www.dnsbelgium.be Open in urlscan Pro
2a02:e980:8f::2a  Public Scan

Submitted URL: https://www.dnsbelgium.be/phishing
Effective URL: https://www.dnsbelgium.be/en/smart-online/12-phishing-methods
Submission: On November 27 via api from BE — Scanned from DE

Form analysis 6 forms found in the DOM

<form>
  <fieldset>
    <legend class="visuallyhidden">Consent Selection</legend>
    <div id="CybotCookiebotDialogBodyFieldsetInnerContainer">
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonNecessary"><strong
            class="CybotCookiebotDialogBodyLevelButtonDescription">Necessary</strong></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper CybotCookiebotDialogBodyLevelButtonSliderWrapperDisabled"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonNecessary"
            class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelButtonDisabled" disabled="disabled" checked="checked"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonPreferences"><strong
            class="CybotCookiebotDialogBodyLevelButtonDescription">Preferences</strong></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonPreferences" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
            data-target="CybotCookiebotDialogBodyLevelButtonPreferencesInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonStatistics"><strong
            class="CybotCookiebotDialogBodyLevelButtonDescription">Analytics</strong></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonStatistics" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
            data-target="CybotCookiebotDialogBodyLevelButtonStatisticsInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
      <div class="CybotCookiebotDialogBodyLevelButtonWrapper"><label class="CybotCookiebotDialogBodyLevelButtonLabel" for="CybotCookiebotDialogBodyLevelButtonMarketing"><strong
            class="CybotCookiebotDialogBodyLevelButtonDescription">Marketing</strong></label>
        <div class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonMarketing" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox"
            data-target="CybotCookiebotDialogBodyLevelButtonMarketingInline" checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></div>
      </div>
    </div>
  </fieldset>
</form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonNecessaryInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelButtonDisabled" disabled="disabled" checked="checked"> <span
    class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonPreferencesInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonPreferences"
    checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonStatisticsInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonStatistics"
    checked="checked" tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form><input type="checkbox" id="CybotCookiebotDialogBodyLevelButtonMarketingInline" class="CybotCookiebotDialogBodyLevelButton CybotCookiebotDialogBodyLevelConsentCheckbox" data-target="CybotCookiebotDialogBodyLevelButtonMarketing" checked="checked"
    tabindex="0"> <span class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

<form class="CybotCookiebotDialogBodyLevelButtonSliderWrapper"><input type="checkbox" id="CybotCookiebotDialogBodyContentCheckboxPersonalInformation" class="CybotCookiebotDialogBodyLevelButton"> <span
    class="CybotCookiebotDialogBodyLevelButtonSlider"></span></form>

Text Content

 * Consent
 * Details
 * [#IABV2SETTINGS#]
 * About


THIS WEBSITE USES COOKIES

We use cookies to personalise content, to provide social media features and to
analyse our traffic. We also share information about your use of our site with
our social media, analytics partners who may combine it with other information
that you’ve provided to them or that they’ve collected from your use of their
services.

Consent Selection
Necessary

Preferences

Analytics

Marketing

Show details
 * Necessary 19
   
   Necessary cookies help make a website usable by enabling basic functions like
   page navigation, language choice and access to secure areas of the website.
   The website cannot function properly without these cookies.
    * Cookiebot
      1
      Learn more about this provider
      1.gifUsed to count the number of sessions to the website, necessary for
      optimizing CMP product delivery.
      Maximum Storage Duration: SessionType: Pixel Tracker
    * Fwebservices.be
      2
      Learn more about this provider
      laravel_session [x2]This cookie is used internally by the website’s
      owners, when uploading or renewing website content.
      Maximum Storage Duration: 1 dayType: HTTP Cookie
    * LinkedIn
      2
      Learn more about this provider
      bcookieUsed in order to detect spam and improve the website's security.
      Maximum Storage Duration: 1 yearType: HTTP Cookie
      li_gcStores the user's cookie consent state for the current domain
      Maximum Storage Duration: 180 daysType: HTTP Cookie
    * Matomo
      1
      Learn more about this provider
      mtm_cookie_consentDetermines whether the user has accepted the cookie
      consent box.
      Maximum Storage Duration: SessionType: HTTP Cookie
    * New Relic
      1
      Learn more about this provider
      JSESSIONIDPreserves users states across page requests.
      Maximum Storage Duration: SessionType: HTTP Cookie
    * Vimeo
      2
      Learn more about this provider
      __cf_bmThis cookie is used to distinguish between humans and bots. This is
      beneficial for the website, in order to make valid reports on the use of
      their website.
      Maximum Storage Duration: 1 dayType: HTTP Cookie
      _cfuvidThis cookie is a part of the services provided by Cloudflare -
      Including load-balancing, deliverance of website content and serving DNS
      connection for website operators.
      Maximum Storage Duration: SessionType: HTTP Cookie
    * dnsbelgium.be
      3
      incap_ses_#Preserves users states across page requests.
      Maximum Storage Duration: SessionType: HTTP Cookie
      nlbi_#Used to ensure website security and fraud detection.
      Maximum Storage Duration: SessionType: HTTP Cookie
      visid_incap_#Preserves users states across page requests.
      Maximum Storage Duration: 1 yearType: HTTP Cookie
    * survey.dnsbelgium.be
      4
      _uuidStores the white label domain to speed up the start-up process of the
      app, skipping the white label domain verification that happens on the
      first visit (or when this cookie is not present).
      Maximum Storage Duration: PersistentType: HTML Local Storage
      raygun4js-useridThis cookie is used to detect errors on the website - this
      information is sent to the website's support staff in order to optimize
      the visitor's experience on the website.
      Maximum Storage Duration: PersistentType: HTML Local Storage
      sa_whitelabel_survey_dnsbelgium_beUsed to indicate and recognize the
      device for raygun handling, the value used for recognition comes from the
      API. This is meant for error handling.
      Maximum Storage Duration: PersistentType: HTML Local Storage
      saAppInfoUsed to store the application version, to verify the appversion
      used is the most recent release. The data stored is coming from the API.
      Maximum Storage Duration: PersistentType: HTML Local Storage
    * survey.dnsbelgium.be
      consent.cookiebot.com
      
      2
      CookieConsent [x2]Stores the user's cookie consent state for the current
      domain
      Maximum Storage Duration: 1 yearType: HTTP Cookie
    * www.dnsbelgium.be
      1
      DNSBELGIUM_LANGUAGEThis cookie remembers the language you chose for our
      website to be displayed in.
      Maximum Storage Duration: 1 yearType: HTTP Cookie

 * Preferences 1
   
   Preference cookies enable a website to remember information that changes the
   way the website behaves or looks, like the region that you are in.
    * LinkedIn
      1
      Learn more about this provider
      lidcRegisters which server-cluster is serving the visitor. This is used in
      context with load balancing, in order to optimize user experience.
      Maximum Storage Duration: 1 dayType: HTTP Cookie

 * Analytics 1
   
   Analytical cookies help website owners to understand how visitors interact
   with websites by collecting and reporting information anonymously.
    * Vimeo
      1
      Learn more about this provider
      vuidCollects data on the user's visits to the website, such as which pages
      have been read.
      Maximum Storage Duration: 2 yearsType: HTTP Cookie

 * Marketing 22
   
   Marketing cookies are used to track visitors across websites. The intention
   is to display ads that are relevant and engaging for the individual user and
   thereby more valuable for publishers and third party advertisers.
    * Meta Platforms, Inc.
      3
      Learn more about this provider
      lastExternalReferrerDetects how the user reached the website by
      registering their last URL-address.
      Maximum Storage Duration: PersistentType: HTML Local Storage
      lastExternalReferrerTimeDetects how the user reached the website by
      registering their last URL-address.
      Maximum Storage Duration: PersistentType: HTML Local Storage
      _fbpUsed by Facebook to deliver a series of advertisement products such as
      real time bidding from third party advertisers.
      Maximum Storage Duration: 3 monthsType: HTTP Cookie
    * Google
      2
      Learn more about this provider
      
      Some of the data collected by this provider is for the purposes of
      personalization and measuring advertising effectiveness.
      
      _gcl_auUsed by Google AdSense for experimenting with advertisement
      efficiency across websites using their services.
      Maximum Storage Duration: 3 monthsType: HTTP Cookie
      NIDRegisters a unique ID that identifies a returning user's device. The ID
      is used for targeted ads.
      Maximum Storage Duration: 6 monthsType: HTTP Cookie
    * YouTube
      16
      Learn more about this provider
      #-#Used to track user’s interaction with embedded content.
      Maximum Storage Duration: SessionType: HTML Local Storage
      iU5q-!O9@$Registers a unique ID to keep statistics of what videos from
      YouTube the user has seen.
      Maximum Storage Duration: SessionType: HTML Local Storage
      LAST_RESULT_ENTRY_KEYUsed to track user’s interaction with embedded
      content.
      Maximum Storage Duration: SessionType: HTTP Cookie
      nextIdUsed to track user’s interaction with embedded content.
      Maximum Storage Duration: SessionType: HTTP Cookie
      requestsUsed to track user’s interaction with embedded content.
      Maximum Storage Duration: SessionType: HTTP Cookie
      yt.innertube::nextIdRegisters a unique ID to keep statistics of what
      videos from YouTube the user has seen.
      Maximum Storage Duration: PersistentType: HTML Local Storage
      yt.innertube::requestsRegisters a unique ID to keep statistics of what
      videos from YouTube the user has seen.
      Maximum Storage Duration: PersistentType: HTML Local Storage
      ytidb::LAST_RESULT_ENTRY_KEYUsed to track user’s interaction with embedded
      content.
      Maximum Storage Duration: PersistentType: HTML Local Storage
      YtIdbMeta#databasesUsed to track user’s interaction with embedded content.
      Maximum Storage Duration: PersistentType: IndexedDB
      yt-remote-cast-availableStores the user's video player preferences using
      embedded YouTube video
      Maximum Storage Duration: SessionType: HTML Local Storage
      yt-remote-cast-installedStores the user's video player preferences using
      embedded YouTube video
      Maximum Storage Duration: SessionType: HTML Local Storage
      yt-remote-connected-devicesStores the user's video player preferences
      using embedded YouTube video
      Maximum Storage Duration: PersistentType: HTML Local Storage
      yt-remote-device-idStores the user's video player preferences using
      embedded YouTube video
      Maximum Storage Duration: PersistentType: HTML Local Storage
      yt-remote-fast-check-periodStores the user's video player preferences
      using embedded YouTube video
      Maximum Storage Duration: SessionType: HTML Local Storage
      yt-remote-session-appStores the user's video player preferences using
      embedded YouTube video
      Maximum Storage Duration: SessionType: HTML Local Storage
      yt-remote-session-nameStores the user's video player preferences using
      embedded YouTube video
      Maximum Storage Duration: SessionType: HTML Local Storage
    * www.dnsbelgium.be
      1
      ___utmvcCollects information on user behaviour on multiple websites. This
      information is used in order to optimize the relevance of advertisement on
      the website.
      Maximum Storage Duration: 1 dayType: HTTP Cookie

 * Unclassified 0
   Unclassified cookies are cookies that we are in the process of classifying,
   together with the providers of individual cookies.
   
   We do not use cookies of this type.

Cross-domain consent[#BULK_CONSENT_DOMAINS_COUNT#] [#BULK_CONSENT_TITLE#]
List of domains your consent applies to: [#BULK_CONSENT_DOMAINS#]
Cookie declaration last updated on 23.11.24 by Cookiebot



[#IABV2_TITLE#]

[#IABV2_BODY_INTRO#]
[#IABV2_BODY_LEGITIMATE_INTEREST_INTRO#]
[#IABV2_BODY_PREFERENCE_INTRO#]
[#IABV2_LABEL_PURPOSES#]
[#IABV2_BODY_PURPOSES_INTRO#]
[#IABV2_BODY_PURPOSES#]
[#IABV2_LABEL_FEATURES#]
[#IABV2_BODY_FEATURES_INTRO#]
[#IABV2_BODY_FEATURES#]
[#IABV2_LABEL_PARTNERS#]
[#IABV2_BODY_PARTNERS_INTRO#]
[#IABV2_BODY_PARTNERS#]


Cookies are small text files that can be used by websites to make a user's
experience more efficient.

The law states that we can store cookies on your device if they are strictly
necessary for the operation of this site. For all other types of cookies we need
your permission.

This site uses different types of cookies. Some cookies are placed by third
party services that appear on our pages.

You can at any time change or withdraw your consent from the Cookie Declaration
on our website.

Learn more about who we are, how you can contact us and how we process personal
data in our Privacy Statement.

Please state your consent ID and date when you contact us regarding your
consent.


Do not sell or share my personal information
Deny Allow selection Customize

Allow all


DNS Belgium Menu
 * Your domain name
 * Register
 * Manage
 * Secure
 * Smart online

Search
 * About DNS Belgium
 * News
 * Contact
 * For registrars
 * Statistics
 * Working with us

English
 * English
 * Nederlands
 * Français

test
Safe on the internet
Open submenu Close submenu
 * 12 phishing methods
 * Fake webshops
 * Online fraude
 * Partners
 * More items …
    * 12 phishing methods
    * Fake webshops
    * Online fraude
    * Partners

 * The 12 most common phishing methods 
 * 1. e-mail spoofing
 * 2. URL Phishing
 * 3. Clone phishing 
 * 4. Invoice phishing
 * 5. Phishing by shared documents 
 * 6. Phishing by smartphone app
 * 7. Phishing by pop-up 
 * 8. Phishing by search engine
 * 9. Phishing by bypassing filters
 * 10. Catphishing 
 * 11. Business Email Compromise 
 * 12. The "Nigerian Prince" scam 
 * What is phishing and how do you protect yourself against it?


12 PHISHING METHODS

 * The 12 most common phishing methods 
 * 1. e-mail spoofing
 * 2. URL Phishing
 * 3. Clone phishing 
 * 4. Invoice phishing
 * 5. Phishing by shared documents 
 * 6. Phishing by smartphone app
 * 7. Phishing by pop-up 
 * 8. Phishing by search engine
 * 9. Phishing by bypassing filters
 * 10. Catphishing 
 * 11. Business Email Compromise 
 * 12. The "Nigerian Prince" scam 
 * What is phishing and how do you protect yourself against it?

There are several forms of phishing . However, it always boils down to the same
thing: a third party tries to get personal information from you - passwords,
credit card numbers, etc.


THE 12 MOST COMMON PHISHING METHODS 


1. E-MAIL SPOOFING

How does it work? The criminal uses a fake e-mail address. This makes it look
like the email is from someone you know or a company you are a customer of. The
criminal then asks you to click on a link, and/or log on to a site and take a
particular action, such as sharing a file. 

Here's how to avoid it: check to see if your name is listed as the recipient, or
if there are many others you don't know. If you are or not a customer of the
company in question, or maybe not with that email address? In these cases, avoid
following the instructions. 


2. URL PHISHING

How does it work? The fraudster sends you, by way of a message or an e-mail, a
web address (URL) which at first sight may seem reliable. Behind the link you
will find a completely different address... One of the following techniques can
be used for this:

 * The phisher hides the address behind a "Click here" or "Subscribe" button

 * You can't read the web address, because it is shortened by a special program,
   it can look like this for example t.co/xz92drTT92

 * The web address contains the name of a known company, but is misspelled, e.g.
   citiibank.com instead of citibank.com

 * The fraudster plays around with similar looking letters, such as arnazon.com
   instead of amazon.com, or Faceb00k.com instead of Facebook.com

 * The domain name looks legitimate, but is in fact a sub-domain of another
   domain name, for example https://inlog.dnsbelgium.be.trading.be/inlog. Here,
   the real domain name is trading.be, and dnsbelgium.be is a subdomain of
   trading.be

Here's how to avoid it: check the address before clicking on a link.

 * Place your cursor over the link. The full link will appear on the screen.

 * On a mobile device, long press on the link, the whole link will pop up on the
   screen.

 * You can also right-click and copy the link to your notes.

 * Check the domain name. Read from right to left - the combination of words
   BEFORE the / is the domain extension, to the left of that you have the domain
   name. If it's before that it's a sub-domain.




3. CLONE PHISHING 

How does it work? Criminals create a perfect copy, or clone, of an email you are
used to receiving, such as your credit card payment statement. They replace the
link in the email with a link to their fraudulent website, or the attachment
with a file containing a virus, ransomware, or spyware. 

Here's how to avoid it: Don't react to the e-mail if the sender's address
deviates from the norm, if there are spelling mistakes in the e-mail or if the
message was sent at an unusual time. 

 


4. INVOICE PHISHING



How does it work? The criminal sends you a message by email or text message,
notifying you that you need to make an urgent payment on a particular account
number. Often the message will contain a link to pay directly online.

Some examples of messages that have been circulating recently: 

 * Bpost will notify you that your parcel cannot be delivered until additional
   costs are paid.
 * A bailiff notifies you that you have forgotten to pay a tax, and that you
   must pay it urgently to the collection agency.
 * A French collection agency tells you that you have committed an offence in
   France and that they have been instructed to collect the fine.

Here's how to avoid it: Check the facts. Were you really in France on the date
in the message? What tax is involved? Were you really expecting a parcel from
Bpost?


 


5. PHISHING BY SHARED DOCUMENTS 



How does it work? The fraudsters send you a well-written message that your
colleague has shared a document with you via Dropbox, OneDrive or WeTransfer. If
you click on the link in the message, you will land on a website copied from the
service in question. The site asks for your name and password from the service
in question, or from your Microsoft365 account. 

Here's how to avoid it: Don't give your name and password. Normally you are
logged in to these services on your computer all the time. Not sure? Contact
your colleague and check whether he or she has sent you a document. 




6. PHISHING BY SMARTPHONE APP

How does it work? Fraudsters develop a simple application, but add in the small
print that the application must also have access to data in your cloud. You
potentially keep your address book (names, phone numbers, email addresses)
there. With this data fraudsters can attack your contacts. 

Here's how to avoid it: Only download applications from official services. Look
at the reviews before installing the application. If the application asks for
access to your personal data, your contacts, your location, check if this access
is really necessary for the application to work. 

 


7. PHISHING BY POP-UP 

How does it work? You are visiting a normal website. Suddenly, a pop-up appears
with the message that you need a particular software for your video for example.
If you click on it, the software starts downloading. In Malvertising this
technique is often used. For more information: 'Malvertising fraud'.  

Here's how to avoid it: Close the window. Sometimes the window does not
disappear by clicking on Escape or on the cross in the upper right corner. Close
the entire page. 

 


8. PHISHING BY SEARCH ENGINE

How does it work? Fraudsters build a perfect copy of a well-known company's
website. They buy advertising space on Google: every time a user searches for
this company, the ad from this fraudulent site will appear. If you type the
company's name into Google, the attackers' website will appear at the top of the
search results, among the sponsored links. 

Here's how to avoid it: Google ads are recognisable by the word "Ad" written
next to the link. Avoid these ads. Be especially wary of being lured by extra
discounts and great offers. If you know the company's web address, just type it
into the address bar.  

 


9. PHISHING BY BYPASSING FILTERS

How does it work? Your email and antivirus filters alert you when you click on a
suspicious link to open it in your browser . The attacker then makes the link
unclickable and asks you to copy and paste the link into your browser. This
allows the fraudster to bypass the filters.  

Here's how to avoid it: Don't copy a link you don't trust. 




10. CATPHISHING 

How does it work? The fraudster creates a fake online profile. Through a dating
site, the fraudster tries to contact you and establish a (romantic)
relationship. In this way, the fraudsters can use this information in other
phishing attacks. Or they can get money from you, pretending to be in love with
you. 

Here's how to avoid it: Be suspicious when your contact immediately asks you for
very personal information. The fact that your contact postpones a planned
meeting until the last minute should also be a red flag. So should pathetic
stories about a sudden need for money, a sick family member, ... 

 


11. BUSINESS EMAIL COMPROMISE 

How does it work? Fraudsters first try to find out as much information as
possible about a company's CEO through spear phishing. They then target a key
person in the finance or accounting department of that company. They pretend to
be the CEO, and ask for a payment to be made. 

Here is how to avoid it: Check that the account number of the payment matches
previous payments. Contact the financial manager yourself and ask if the payment
order is correct. 

 


12. THE "NIGERIAN PRINCE" SCAM 

How does it work? The fraudster pretends to be the solicitor of a rich deceased
person who left you the inheritance.  But before you receive the inheritance you
have to provide your bank details...  

Here's how to avoid it: Never give your bank details or account number to
strangers. 

 


WHAT IS PHISHING AND HOW DO YOU PROTECT YOURSELF AGAINST IT?


 * WHAT HAPPENS DURING PHISHING?
   
   What is phishing? What is the goal of fraudsters? How do they trap people,
   and who is the most likely target? 
   
   More about phishing


 * 5 TIPS FOR GUARDING AGAINST PHISHING
   
   Phishing is a form of cybercrime that has been strongly on the rise in recent
   years. In essence, criminals abuse your trust to steal personal data.
   Read more

 * Your domain name
   * Advantages
   * Your own website
   * Your personal e-mail addres
 * Register
   * Valid domain name
   * A good domain name
   * Domain name nicked?
   * Find registrar
   * Phishing simulation
 * Manage
   * Update
   * Delete/Renew
   * Change registrar
   * Change holder
   * Complaints
   * Disputes
 * Secure
   * Prevention and control
   * Domain Guard
   * Domain Shield
   * DNSSEC
   * Safebrowsing
 * Smart online
   * 12 phishing methods
   * Fake webshops
   * Online fraude
   * Partners
 * About DNS Belgium
   * Organisation
   * History
   * Strategy
   * Annual reports
 * News
 * Contact
 * For registrars
   * Become a registrar
   * Services
   * Status page
   * Documents
   * Communication
 * Statistics
 * Working with us
 * * 
   * 
   * 

 * Twitter @dnsbelgium
 * Facebook DNS Belgium
 * LinkedIn dns-belgium
 * Disclaimer
 * Privacy
 * Accessibility statement
 * 
 * Site made by Wieni