.js
use.typekit.net/
17 KB
7 KB
Script
General
Full URL
https://use.typekit.net/mma2gnx.js
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00::210:ba0a Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
nginx /
Resource Hash
30d3dfa4a5ad933d000e449fb930f5a51c33340d6f9209f993fa89bf13ff2c03
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains;

Request headers

Referer
https://icct.nl/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains;
content-encoding
gzip
server
nginx
date
Fri, 13 Aug 2021 06:06:19 GMT
vary
Accept-Encoding
content-type
text/javascript;charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=600, stale-while-revalidate=604800
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
content-length
6860
style.min.css
icct.nl/wp/wp-includes/css/dist/block-library/
50 KB
8 KB
Stylesheet
General
Full URL
https://icct.nl/wp/wp-includes/css/dist/block-library/style.min.css?ver=4f8d4910623a8c528b4be9a0ef94e5ed
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
5c2288ca7b324881faae5e368eb4d69457e2784e042e868de335d3827bb90981

Request headers

:path
/wp/wp-includes/css/dist/block-library/style.min.css?ver=4f8d4910623a8c528b4be9a0ef94e5ed
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:19 GMT
content-encoding
gzip
last-modified
Tue, 08 Dec 2020 22:12:11 GMT
server
nginx
etag
"c8e9-5b5fb3bf6c4c0-gzip"
vary
Accept-Encoding
content-type
text/css
accept-ranges
bytes
content-length
7855
font-awesome.min.css
icct.nl/app/plugins/responsive-accordion-and-collapse/css/font-awesome/css/
20 KB
5 KB
Stylesheet
General
Full URL
https://icct.nl/app/plugins/responsive-accordion-and-collapse/css/font-awesome/css/font-awesome.min.css?ver=4f8d4910623a8c528b4be9a0ef94e5ed
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
b769324e0921f9f649611113e65f528ebae5e140da8a7e63c5d6ea7bc7a33bc0

Request headers

:path
/app/plugins/responsive-accordion-and-collapse/css/font-awesome/css/font-awesome.min.css?ver=4f8d4910623a8c528b4be9a0ef94e5ed
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:19 GMT
content-encoding
gzip
last-modified
Wed, 27 Jan 2016 08:17:08 GMT
server
nginx
etag
"511e-52a4c6d964900-gzip"
vary
Accept-Encoding
content-type
text/css
accept-ranges
bytes
content-length
4696
bootstrap-front.css
icct.nl/app/plugins/responsive-accordion-and-collapse/css/
15 KB
2 KB
Stylesheet
General
Full URL
https://icct.nl/app/plugins/responsive-accordion-and-collapse/css/bootstrap-front.css?ver=4f8d4910623a8c528b4be9a0ef94e5ed
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
30240ca5ad1b936fbbfa298a91b24cbfd8c805bab1e5fb59c30bb9308e3704a7

Request headers

:path
/app/plugins/responsive-accordion-and-collapse/css/bootstrap-front.css?ver=4f8d4910623a8c528b4be9a0ef94e5ed
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:19 GMT
content-encoding
gzip
last-modified
Wed, 02 Mar 2016 06:52:18 GMT
server
nginx
etag
"3a09-52d0b52a52c80-gzip"
vary
Accept-Encoding
content-type
text/css
accept-ranges
bytes
content-length
1720
common.min.9d14a3d8dd2c25b61475.css
icct.nl/app/themes/icct/static/
392 KB
262 KB
Stylesheet
General
Full URL
https://icct.nl/app/themes/icct/static/common.min.9d14a3d8dd2c25b61475.css?ver=4f8d4910623a8c528b4be9a0ef94e5ed
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
fee93fa02627ef2a598b96aa174cedfd13ed5cd69dd41883e8c7538215ecad6b

Request headers

:path
/app/themes/icct/static/common.min.9d14a3d8dd2c25b61475.css?ver=4f8d4910623a8c528b4be9a0ef94e5ed
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:19 GMT
content-encoding
gzip
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
etag
"61e86-5b921278a7d00-gzip"
vary
Accept-Encoding
content-type
text/css
accept-ranges
bytes
icct.min.9d14a3d8dd2c25b61475.css
icct.nl/app/themes/icct/static/
1 MB
770 KB
Stylesheet
General
Full URL
https://icct.nl/app/themes/icct/static/icct.min.9d14a3d8dd2c25b61475.css?ver=4f8d4910623a8c528b4be9a0ef94e5ed
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
eb92de37974997bb4d81d80cd2ae610f08311e456901707704d3a5bb49a4bf09

Request headers

:path
/app/themes/icct/static/icct.min.9d14a3d8dd2c25b61475.css?ver=4f8d4910623a8c528b4be9a0ef94e5ed
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:19 GMT
content-encoding
gzip
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
etag
"159edb-5b921278a7d00-gzip"
vary
Accept-Encoding
content-type
text/css
accept-ranges
bytes
jquery.min.js
icct.nl/wp/wp-includes/js/jquery/
87 KB
88 KB
Script
General
Full URL
https://icct.nl/wp/wp-includes/js/jquery/jquery.min.js?ver=3.5.1
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
60240d5a27ede94fd35fea44bd110b88c7d8cfc08127f032d13b0c622b8be827

Request headers

:path
/wp/wp-includes/js/jquery/jquery.min.js?ver=3.5.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:19 GMT
last-modified
Tue, 08 Dec 2020 22:12:11 GMT
server
nginx
accept-ranges
bytes
etag
"15d98-5b5fb3bf6c4c0"
content-length
89496
content-type
application/javascript
jquery-migrate.min.js
icct.nl/wp/wp-includes/js/jquery/
11 KB
11 KB
Script
General
Full URL
https://icct.nl/wp/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
029e0a2e809fd6b5dbe76abe8b7a74936be306c9a8c27c814c4d44aa54623300

Request headers

:path
/wp/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:19 GMT
last-modified
Tue, 08 Dec 2020 22:12:11 GMT
server
nginx
accept-ranges
bytes
etag
"2bd8-5b5fb3bf6c4c0"
content-length
11224
content-type
application/javascript
gtm4wp-form-move-tracker.js
icct.nl/app/plugins/duracelltomi-google-tag-manager/js/
1 KB
2 KB
Script
General
Full URL
https://icct.nl/app/plugins/duracelltomi-google-tag-manager/js/gtm4wp-form-move-tracker.js?ver=1.11.6
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
bc71c403dc6113c8597e111a99d6a6a197dd2f2355402f8392ca4812dca57d3d

Request headers

:path
/app/plugins/duracelltomi-google-tag-manager/js/gtm4wp-form-move-tracker.js?ver=1.11.6
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:19 GMT
last-modified
Tue, 25 Sep 2018 09:11:58 GMT
server
nginx
accept-ranges
bytes
etag
"5cf-576ae7f703380"
content-length
1487
content-type
application/javascript
map_blank.png
icct.nl/app/themes/icct/images/regions/
13 KB
13 KB
Image
General
Full URL
https://icct.nl/app/themes/icct/images/regions/map_blank.png
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
1d334b5b3eea9aa77a5686cde29a090529f09633195eca0c0f6a34243709e70f

Request headers

:path
/app/themes/icct/images/regions/map_blank.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
accept-ranges
bytes
etag
"34c2-5b921278a7d00"
content-length
13506
content-type
image/png
map_east-africa.png
icct.nl/app/themes/icct/images/regions/
14 KB
14 KB
Image
General
Full URL
https://icct.nl/app/themes/icct/images/regions/map_east-africa.png
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
89f73c250d87a7151acdcec884df1ff61438ed880d6351ccf93694c87558557d

Request headers

:path
/app/themes/icct/images/regions/map_east-africa.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
accept-ranges
bytes
etag
"37a5-5b921278a7d00"
content-length
14245
content-type
image/png
map_europe.png
icct.nl/app/themes/icct/images/regions/
15 KB
15 KB
Image
General
Full URL
https://icct.nl/app/themes/icct/images/regions/map_europe.png
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
9408aed3a87c3e14fbc0a30aabebfa16d527c54babdd1c26a9728e3bec5da4aa

Request headers

:path
/app/themes/icct/images/regions/map_europe.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
accept-ranges
bytes
etag
"3b5a-5b921278a7d00"
content-length
15194
content-type
image/png
map_middle-east.png
icct.nl/app/themes/icct/images/regions/
14 KB
14 KB
Image
General
Full URL
https://icct.nl/app/themes/icct/images/regions/map_middle-east.png
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
aea311efd270e59a302dd948a2de0c7b32a84ef011f50cbc6525a0e9f0ce5eea

Request headers

:path
/app/themes/icct/images/regions/map_middle-east.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
accept-ranges
bytes
etag
"374a-5b921278a7d00"
content-length
14154
content-type
image/png
map_north-africa.png
icct.nl/app/themes/icct/images/regions/
14 KB
14 KB
Image
General
Full URL
https://icct.nl/app/themes/icct/images/regions/map_north-africa.png
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
3b8f5cf47104be106002a9beb4890c35f1b61b5f0ec5f9a5e9cc9e33f17ee259

Request headers

:path
/app/themes/icct/images/regions/map_north-africa.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
accept-ranges
bytes
etag
"37b7-5b921278a7d00"
content-length
14263
content-type
image/png
map_north-america.png
icct.nl/app/themes/icct/images/regions/
14 KB
14 KB
Image
General
Full URL
https://icct.nl/app/themes/icct/images/regions/map_north-america.png
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
5b22185b9791884aa114672a2abe268e1c6f69255cc9829f53d8791e3ae2f27e

Request headers

:path
/app/themes/icct/images/regions/map_north-america.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
accept-ranges
bytes
etag
"37c1-5b921278a7d00"
content-length
14273
content-type
image/png
map_south-america.png
icct.nl/app/themes/icct/images/regions/
14 KB
14 KB
Image
General
Full URL
https://icct.nl/app/themes/icct/images/regions/map_south-america.png
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
1c25087f02c4caa9de428823f9b3d718d804d12871cb96aab01eb5c187d74f65

Request headers

:path
/app/themes/icct/images/regions/map_south-america.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
accept-ranges
bytes
etag
"3614-5b921278a7d00"
content-length
13844
content-type
image/png
map_south-asia.png
icct.nl/app/themes/icct/images/regions/
14 KB
14 KB
Image
General
Full URL
https://icct.nl/app/themes/icct/images/regions/map_south-asia.png
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
602b608624ae6c4d18e7309f3417036d75da424f5002b650970abe48f74b159b

Request headers

:path
/app/themes/icct/images/regions/map_south-asia.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
accept-ranges
bytes
etag
"37b3-5b921278a7d00"
content-length
14259
content-type
image/png
menu_arr.png
icct.nl/app/themes/icct/images/
3 KB
3 KB
Image
General
Full URL
https://icct.nl/app/themes/icct/images/menu_arr.png
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
9b77cdf7a3cec67b7e58a8fcf928c00701d3212395a66cf9c6acaa5dbc8d4efb

Request headers

:path
/app/themes/icct/images/menu_arr.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
accept-ranges
bytes
etag
"c3d-5b921278a7d00"
content-length
3133
content-type
image/png
map_south-east-asia.png
icct.nl/app/themes/icct/images/regions/
15 KB
15 KB
Image
General
Full URL
https://icct.nl/app/themes/icct/images/regions/map_south-east-asia.png?v2
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
557724131bd70898ed3c2156108b57e383eaf0c52230254f6e9c020600924b1c

Request headers

:path
/app/themes/icct/images/regions/map_south-east-asia.png?v2
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
accept-ranges
bytes
etag
"3c6c-5b921278a7d00"
content-length
15468
content-type
image/png
map_mena-maghreb.png
icct.nl/app/themes/icct/images/regions/
14 KB
14 KB
Image
General
Full URL
https://icct.nl/app/themes/icct/images/regions/map_mena-maghreb.png
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
dfecaad360d342b3e544a8cc4399b7be15bf65ce872b21a3e78e52653548f724

Request headers

:path
/app/themes/icct/images/regions/map_mena-maghreb.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
accept-ranges
bytes
etag
"3952-5b921278a7d00"
content-length
14674
content-type
image/png
map_west-africa-sahel.png
icct.nl/app/themes/icct/images/regions/
14 KB
14 KB
Image
General
Full URL
https://icct.nl/app/themes/icct/images/regions/map_west-africa-sahel.png
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
cb5b625830a759a5aeceba93e26e9faf4cf78f814eb3c2ddd64bd5e408be17ad

Request headers

:path
/app/themes/icct/images/regions/map_west-africa-sahel.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
accept-ranges
bytes
etag
"3812-5b921278a7d00"
content-length
14354
content-type
image/png
bootstrap.js
icct.nl/app/plugins/responsive-accordion-and-collapse/js/
67 KB
68 KB
Script
General
Full URL
https://icct.nl/app/plugins/responsive-accordion-and-collapse/js/bootstrap.js?ver=4f8d4910623a8c528b4be9a0ef94e5ed
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
82f91775fb8bdb5bdca4563ebaf4ecf2e50bc907666d8d5b3bd21c5567f35602

Request headers

:path
/app/plugins/responsive-accordion-and-collapse/js/bootstrap.js?ver=4f8d4910623a8c528b4be9a0ef94e5ed
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sat, 28 Nov 2020 06:02:16 GMT
server
nginx
accept-ranges
bytes
etag
"10d63-5b52484dbca00"
content-length
68963
content-type
application/javascript
accordion.js
icct.nl/app/plugins/responsive-accordion-and-collapse/js/
461 B
604 B
Script
General
Full URL
https://icct.nl/app/plugins/responsive-accordion-and-collapse/js/accordion.js?ver=4f8d4910623a8c528b4be9a0ef94e5ed
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
593ac639f7b6a3b6de766919b40ff748bedb63570719a55aec8f196ec7df742a

Request headers

:path
/app/plugins/responsive-accordion-and-collapse/js/accordion.js?ver=4f8d4910623a8c528b4be9a0ef94e5ed
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Wed, 27 Jan 2016 08:17:08 GMT
server
nginx
accept-ranges
bytes
etag
"1cd-52a4c6d964900"
content-length
461
content-type
application/javascript
popper.min.js
cdn.jsdelivr.net/npm/popper.js@1.16.1/dist/umd/
21 KB
7 KB
Script
General
Full URL
https://cdn.jsdelivr.net/npm/popper.js@1.16.1/dist/umd/popper.min.js?ver=1.16.1
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:3::485 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
fe28dc38bc057f6eb11180235bbe458b3295a39b674d889075d3d9a0b5071d9f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://icct.nl/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
age
4599143
x-cache
HIT
cross-origin-resource-policy
cross-origin
content-length
7503
etag
W/"52f1-MTeJyg4xtlR4TbuosPg/Nk+Gg7Q"
x-served-by
cache-fra19182-FRA
date
Fri, 13 Aug 2021 06:06:20 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
accept-ranges
bytes
timing-allow-origin
*
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.5.2/js/
59 KB
15 KB
Script
General
Full URL
https://stackpath.bootstrapcdn.com/bootstrap/4.5.2/js/bootstrap.min.js?ver=4.5.2
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:bcf , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
79c599dd760cec0c1621a1af49d9a2a49da5d45e1b37d4575bace0a5e0226582
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://icct.nl/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
cdn-edgestorageid
601, 617, 617
age
9678974
cdn-cachedat
2021-04-23 06:18:12
cdn-pullzone
252412
cross-origin-resource-policy
cross-origin
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
timing-allow-origin
*
access-control-allow-origin
*
last-modified
Mon, 25 Jan 2021 22:04:11 GMT
server
cloudflare
cdn-requestpullcode
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/javascript; charset=utf-8
cdn-cache
HIT
vary
Accept-Encoding
cache-control
public, max-age=31919000
cdn-uid
b1941f61-b576-4f40-80de-5677acb38f74
cdn-requestid
909506669cd72d0d89ff427c70bad675
cf-ray
67dfc1bf4f62c281-FRA
cdn-requestcountrycode
DE
cdn-requestpullsuccess
True
app.min.9d14a3d8dd2c25b61475.js
icct.nl/app/themes/icct/static/
2 KB
2 KB
Script
General
Full URL
https://icct.nl/app/themes/icct/static/app.min.9d14a3d8dd2c25b61475.js?ver=4f8d4910623a8c528b4be9a0ef94e5ed
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
eff49aced36cfe96c42a6efeb191db304b1bcc6a99ec04cae2970e3e54ce97e2

Request headers

:path
/app/themes/icct/static/app.min.9d14a3d8dd2c25b61475.js?ver=4f8d4910623a8c528b4be9a0ef94e5ed
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
accept-ranges
bytes
etag
"966-5b921278a7d00"
content-length
2406
content-type
application/javascript
default.js
icct.nl/app/themes/icct/js/src/
10 KB
10 KB
Script
General
Full URL
https://icct.nl/app/themes/icct/js/src/default.js?ver=4f8d4910623a8c528b4be9a0ef94e5ed
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
b26bc8a0bd7fe7dc4aa42c795b197a700648c79c0aaf0d00ed639e482f6a11df

Request headers

:path
/app/themes/icct/js/src/default.js?ver=4f8d4910623a8c528b4be9a0ef94e5ed
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Sun, 17 Jan 2021 23:42:12 GMT
server
nginx
accept-ranges
bytes
etag
"28e0-5b921278a7d00"
content-length
10464
content-type
application/javascript
new-tab.js
icct.nl/app/plugins/page-links-to/dist/
24 KB
24 KB
Script
General
Full URL
https://icct.nl/app/plugins/page-links-to/dist/new-tab.js?ver=3.3.5
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
d455ab882af3a742e6c9680578e6a590681bda99e34847f550f1f41a7d167969

Request headers

:path
/app/plugins/page-links-to/dist/new-tab.js?ver=3.3.5
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Wed, 22 Jul 2020 23:44:28 GMT
server
nginx
accept-ranges
bytes
etag
"609e-5ab10520d8f00"
content-length
24734
content-type
application/javascript
wp-embed.min.js
icct.nl/wp/wp-includes/js/
1 KB
2 KB
Script
General
Full URL
https://icct.nl/wp/wp-includes/js/wp-embed.min.js?ver=4f8d4910623a8c528b4be9a0ef94e5ed
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
6ebcda7a3a41ef97f0b4071160ceb1020e540fdc0f790079a5c2ef01ab654fe0

Request headers

:path
/wp/wp-includes/js/wp-embed.min.js?ver=4f8d4910623a8c528b4be9a0ef94e5ed
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Tue, 08 Dec 2020 22:12:11 GMT
server
nginx
accept-ranges
bytes
etag
"59a-5b5fb3bf6c4c0"
content-length
1434
content-type
application/javascript
wp-emoji-release.min.js
icct.nl/wp/wp-includes/js/
14 KB
14 KB
Script
General
Full URL
https://icct.nl/wp/wp-includes/js/wp-emoji-release.min.js?ver=4f8d4910623a8c528b4be9a0ef94e5ed
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
83.217.80.169 Antwerp, Belgium, ASN34762 (COMBELL-AS, BE),
Reverse DNS
83.217.80.169.static.hosted.by.combell.com
Software
nginx /
Resource Hash
3685c3818240f5f390073c7d04f944a5cb5d848093224f3a7888034e8c050eb4

Request headers

:path
/wp/wp-includes/js/wp-emoji-release.min.js?ver=4f8d4910623a8c528b4be9a0ef94e5ed
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
icct.nl
referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Tue, 08 Dec 2020 22:12:11 GMT
server
nginx
accept-ranges
bytes
etag
"37a6-5b5fb3bf6c4c0"
content-length
14246
content-type
application/javascript
gtm.js
www.googletagmanager.com/
94 KB
38 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-TJVKZ5D
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:827::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
8c8d2d3591c7a0c2a3fa7c7e4f7f0345b67c14ef199c05d4136f151546356a9c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://icct.nl/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
content-encoding
br
server
Google Tag Manager
access-control-allow-headers
Cache-Control
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38398
x-xss-protection
0
expires
Fri, 13 Aug 2021 06:06:20 GMT
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
09fea96161d9e0f746030bb29d6b23c2d89b9d918944d5df0f82894b6b96efb6

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7ac4655794631ddd8f968b8081a229e066852d3fb67d72a6fcfe8b14ba8c7481

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png
l
use.typekit.net/af/af831b/00000000000000000001705c/23/
35 KB
35 KB
Font
General
Full URL
https://use.typekit.net/af/af831b/00000000000000000001705c/23/l?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n4&v=3
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00::210:ba0a Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
nginx /
Resource Hash
0444e04e428a8483215952139b95826f0bdb8fccd724713c95bf0277ed50d8fa

Request headers

Origin
https://icct.nl
Referer
https://icct.nl/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
server
nginx
etag
"d1fc66ad3032466c18158eb7421594e8c142c28a"
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
content-length
35852
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
294b6fc05e4ba7219e2776904dc2ff7025a471dfa4600e853c8744636ef3aea5

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
673bfc06a90f72c851ec80643e9cc6043d9cd9a1a7ebba9bd69043ddaf2ff11a

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ce267247c1fe1e21d0b871142213fe74a398a4ce09803f87275934c38ea3c87c

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
19bc0ca95a576af620275b6ca75dbf044533616f9a59642ccfa161826147e2fa

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png
analytics.js
www.google-analytics.com/
48 KB
19 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80e::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e61660c659c426e45bce2937dddb01af6b550502a2904546575c1ec2ba1121dd
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://icct.nl/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 13 Jul 2021 18:24:06 GMT
server
Golfe2
age
1786
date
Fri, 13 Aug 2021 05:36:34 GMT
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19672
expires
Fri, 13 Aug 2021 07:36:34 GMT
l
use.typekit.net/af/0be74e/000000000000000000017060/23/
35 KB
35 KB
Font
General
Full URL
https://use.typekit.net/af/0be74e/000000000000000000017060/23/l?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n7&v=3
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00::210:ba0a Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
nginx /
Resource Hash
9e7e6eb134b0ed0c027130cea5942d1b6f7e588cabd70f6b04c1b142a70c6df3

Request headers

Origin
https://icct.nl
Referer
https://icct.nl/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
server
nginx
etag
"272e2f4e6f609e71afb7dd1d80a8a6a3a032c475"
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
content-length
35720
l
use.typekit.net/af/54df34/000000000000000000017061/23/
36 KB
36 KB
Font
General
Full URL
https://use.typekit.net/af/54df34/000000000000000000017061/23/l?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=i7&v=3
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00::210:ba0a Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
nginx /
Resource Hash
58fbec489a55247cb358afd33f6c6fee566c3ec209e80a570fb7d9fa0b64b245

Request headers

Origin
https://icct.nl
Referer
https://icct.nl/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
server
nginx
etag
"490505c3a4b585c6d821caf654de2f144ae393e5"
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
content-length
36932
l
use.typekit.net/af/0f0826/00000000000000000001705d/23/
36 KB
37 KB
Font
General
Full URL
https://use.typekit.net/af/0f0826/00000000000000000001705d/23/l?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=i4&v=3
Requested by
Host: icct.nl
URL: https://icct.nl/app/uploads/2021/05/handbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00::210:ba0a Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
nginx /
Resource Hash
e775069d2fee90226084bc5737dc298b210d284bba6152d3ea3ace18744f07ff

Request headers

Origin
https://icct.nl
Referer
https://icct.nl/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
server
nginx
etag
"a05970caf13199b4e5bf2b34c3b5fa4fa2081fea"
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
content-length
37248
collect
www.google-analytics.com/j/
4 B
24 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j92&a=1049934923&t=pageview&_s=1&dl=https%3A%2F%2Ficct.nl%2Fapp%2Fuploads%2F2021%2F05%2Fhandbook-ch-29-jayakumar-cyber-attacks-by-terrorists-and-other-malevolent-actors.pdf&ul=en-us&de=UTF-8&dt=Page%20not%20found%20-%20ICCT&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAEABAAAAAC~&jid=1945324888&gjid=1102453273&cid=1982552219.1628834780&tid=UA-82080007-1&_gid=1837065397.1628834780&_r=1&_slc=1&z=912319431
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H3-29
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
aec60bc104db041b1512185839f18f52986df7e569e5445f740dd60f763fbca8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://icct.nl/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Fri, 13 Aug 2021 06:06:20 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://icct.nl
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
stats.g.doubleclick.net/j/
1 B
79 B
XHR
General
Full URL
https://stats.g.doubleclick.net/j/collect?t=dc&aip=1&_r=3&v=1&_v=j92&tid=UA-82080007-1&cid=1982552219.1628834780&jid=1945324888&gjid=1102453273&_gid=1837065397.1628834780&_u=IEBAAEAAAAAAAC~&z=1809234610
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c08::9a Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://icct.nl/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Fri, 13 Aug 2021 06:06:20 GMT
content-type
text/plain
access-control-allow-origin
https://icct.nl
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1
expires
Fri, 01 Jan 1990 00:00:00 GMT
p.gif
p.typekit.net/
35 B
214 B
Image
General
Full URL
https://p.typekit.net/p.gif?s=1&k=mma2gnx&ht=tk&h=icct.nl&f=139.140.175.176&a=247379&js=1.20.0&app=typekit&e=js&_=1628834780213
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00:28d::19fd Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
nginx /
Resource Hash
9b9265c69a5cc295d1ab0d04e0273b3677db1a6216ce2ccf4efc8c277ed84b39

Request headers

Referer
https://icct.nl/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 13 Aug 2021 06:06:20 GMT
last-modified
Wed, 02 Sep 2020 03:58:21 GMT
server
nginx
etag
"5f4f185d-23"
content-type
image/gif
access-control-allow-origin
*
cache-control
public, max-age=604800
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
content-length
35

Verdicts & Comments Add Verdict or Comment

50 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| Typekit string| gtm4wp_datalayer_name object| dataLayer object| _wpemojiSettings undefined| $ function| jQuery object| dataLayer_content function| Popper object| bootstrap function| $j function| getParameterByName function| getStringParameterByName function| selectProjectTopic function| selectProjectRegion function| selectPublicationTopic function| selectPublicationCategory function| selectSinglePublicationCategory function| selectPublicationYear function| selectPublicationRegion function| selectAllPublications function| applyPublicationFilters function| clearPublicationFilters function| showTopicDropdown function| setRegionHover function| expandOverview function| collapseOverview boolean| mouseOverOverlay number| currentMouseX number| currentMouseY undefined| mouseHideIndex object| wp string| GoogleAnalyticsObject function| ga object| google_tag_manager object| twemoji object| google_tag_data object| gaplugins object| gaGlobal object| gaData

3 Cookies

Domain/Path Name / Value
.icct.nl/ Name: _gat
Value: 1
.icct.nl/ Name: _gid
Value: GA1.2.1837065397.1628834780
.icct.nl/ Name: _ga
Value: GA1.2.1982552219.1628834780

1 Console Messages

Source Level URL
Text
console-api log URL: https://icct.nl/wp/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2(Line 2)
Message:
JQMIGRATE: Migrate is installed, version 3.3.2

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

cdn.jsdelivr.net
icct.nl
p.typekit.net
stackpath.bootstrapcdn.com
stats.g.doubleclick.net
use.typekit.net
www.google-analytics.com
www.googletagmanager.com
2606:4700::6812:bcf
2a00:1450:4001:808::200e
2a00:1450:4001:80e::200e
2a00:1450:4001:827::2008
2a00:1450:400c:c08::9a
2a02:26f0:6c00:28d::19fd
2a02:26f0:6c00::210:ba0a
2a04:4e42:3::485
83.217.80.169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