URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Submission: On January 03 via manual from US

Summary

This website contacted 20 IPs in 6 countries across 29 domains to perform 59 HTTP transactions. The main IP is 2.21.246.149, located in Austria and belongs to AKAMAI-ASN1, US. The main domain is www.itmanagement.com.
This is the only time www.itmanagement.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
3 2.21.246.149 20940 (AKAMAI-ASN1)
11 104.111.230.107 20940 (AKAMAI-ASN1)
3 2a00:1450:400... 15169 (GOOGLE)
19 104.111.250.65 20940 (AKAMAI-ASN1)
1 54.230.128.200 16509 (AMAZON-02)
3 52.216.228.227 16509 (AMAZON-02)
1 1 34.196.188.236 14618 (AMAZON-AES)
1 107.178.254.65 15169 (GOOGLE)
1 52.219.20.124 16509 (AMAZON-02)
1 52.85.249.215 16509 (AMAZON-02)
1 104.111.232.108 20940 (AKAMAI-ASN1)
2 2a00:1450:400... 15169 (GOOGLE)
6 7 54.76.30.58 16509 (AMAZON-02)
2 2 185.29.135.234 30419 (MEDIAMATH...)
2 2 172.217.22.98 15169 (GOOGLE)
2 2 23.193.41.238 20940 (AKAMAI-ASN1)
2 2 54.154.146.124 16509 (AMAZON-02)
2 2 52.215.63.219 16509 (AMAZON-02)
1 1 54.77.23.202 16509 (AMAZON-02)
1 54.210.155.19 14618 (AMAZON-AES)
2 2a00:1450:400... 15169 (GOOGLE)
1 92.123.93.84 20940 (AKAMAI-ASN1)
1 2 192.33.31.80 33047 (INSTART)
1 2a00:1450:400... 15169 (GOOGLE)
1 3 2.21.246.91 20940 (AKAMAI-ASN1)
2 4 138.108.96.100 16477 (ACNIELSEN-AS)
59 20
Domain Requested by
8 zdbb.net 7 redirects www.itmanagement.com
8 cdn.static.zdbb.net www.itmanagement.com
cdn.static.zdbb.net
7 cdn.toolbox.com www.itmanagement.com
5 cdn.ziffstatic.com www.itmanagement.com
4 secure-us.imrworldwide.com 2 redirects www.itmanagement.com
4 gurgle.zdbb.net www.itmanagement.com
cdn.ziffstatic.com
gurgle.zdbb.net
3 b.scorecardresearch.com 1 redirects www.itmanagement.com
3 s3.amazonaws.com www.itmanagement.com
3 www.itmanagement.com www.itmanagement.com
2 www.pcmag.com 1 redirects www.itmanagement.com
2 fonts.gstatic.com www.itmanagement.com
2 match.prod.bidr.io 2 redirects
2 match.adsrvr.org 2 redirects
2 tags.bluekai.com 2 redirects
2 cm.g.doubleclick.net 2 redirects
2 sync.mathtag.com 2 redirects
2 www.google-analytics.com www.itmanagement.com
2 fonts.googleapis.com www.itmanagement.com
1 walker.zdbb.net www.itmanagement.com
1 pagead2.googlesyndication.com www.itmanagement.com
1 static.adziff.com www.itmanagement.com
1 c.betrad.com www.itmanagement.com
1 idsync.rlcdn.com www.itmanagement.com
1 static.ziffprod.com www.itmanagement.com
1 tags.bkrtx.com www.itmanagement.com
1 privacy-policy.truste.com www.itmanagement.com
1 hosteddocs.ittoolbox.com www.itmanagement.com
1 images.zdb2bmail.com www.itmanagement.com
1 b2b-hosteddocs.s3.amazonaws.com www.itmanagement.com
1 pippio.com www.itmanagement.com
1 pippio.zdimg.net 1 redirects
1 d3ujids68p6xmq.cloudfront.net www.itmanagement.com
1 static.ziffdavis.com www.itmanagement.com
1 ajax.googleapis.com www.itmanagement.com
0 consent.truste.com Failed www.itmanagement.com
59 35

This site contains links to these domains. Also see Links.

Domain
www.ziffdavis.com
www.malwarebytes.com
preferences-mgr.truste.com
privacy.truste.com
Subject Issuer Validity Valid
ziffdavis.com
Symantec Class 3 Secure Server CA - G4
2017-10-19 -
2019-01-18
a year crt.sh
*.googleapis.com
Google Internet Authority G2
2017-11-29 -
2018-02-21
3 months crt.sh
s3.amazonaws.com
DigiCert Baltimore CA-2 G2
2017-09-26 -
2018-09-20
a year crt.sh
www.ziffdavis.com
Symantec Class 3 EV SSL CA - G3
2017-10-17 -
2019-02-05
a year crt.sh
*.s3.amazonaws.com
DigiCert Baltimore CA-2 G2
2017-09-22 -
2019-01-03
a year crt.sh
*.google-analytics.com
Google Internet Authority G3
2017-11-29 -
2018-02-21
3 months crt.sh
*.rlcdn.com
Go Daddy Secure Certificate Authority - G2
2017-05-08 -
2019-06-21
2 years crt.sh
*.google.com
Google Internet Authority G2
2017-11-29 -
2018-02-21
3 months crt.sh
ssl003.insnw.net
GlobalSign CloudSSL CA - SHA256 - G3
2017-07-06 -
2018-03-25
9 months crt.sh

This page contains 1 frames:

Primary Page: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Frame ID: (95AAE02A9C9898AA3956B0FF9D2EED5)
Requests: 59 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /IIS(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /IIS(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Overall confidence: 100%
Detected patterns
  • script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
  • script /jquery.*\.js/i

Page Statistics

59
Requests

36 %
HTTPS

15 %
IPv6

29
Domains

35
Subdomains

20
IPs

6
Countries

0 kB
Transfer

1898 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 16
  • http://pippio.zdimg.net/api/sync?pid=8165&it=4&iv=69ba1c55dce6ecc895c2833107d59e72 HTTP 301
  • http://pippio.com/api/sync?pid=8165&it=4&iv=69ba1c55dce6ecc895c2833107d59e72
Request Chain 35
  • http://www.google-analytics.com/ga.js HTTP 307
  • https://www.google-analytics.com/ga.js
Request Chain 37
  • http://zdbb.net/l/z0WVjCBSEeGLoxIxOQVEwQ?or= HTTP 303
  • http://zdbb.net/l/z0WVjCBSEeGLoxIxOQVEwQ?or=&_cc=1 HTTP 303
  • http://sync.mathtag.com/sync/img?mt_exid=10015&redir=http%3A%2F%2Fzdbb.net%2Fl%2FqI109lRAEeGCiBIxORcFRw%2F%3Ftp%3DGye1vFnDEeGCiBIxORcFRw%26tpc%3D[MM_UUID] HTTP 302
  • http://sync.mathtag.com/sync/img?mt_exid=10015&redir=http%3A%2F%2Fzdbb.net%2Fl%2FqI109lRAEeGCiBIxORcFRw%2F%3Ftp%3DGye1vFnDEeGCiBIxORcFRw%26tpc%3D[MM_UUID]&mm_bnc&mm_bct HTTP 302
  • http://zdbb.net/l/qI109lRAEeGCiBIxORcFRw/?tp=Gye1vFnDEeGCiBIxORcFRw&tpc=30775a4d-3931-4f00-ad85-2f5376bf0b17 HTTP 303
  • http://cm.g.doubleclick.net/pixel?google_nid=ziffdavis_dmp&google_cm HTTP 302
  • http://cm.g.doubleclick.net/pixel?google_nid=ziffdavis_dmp&google_cm=&google_tc= HTTP 302
  • http://zdbb.net/l/qI109lRAEeGCiBIxORcFRw/?google_gid=CAESEDQuRsDUrA7mJff-2NLd2f0&google_cver=1 HTTP 303
  • http://tags.bluekai.com/site/31875?limit=0&id=e4c2fb38932a42a98053d3f5f2457ffd&redir=http%3A//zdbb.net/l/qI109lRAEeGCiBIxORcFRw/%3Ftp%3Dbkcsbftodcapjfixorcfrw%26tpc%3D%24_BK_UUID HTTP 302
  • http://tags.bluekai.com/site/31875?dt=0&r=1972638274&sig=108478634&bkca=KJyP0gLmQM9D9BYFvSm+4uQ1eYOisQKEJL0WwZbLP3ZNYzuFPI5pQ7dTUJwYt2ohx6spLZJ6T7u3uivRjuY9zgWcLWP0N34bZ7BWg1cTRfUKwals9qdAkkHOBD5lmFCVgC5kKgPQhwgdf4E5FeUAtjGolLYFzpvxaAHlmjG4/Xgc2MymQI0IAMR+AQ== HTTP 302
  • http://zdbb.net/l/qI109lRAEeGCiBIxORcFRw/?tp=bkcsbftodcapjfixorcfrw&tpc=H4zuHQ9999eSHDNS HTTP 303
  • http://match.adsrvr.org/track/cmf/generic?ttd_pid=pexu87e&ttd_tpi=1 HTTP 302
  • http://match.adsrvr.org/track/cmb/generic?ttd_pid=pexu87e&ttd_tpi=1 HTTP 302
  • http://zdbb.net/l/qI109lRAEeGCiBIxORcFRw/?tp=lk45j3o5TTDlkj35h3g4&tpc=bb413286-2ffa-4c49-a371-353b7603d3db HTTP 303
  • https://match.prod.bidr.io/cookie-sync/ziffdavis?buyer_user_id=e4c2fb38932a42a98053d3f5f2457ffd HTTP 303
  • https://match.prod.bidr.io/cookie-sync/ziffdavis?buyer_user_id=e4c2fb38932a42a98053d3f5f2457ffd&_bee_ppp=1 HTTP 303
  • https://zdbb.net/l/qI109lRAEeGCiBIxORcFRw/?tp=kh4u2bm23BBEWk4h35&zdbb=e4c2fb38932a42a98053d3f5f2457ffd&tpc=AAIZN060mnMAABYS52HnsA HTTP 303
  • https://idsync.rlcdn.com/425686.gif?partner_uid=e4c2fb38932a42a98053d3f5f2457ffd
Request Chain 41
  • http://www.pcmag.com/mst/n/7hJiiEHoEeWRqiIAC39GJQ?g=f23480c3243b6b1a9e1dd189e8fdf98c&u=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&or= HTTP 301
  • https://www.pcmag.com/mst/n/7hJiiEHoEeWRqiIAC39GJQ?g=f23480c3243b6b1a9e1dd189e8fdf98c&u=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&or=
Request Chain 45
  • http://www.google-analytics.com/r/__utm.gif?utmwv=5.7.1&utms=1&utmn=698141362&utmhn=www.itmanagement.com&utmcs=UTF-8&utmsr=1600x1200&utmvp=1600x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Cybercrime%20Tactics%20and%20Techniques%20Q3%202017&utmhid=432939039&utmr=-&utmp=%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&utmht=1515010392962&utmac=UA-2641678-15&utmcc=__utma%3D223537091.1603197254.1515010393.1515010393.1515010393.1%3B%2B__utmz%3D223537091.1515010393.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=1680550714&utmredir=1&utmu=qAAAAAAAAAAAAAAAAAAAAAAE~ HTTP 307
  • https://www.google-analytics.com/r/__utm.gif?utmwv=5.7.1&utms=1&utmn=698141362&utmhn=www.itmanagement.com&utmcs=UTF-8&utmsr=1600x1200&utmvp=1600x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Cybercrime%20Tactics%20and%20Techniques%20Q3%202017&utmhid=432939039&utmr=-&utmp=%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&utmht=1515010392962&utmac=UA-2641678-15&utmcc=__utma%3D223537091.1603197254.1515010393.1515010393.1515010393.1%3B%2B__utmz%3D223537091.1515010393.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=1680550714&utmredir=1&utmu=qAAAAAAAAAAAAAAAAAAAAAAE~
Request Chain 50
  • http://secure-us.imrworldwide.com/cgi-bin/m?ci=us-806031h&cg=0&cc=1&si=http%3A//www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&rp=&ts=compact&rnd=1515010393409 HTTP 302
  • http://secure-us.imrworldwide.com/cgi-bin/m?ci=us-806031h&cg=0&cc=1&si=http%3A//www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&rp=&ts=compact&rnd=1515010393409&ja=1
Request Chain 51
  • http://secure-us.imrworldwide.com/cgi-bin/m?ci=us-806031h&cg=0&cc=1&si=http%3A//www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&rp=&ts=compact&rnd=1515010393410 HTTP 302
  • http://secure-us.imrworldwide.com/cgi-bin/m?ci=us-806031h&cg=0&cc=1&si=http%3A//www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&rp=&ts=compact&rnd=1515010393410&ja=1
Request Chain 54
  • http://b.scorecardresearch.com/b?c1=2&c2=6036202&ns__t=1515010393426&ns_c=UTF-8&cv=3.1&c8=Cybercrime%20Tactics%20and%20Techniques%20Q3%202017&c7=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&c9= HTTP 302
  • http://b.scorecardresearch.com/b2?c1=2&c2=6036202&ns__t=1515010393426&ns_c=UTF-8&cv=3.1&c8=Cybercrime%20Tactics%20and%20Techniques%20Q3%202017&c7=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&c9=

59 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set cybercrime-tactics-and-techniques-q3-2017-61965
www.itmanagement.com/research/
146 KB
0
Document
General
Full URL
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
2.21.246.149 , Austria, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Microsoft-IIS/7.5 / ASP.NET
Resource Hash
1d8a27a87198374a562d20d0fb8a57918d5764c87ad487abf8313acf852055d2
Security Headers
Name Value
Content-Security-Policy frame-ancestors https://*.toolbox.com 'self'
X-Frame-Options SAMEORIGIN

Request headers

Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Connection
keep-alive
Accept-Encoding
gzip, deflate
Host
www.itmanagement.com
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:11 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Server
Microsoft-IIS/7.5
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
X-Frame-Options
SAMEORIGIN
Connection
keep-alive Transfer-Encoding
Content-Type
text/html; charset=utf-8
Cache-Control
private
Transfer-Encoding
chunked
Content-Security-Policy
frame-ancestors https://*.toolbox.com 'self'
Set-Cookie
PopunderState=pageone; domain=.itmanagement.com; path=/ recid=; domain=.itmanagement.com; path=/
itmanagement.css
cdn.toolbox.com/build_3012/rds/
4 KB
0
Stylesheet
General
Full URL
https://cdn.toolbox.com/build_3012/rds/itmanagement.css
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.107 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-230-107.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
4918bc850ebf97394e5185b4fc42a24a5c25fc572a1e65427b14358720734281

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.toolbox.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:12 GMT
Content-Encoding
gzip
x-amz-request-id
4208AE6DD92C13ED
Connection
keep-alive
Content-Length
1035
x-amz-id-2
ePHGC6a3L6Cyl6EoxSi3kojKk8xNwfEbGAYiFDI6AwKyLUyYSIPbDWF2itEsgd6G4D7+75MUrk0=
Last-Modified
Thu, 07 Dec 2017 20:06:41 GMT
Server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:220/gname:jenkins/uname:jenkins/gid:498/mode:33188/mtime:1512677181/atime:1512677181/md5:a0ee70260a31e4515d2ac079167f6ed4/ctime:1512677181
ETag
"a0ee70260a31e4515d2ac079167f6ed4"
Vary
Accept-Encoding
Content-Type
text/css
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000
Accept-Ranges
bytes
Expires
Thu, 03 Jan 2019 20:13:12 GMT
portalsMaster.css
cdn.toolbox.com/build_3012/rds/
14 KB
0
Stylesheet
General
Full URL
https://cdn.toolbox.com/build_3012/rds/portalsMaster.css
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.107 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-230-107.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
28c6eb218625d584087e9ad343b28f833f60210cd8d4ab05a3a747ead9f1da87

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.toolbox.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:12 GMT
Content-Encoding
gzip
x-amz-request-id
52F8CEA03ED7C4F1
Connection
keep-alive
Content-Length
3591
x-amz-id-2
5kDf8eAorDIImSYNTYv/ndYIOtY16RloeZbBWKuXFjJ8kJ6+9JLQSaZ+RQBeHo0lctCvQQO79AY=
Last-Modified
Thu, 07 Dec 2017 20:06:46 GMT
Server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:220/gname:jenkins/uname:jenkins/gid:498/mode:33188/mtime:1512677181/atime:1512677181/md5:53eba97c04626d788b3ff71a3ea6bc24/ctime:1512677181
ETag
"53eba97c04626d788b3ff71a3ea6bc24"
Vary
Accept-Encoding
Content-Type
text/css
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000
Accept-Ranges
bytes
Expires
Thu, 03 Jan 2019 20:13:12 GMT
css
fonts.googleapis.com/
7 KB
0
Stylesheet
General
Full URL
http://fonts.googleapis.com/css?family=Open+Sans:400,600,700
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
2a00:1450:4001:81a::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
77355a4885b9e72065069541401f4ad4dc0a98e86307f291f3b34ce56b0416ee
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
fonts.googleapis.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:12 GMT
Content-Encoding
gzip
Last-Modified
Wed, 03 Jan 2018 20:13:12 GMT
Server
ESF
X-Frame-Options
SAMEORIGIN
Content-Type
text/css; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
private, max-age=86400, stale-while-revalidate=604800
Transfer-Encoding
chunked
Timing-Allow-Origin
*
Link
<http://fonts.gstatic.com>; rel=preconnect; crossorigin
X-XSS-Protection
1; mode=block
Expires
Wed, 03 Jan 2018 20:13:12 GMT
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.7.2/
93 KB
0
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
47b68dce8cb6805ad5b3ea4d27af92a241f4e29a5c12a274c852e4346a0500b4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:path
/ajax/libs/jquery/1.7.2/jquery.min.js
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
ajax.googleapis.com
referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
:scheme
https
:method
GET
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Sat, 09 Dec 2017 12:40:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
2187175
status
200
alt-svc
hq=":443"; ma=2592000; quic=51303431; quic=51303339; quic=51303338; quic=51303337; quic=51303335,quic=":443"; ma=2592000; v="41,39,38,37,35"
content-length
33845
x-xss-protection
1; mode=block
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 09 Dec 2018 12:40:17 GMT
tblwd_b.js
cdn.ziffstatic.com/jst/
30 KB
0
Script
General
Full URL
http://cdn.ziffstatic.com/jst/tblwd_b.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
b7ce4ed105a3c5fb66ed26085ecdd7b91279ac974ecaacfb859af9831f4be345

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.ziffstatic.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

x-amz-version-id
Q9U4ni7WiSQdX5Z9Fih.4LNMNgFFCctG
Content-Encoding
gzip
ETag
"8fdc43c0002bd9e95a97f32b1136274f"
x-amz-request-id
F5F008649E788D9B
x-amz-replication-status
COMPLETED
Connection
keep-alive
Content-Length
9758
x-amz-id-2
SfLqd5pOwNQEfLrOdI8LImEgBDFH3GjyIsZjweKWqcy9WtDMdUqLxr4LiRnaKn9om0Vp/4aXCuQ=
Last-Modified
Thu, 06 Jul 2017 07:24:58 GMT
Server
AmazonS3
Date
Wed, 03 Jan 2018 20:13:12 GMT
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=3600
Accept-Ranges
bytes
Expires
Wed, 03 Jan 2018 21:13:12 GMT
zddmp.min.js
cdn.ziffstatic.com/js/zddmp/1.1/
3 KB
0
Script
General
Full URL
http://cdn.ziffstatic.com/js/zddmp/1.1/zddmp.min.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
05f1bb228ac8e6b76437936c0320ab52a798ffddb5c7de7cac92fdefd1cafda1

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.ziffstatic.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

x-amz-version-id
null
Content-Encoding
gzip
Last-Modified
Mon, 21 Nov 2016 13:49:17 GMT
Server
AmazonS3
x-amz-request-id
AA462BA28EBACF72
ETag
"bc9660276726736dbef5774b2c75887b"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=604800
Date
Wed, 03 Jan 2018 20:13:12 GMT
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1311
x-amz-id-2
Sttv7aHqNc9sjDXC2CFqfI7f5uyz2SeltIpSDuiQ0l5cM2P6yovPUdJUSa8STpYAvVUrOW376MQ=
Expires
Wed, 10 Jan 2018 20:13:12 GMT
zdsticky.js
static.ziffdavis.com/jst/
9 KB
0
Script
General
Full URL
http://static.ziffdavis.com/jst/zdsticky.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
8b7301ac0f310aad0149ed2b08d58084d497b71d905e6e7daf84059ca7952f29

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
static.ziffdavis.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

x-amz-version-id
null
Content-Encoding
gzip
ETag
"5efd7e3669486a94fb6f3151de800138"
x-amz-request-id
F1E6A187346958AF
Connection
keep-alive
Content-Length
2507
x-amz-id-2
rtDKXr90seMl0PIVmEiypmEalhIXVo6jpcQ6gaDfxRk73ULef5yDRPcjZEA/PbO2oXnXNDKNodE=
Last-Modified
Wed, 06 May 2015 20:37:29 GMT
Server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:502/gname:staff/uname:jschulz/gid:20/mode:33188/mtime:1430944627/atime:1430944628/md5:5efd7e3669486a94fb6f3151de800138/ctime:1430944627
Date
Wed, 03 Jan 2018 20:13:12 GMT
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=3600
Accept-Ranges
bytes
Expires
Wed, 03 Jan 2018 21:13:12 GMT
zdvtools.min.js
cdn.ziffstatic.com/jst/
16 KB
0
Script
General
Full URL
http://cdn.ziffstatic.com/jst/zdvtools.min.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
1edf0d5a8022d32e025aa68393986b16b3354087e322dd2142d1032b9deb6ed3

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.ziffstatic.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

x-amz-version-id
nP6Pc7fjQHi8Ai.rT5Imo5m3mXg8vqAv
Content-Encoding
gzip
ETag
"d07e78c138460092e345b576d63eae93"
x-amz-request-id
E09FAC93FAA4EC61
x-amz-replication-status
PENDING
Connection
keep-alive
Content-Length
5032
x-amz-id-2
kbQO/3Oh4RhvTW1EwDzzLiMHRgjgEsXQYIqRfYlCrym4umBKNtX6wI+SDJtvjAdeau6wknOi7+s=
Last-Modified
Wed, 20 Sep 2017 17:34:47 GMT
Server
AmazonS3
Date
Wed, 03 Jan 2018 20:13:12 GMT
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=604800
Accept-Ranges
bytes
Expires
Wed, 10 Jan 2018 20:13:12 GMT
zdrefresher.min.js
cdn.ziffstatic.com/js/zdrefresher/1.4.1/
4 KB
0
Script
General
Full URL
http://cdn.ziffstatic.com/js/zdrefresher/1.4.1/zdrefresher.min.js?version=20171206
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
9d1561da72e3c6d446a52131edf1b020f56a78c39494b90f2fb54f88163a3871

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.ziffstatic.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

x-amz-version-id
8aNUNrWEEiNZaZArQSIbI3NQ4Avd.jI5
Content-Encoding
gzip
ETag
"d1af1418691b50565f0e2de915936c1c"
x-amz-request-id
46D3825B8B7B9FBD
x-amz-replication-status
COMPLETED
Connection
keep-alive
Content-Length
1411
x-amz-id-2
fFHYTdupVue6sME+oHR86vvrRpTQ9Rokd3/D7urG3kwESwVgF4ZZesj3H6Mhd8ZRaBcKJfYI8SE=
Last-Modified
Wed, 06 Dec 2017 16:32:35 GMT
Server
AmazonS3
Date
Wed, 03 Jan 2018 20:13:12 GMT
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=604800
Accept-Ranges
bytes
Expires
Wed, 10 Jan 2018 20:13:12 GMT
abw.js
d3ujids68p6xmq.cloudfront.net/
227 KB
0
Script
General
Full URL
http://d3ujids68p6xmq.cloudfront.net/abw.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
54.230.128.200 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-128-200.ams50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
be78d277e4b46f61070b14e1cf3af8026b0bf9a919608174fb09063daaafdb03

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
d3ujids68p6xmq.cloudfront.net
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Tue, 05 Dec 2017 04:27:24 GMT
Content-Encoding
gzip
Last-Modified
Thu, 30 Nov 2017 20:00:54 GMT
Server
AmazonS3
Age
56666
ETag
"94be277dd2acdc0cc4a08a15499a1e8e"
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 15ead14aea84f927b2501a12cebb40ec.cloudfront.net (CloudFront)
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43159
X-Amz-Cf-Id
pcEYPIwdTN2IXx0YJfTGGsMcaOOyflMvbVhdL5htfz0Pf-buzjnf2w==
layout-core.css
cdn.toolbox.com/build_3012/rds/
17 KB
0
Stylesheet
General
Full URL
https://cdn.toolbox.com/build_3012/rds/layout-core.css
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.107 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-230-107.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
df4d47a4cd696c1b6dfb2723a99201b7b798fc5ea7b4eac646aaac7a92824e0c

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.toolbox.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:12 GMT
Content-Encoding
gzip
x-amz-request-id
A067211670BA895B
Connection
keep-alive
Content-Length
4534
x-amz-id-2
zy+JvJ88qzu9wQiaAa9Y54M8dobbDqcy08JSHZ0nHJ37yBx4P1fuzXFeRbSVhhxFgRNw+bTn77Y=
Last-Modified
Thu, 07 Dec 2017 20:06:42 GMT
Server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:220/gname:jenkins/uname:jenkins/gid:498/mode:33188/mtime:1512677181/atime:1512677181/md5:7c96bc0ff62cc6044d08e2fe05dc5f1e/ctime:1512677181
ETag
"7c96bc0ff62cc6044d08e2fe05dc5f1e"
Vary
Accept-Encoding
Content-Type
text/css
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000
Accept-Ranges
bytes
Expires
Thu, 03 Jan 2019 20:13:12 GMT
jquery.mmenu.all.css
cdn.toolbox.com/build_3012/rds/
36 KB
0
Stylesheet
General
Full URL
https://cdn.toolbox.com/build_3012/rds/jquery.mmenu.all.css
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.107 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-230-107.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
e520040b726b7acb519b6022dec172a2808ce8d267569e49068f20d17fbdb970

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.toolbox.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:12 GMT
Content-Encoding
gzip
x-amz-request-id
315E5E0168189CFF
Connection
keep-alive
Content-Length
4769
x-amz-id-2
8B0dfQEh0d3zgRtsBz4szp114kOhgU0T3I8kaM/gmr7zcsEKwW/kSZlJ8ViOkLJFC7oEaPToAkg=
Last-Modified
Thu, 07 Dec 2017 20:06:41 GMT
Server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:220/gname:jenkins/uname:jenkins/gid:498/mode:33188/mtime:1512677181/atime:1512677181/md5:6334e3083e0ada239fc8a98a30373360/ctime:1512677181
ETag
"6334e3083e0ada239fc8a98a30373360"
Vary
Accept-Encoding
Content-Type
text/css
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000
Accept-Ranges
bytes
Expires
Thu, 03 Jan 2019 20:13:12 GMT
jquery-overrides.css
cdn.toolbox.com/build_3012/rds/
2 KB
0
Stylesheet
General
Full URL
https://cdn.toolbox.com/build_3012/rds/jquery-overrides.css
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.107 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-230-107.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
af01fbe4fe98eaf655e56eac1d6970f8c8d5130e9472e467d633e84c9876af4e

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.toolbox.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:12 GMT
Content-Encoding
gzip
x-amz-request-id
4CB49F2F0D076DC0
Connection
keep-alive
Content-Length
576
x-amz-id-2
/EU2jE68waUzGK8PABsHuc+W7ffmOJasP4tVI5g2pZxoqfuMvE8/zG5vt9RlGiETNrUGsoFFUdU=
Last-Modified
Thu, 07 Dec 2017 20:06:41 GMT
Server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:220/gname:jenkins/uname:jenkins/gid:498/mode:33188/mtime:1512677181/atime:1512677181/md5:e840b77daad88cf099c6324428af1501/ctime:1512677181
ETag
"e840b77daad88cf099c6324428af1501"
Vary
Accept-Encoding
Content-Type
text/css
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000
Accept-Ranges
bytes
Expires
Thu, 03 Jan 2019 20:13:12 GMT
bootstrap.min.js
s3.amazonaws.com/globalfiles/bootstrap/js/
31 KB
0
Script
General
Full URL
https://s3.amazonaws.com/globalfiles/bootstrap/js/bootstrap.min.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.216.228.227 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
d37880e1cebd4f4df68e26475d8fcf50e43c7e83921e3c69627797f1861afe3b

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
s3.amazonaws.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
Last-Modified
Mon, 05 Aug 2013 17:23:41 GMT
Server
AmazonS3
x-amz-request-id
2B96C8AB17782B2A
ETag
"562415b628859eade00978c537ca6df6"
Content-Type
application/x-javascript
x-amz-storage-class
REDUCED_REDUNDANCY
Accept-Ranges
bytes
Content-Length
31601
x-amz-id-2
8JvlSrDOQ475iGDXmbAR/dcGvFNrMxCnpAtJdkcmH46EbP7ZclenuqOq73wtmq9S+G+Yo3EoOvU=
bootstrap.min.css
s3.amazonaws.com/globalfiles/bootstrap/css/
101 KB
0
Stylesheet
General
Full URL
https://s3.amazonaws.com/globalfiles/bootstrap/css/bootstrap.min.css
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.216.228.227 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3dd0f78e4b08bc221d8a7412b339f344d4fcc519f746f2bdc31b127d6312160a

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
s3.amazonaws.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
Last-Modified
Mon, 05 Aug 2013 17:23:10 GMT
Server
AmazonS3
x-amz-request-id
3E4BC20B5DCBC1D4
ETag
"ac928dcc2d38e14ff797300a7efe984f"
Content-Type
text/css
x-amz-storage-class
REDUCED_REDUNDANCY
Accept-Ranges
bytes
Content-Length
103323
x-amz-id-2
BEI6Qd5TWnEJ4T49f+3KxIJQ53huTPRzrsruvY72QITrp5xuBFMRRWAYlMpP2r0/11p7+NuLCJ4=
bootstrap-responsive.css
s3.amazonaws.com/globalfiles/bootstrap/css/
22 KB
0
Stylesheet
General
Full URL
https://s3.amazonaws.com/globalfiles/bootstrap/css/bootstrap-responsive.css
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.216.228.227 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
2d7dd0938184454dfda1eb17326642a4fd2dd2ca3e7b4ce9d01f61e7911ae7ef

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
s3.amazonaws.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
Last-Modified
Mon, 05 Aug 2013 17:23:11 GMT
Server
AmazonS3
x-amz-request-id
D52CCAF82BF3BD39
ETag
"c636d4af9b05510567f4b15ec579a8c8"
Content-Type
text/css
x-amz-storage-class
REDUCED_REDUNDANCY
Accept-Ranges
bytes
Content-Length
22843
x-amz-id-2
zy1QTAhX/Qw5Etdo4tG2UN7OcY0G+6gMF7ONwxgcveWioD8o2waxKLAWztVgDi/+QjO3JHpVCKE=
Cookie set sync
pippio.com/api/
Redirect Chain
  • http://pippio.zdimg.net/api/sync?pid=8165&it=4&iv=69ba1c55dce6ecc895c2833107d59e72
  • http://pippio.com/api/sync?pid=8165&it=4&iv=69ba1c55dce6ecc895c2833107d59e72
2 KB
0
Script
General
Full URL
http://pippio.com/api/sync?pid=8165&it=4&iv=69ba1c55dce6ecc895c2833107d59e72
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
107.178.254.65 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
65.254.178.107.bc.googleusercontent.com
Software
/
Resource Hash
353887e5ea7aada8b96b0131ad6e92edd68baf76eb1b4bdc58130cd5e9d9be63

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
pippio.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Timing-Allow-Origin
*
Date
Wed, 03 Jan 2018 20:13:13 GMT
Via
1.1 google
Transfer-Encoding
chunked
P3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Cache-Control
no-cache, no-store
Set-Cookie
did=at9q6kwvP20-yRU8; Path=/; Domain=pippio.com; Expires=Thu, 03 Jan 2019 20:13:13 GMT didts=1515010393; Path=/; Domain=pippio.com; Expires=Thu, 03 Jan 2019 20:13:13 GMT nnls=; Path=/; Domain=pippio.com; Expires=Sun, 04 Mar 2018 20:13:13 GMT pxrc=CNnytNIFEgUIw0MQAA==; Path=/; Domain=pippio.com; Expires=Sun, 04 Mar 2018 20:13:13 GMT
Content-Type
text/javascript

Redirect headers

Location
http://pippio.com/api/sync?pid=8165&it=4&iv=69ba1c55dce6ecc895c2833107d59e72
Content-length
0
z0WVjCBSEeGLoxIxOQVEwQ.min.js
cdn.static.zdbb.net/js/
10 KB
0
Script
General
Full URL
https://cdn.static.zdbb.net/js/z0WVjCBSEeGLoxIxOQVEwQ.min.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
92cebbaec03c84ba13bd773cf25115591f51caca26cb2920676ad5e8725bf33f

Request headers

:path
/js/z0WVjCBSEeGLoxIxOQVEwQ.min.js
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
cdn.static.zdbb.net
referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
:scheme
https
:method
GET
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Wed, 03 Jan 2018 20:13:12 GMT
content-encoding
gzip
last-modified
Fri, 21 Jul 2017 18:01:35 GMT
server
AmazonS3
x-amz-request-id
4FA40E6F086EEE1A
etag
"0e2b71a2b106be71e060e692bc0843af"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
2683
x-amz-id-2
T+eJBAUNFcw9+/C55NpU8PR83PyHFhS84lDc7oJ+9rbJQv2lsOmLWenaCXByR0qC0xvHSjoLaks=
expires
Wed, 03 Jan 2018 21:13:12 GMT
logo_header_itm.png
cdn.toolbox.com/build_3012/rds/portals/img/
9 KB
0
Image
General
Full URL
https://cdn.toolbox.com/build_3012/rds/portals/img/logo_header_itm.png
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.107 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-230-107.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f8836c5435d5d454cc93a9cfe696d57b568dc3b7936e100cfbf77e0fafb6092c

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.toolbox.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
Last-Modified
Thu, 07 Dec 2017 20:06:45 GMT
Server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:220/gname:jenkins/uname:jenkins/gid:498/mode:33188/mtime:1512677054/atime:1512677054/md5:7f1da24ae90bb718a1cfc19195722d99/ctime:1512677054
x-amz-request-id
B8EFF6F94A0F8D40
ETag
"7f1da24ae90bb718a1cfc19195722d99"
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
8765
x-amz-id-2
tFTak0xAmjwAqZCO5rblzcRvw99bZjV1UCd61g//pM4p1yVhiHM7/UA5WM2aDuQa9yRwu6eLj8E=
Expires
Thu, 03 Jan 2019 20:13:13 GMT
WebResource.axd
www.itmanagement.com/
23 KB
0
Script
General
Full URL
http://www.itmanagement.com/WebResource.axd?d=a4ju_EfYelY7F_1_C7lUp3cFM6RyEKPTCfYoznEIl_mtIjkjgbvqSYQWQ0nchv5-C1Vn6OxmieCflD3KzwBq_m3dzPw1&t=636264210860000000
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
2.21.246.149 , Austria, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Microsoft-IIS/7.5 / ASP.NET
Resource Hash
40732e9dcfa704cf615e4691bb07aecfd1cc5e063220a46e4a7ff6560c77f5db
Security Headers
Name Value
Content-Security-Policy frame-ancestors https://*.toolbox.com 'self'
X-Frame-Options SAMEORIGIN

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
www.itmanagement.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Cookie
PopunderState=pageone; recid=
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:12 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Last-Modified
Thu, 30 Mar 2017 01:51:26 GMT
Server
Microsoft-IIS/7.5
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
X-Frame-Options
SAMEORIGIN
Content-Type
application/x-javascript
Cache-Control
public, max-age=31213451
Content-Security-Policy
frame-ancestors https://*.toolbox.com 'self'
Connection
keep-alive
Content-Length
4627
Expires
Mon, 31 Dec 2018 02:37:23 GMT
gfx_lp_arrow_down_yel.png
b2b-hosteddocs.s3.amazonaws.com/
1 KB
0
Image
General
Full URL
https://b2b-hosteddocs.s3.amazonaws.com/gfx_lp_arrow_down_yel.png
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.219.20.124 San Jose, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3-us-west-1-w.amazonaws.com
Software
AmazonS3 /
Resource Hash
6a8d8032a9cc83cae027c36982feadc5ce7f2f19a68f62303854e9d14ac4608f

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
b2b-hosteddocs.s3.amazonaws.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:14 GMT
Last-Modified
Wed, 23 Aug 2017 20:50:36 GMT
Server
AmazonS3
x-amz-request-id
E6B6CA872BFAE384
ETag
"762fc3a05a356ad3a3670386c2a781f3"
Content-Type
image/png
Accept-Ranges
bytes
Content-Length
1229
x-amz-id-2
nej3+aqzdRCLJCGTfZUGM40XNMH3Bv8IiIVF8FhaCv41itObmZF2n7DnMPJVGLCVb1uoa/BbDuo=
cybercrime-tactics-and-techniques-q3-2017-1.jpg
images.zdb2bmail.com/
120 KB
0
Image
General
Full URL
https://images.zdb2bmail.com/cybercrime-tactics-and-techniques-q3-2017-1.jpg
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.107 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-230-107.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c6075a1e4621d64eea5a5d939257978a50defca7177f98b133edfc37f68ebd8e

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
images.zdb2bmail.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:14 GMT
Last-Modified
Thu, 09 Nov 2017 16:36:43 GMT
Server
AmazonS3
x-amz-request-id
D47805EC7B6A5CC8
ETag
"377824e5951387fc1f8d21009d1fe520"
Content-Type
image/jpeg
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
122961
x-amz-id-2
YTgsBK9fasBljoi9t7sQb3lOVNWa+nJJQg0Rg7jy4CayP+dmTOEuAvJr0+rxDd/Hv02Kc8YQzq8=
mb_logo__on_white_wordmark.jpg
hosteddocs.ittoolbox.com/logos/
663 KB
0
Image
General
Full URL
https://hosteddocs.ittoolbox.com/logos/mb_logo__on_white_wordmark.jpg
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.107 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-230-107.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
5f2c7e63a660009cba3ec2524bb8d85f6985557f63b65c5147eaa79100b50562

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
hosteddocs.ittoolbox.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:14 GMT
Last-Modified
Tue, 21 Mar 2017 01:18:44 GMT
Server
AmazonS3
x-amz-request-id
C6E5A180BE2A22A4
ETag
"1c9dece1f817866a59ce269e63d4dacb"
Content-Type
image/jpeg
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
678483
x-amz-id-2
UN/ShJpDURo2C5FLrcX5F+w7xMvyHG0Sl9smeFqYEdBgoYYslyyi/Y+otsQ6bQXWlasX2/WgHLY=
notice
consent.truste.com/
0
0

logo_ziffdavis.png
www.itmanagement.com/images/
4 KB
0
Image
General
Full URL
http://www.itmanagement.com/images/logo_ziffdavis.png
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
2.21.246.149 , Austria, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Microsoft-IIS/7.5 / ASP.NET
Resource Hash
bbf9e85e72a8bd29e66ddb070ecbc3bd760fc12c5c48f179bcfbb4f9cfbd5581
Security Headers
Name Value
Content-Security-Policy frame-ancestors https://*.toolbox.com 'self'
X-Frame-Options SAMEORIGIN

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
www.itmanagement.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Cookie
PopunderState=pageone; recid=
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
Last-Modified
Sat, 30 Dec 2017 02:07:30 GMT
Server
Microsoft-IIS/7.5
X-Powered-By
ASP.NET
ETag
"05d65f21281d31:0"
X-Frame-Options
SAMEORIGIN
Content-Type
image/png
Cache-Control
max-age=86400
Content-Security-Policy
frame-ancestors https://*.toolbox.com 'self'
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
4353
Expires
Thu, 04 Jan 2018 20:13:13 GMT
adchoices.png
cdn.ziffstatic.com/adchoices/
600 B
0
Image
General
Full URL
http://cdn.ziffstatic.com/adchoices/adchoices.png
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
40d2dae0209b964e6ceb2607faafc02bb3d6efa0d73f47a4ab2a17279f642b91

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.ziffstatic.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

x-amz-version-id
null
Last-Modified
Tue, 05 Jan 2016 18:23:52 GMT
Server
AmazonS3
x-amz-request-id
654ABA205F83B315
ETag
"d08da9f445b63100a56646de99043059"
Content-Type
image/png
Cache-Control
max-age=604800
Date
Wed, 03 Jan 2018 20:13:12 GMT
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
600
x-amz-id-2
PZNxckVU/kF137L0ynqYLT2sylzSUOXl1YtNNdRaElZQiE7WFO6vnWjk/wUxAH9/fMGCa13nbmE=
Expires
Wed, 10 Jan 2018 20:13:12 GMT
seal
privacy-policy.truste.com/privacy-seal/
3 KB
0
Image
General
Full URL
http://privacy-policy.truste.com/privacy-seal/seal?rid=01b0263e-277d-4e52-9ddd-86550128ec1a
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
52.85.249.215 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-249-215.ams50.r.cloudfront.net
Software
TXS /
Resource Hash
6ab85bc152133401e0ad5ca069990f4a76413499820d4ba95a0dadb063bcc8b8
Security Headers
Name Value
X-Content-Type-Options nosniff nosniff
X-Frame-Options SAMEORIGIN SAMEORIGIN
X-Xss-Protection 1; mode=block 1; mode=block

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
privacy-policy.truste.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Tue, 19 Dec 2017 16:43:22 GMT
Via
1.1 6ff79e2331ef6a1ff8089b821bbb1a1f.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff nosniff
Server
TXS
Age
9083
ETag
W/"3091-1504042942000"
X-Frame-Options
SAMEORIGIN SAMEORIGIN
X-Cache
Hit from cloudfront
Content-Type
image/png
Cache-Control
max-age=0
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
3091
X-Xss-Protection
1; mode=block 1; mode=block
X-Amz-Cf-Id
dbM0g-MSE-6-CFc-Ni_zNPj4XPSdMMpjwL6mwTDEg5nppQhT34R-VA==
toolbox.common.js
cdn.toolbox.com/build_3012/js/
64 KB
0
Script
General
Full URL
https://cdn.toolbox.com/build_3012/js/toolbox.common.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.107 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-230-107.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ac782b1fb9be8a9d709f8ffdd10108dfb17d8e4701a3983b3d6f608103e00749

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.toolbox.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
Content-Encoding
gzip
x-amz-request-id
59E045142B358F3E
Connection
keep-alive
Content-Length
15232
x-amz-id-2
Uq1XnqFy2RKpZ3z4Baw9V6ZEarB3qqSCCS/9YO2JW3O27ktcQt2HuqQEjxZEYIHwMw28Ry030lk=
Last-Modified
Thu, 07 Dec 2017 20:06:29 GMT
Server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:220/gname:jenkins/uname:jenkins/gid:498/mode:33188/mtime:1512677054/atime:1512677054/md5:1ded293f2a327ad126b38e3f61eefb3b/ctime:1512677054
ETag
"1ded293f2a327ad126b38e3f61eefb3b"
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000
Accept-Ranges
bytes
Expires
Thu, 03 Jan 2019 20:13:13 GMT
z0WVjCBSEeGLoxIxOQVEwQ.min.js
cdn.static.zdbb.net/js/
10 KB
0
Script
General
Full URL
http://cdn.static.zdbb.net/js/z0WVjCBSEeGLoxIxOQVEwQ.min.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
92cebbaec03c84ba13bd773cf25115591f51caca26cb2920676ad5e8725bf33f

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.static.zdbb.net
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:12 GMT
Content-Encoding
gzip
Last-Modified
Fri, 21 Jul 2017 18:01:35 GMT
Server
AmazonS3
x-amz-request-id
CE41985A8F6A2752
ETag
"0e2b71a2b106be71e060e692bc0843af"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2683
x-amz-id-2
cxPe2ry/Czf6Fo0Mt5Dn0kUiUNLwVkhHizMEZlHMAf9sXuAJFbfODY83A7rNPI9XoNyPDEi4XiI=
Expires
Wed, 03 Jan 2018 21:13:12 GMT
bk-coretag.js
tags.bkrtx.com/js/
38 KB
0
Script
General
Full URL
http://tags.bkrtx.com/js/bk-coretag.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
104.111.232.108 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-232-108.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f6de9ced41ed54dbfc4f51abfeb65d843bd8dd33a45cbb773ecf5f92d065dd52

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
tags.bkrtx.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
Content-Encoding
gzip
Last-Modified
Thu, 25 May 2017 21:04:06 GMT
ETag
"991c-5505f8fb7697f-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
13297
Expires
Wed, 10 Jan 2018 20:13:13 GMT
segments.js
gurgle.zdbb.net/
643 B
0
Script
General
Full URL
http://gurgle.zdbb.net/segments.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
ac81ee4f940113a21ad13de3b31ba1ec05dd57976fa97631d4d3495660434590

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
gurgle.zdbb.net
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
public, max-age=227704
Connection
keep-alive
Content-Length
402
Expires
Sat, 06 Jan 2018 11:28:17 GMT
gurgle.js
gurgle.zdbb.net/js/v2/
0
0

zdcse.min.js
static.ziffprod.com/cse/js/4.2.0/
11 KB
0
Script
General
Full URL
http://static.ziffprod.com/cse/js/4.2.0/zdcse.min.js?onload=ZIFF_CSECallback.exec
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
104.111.230.107 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-230-107.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
06cc4a526a680cb2b7c06baa76bcadd488ea35ca40d36a218baa38e4ddc66f9f

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
static.ziffprod.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

x-amz-version-id
jzrVDAk9Kp287FlIRedOVceafAydkvHt
Content-Encoding
gzip
Last-Modified
Wed, 01 Jun 2016 14:09:10 GMT
Server
AmazonS3
x-amz-request-id
35F46ADF10286015
ETag
"787686b9deb13e9e0c9abc3b9d6ab59d"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=604800
Date
Wed, 03 Jan 2018 20:13:12 GMT
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
4693
x-amz-id-2
O/gRjtzBOU5F6M4b4KI3N1RBNTyKPnDUob+glxGewSojZzRmLL3q1Uimfpg23lAR1kOhy8wcxcM=
Expires
Wed, 10 Jan 2018 20:13:12 GMT
segments.js
gurgle.zdbb.net/
0
0
Script
General
Full URL
http://gurgle.zdbb.net/segments.js?url=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627
Requested by
Host: cdn.ziffstatic.com
URL: http://cdn.ziffstatic.com/js/zddmp/1.1/zddmp.min.js
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
/
Resource Hash

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
gurgle.zdbb.net
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
x-stale
1
Connection
keep-alive
Content-Length
0
/
gurgle.zdbb.net/
0
0
Image
General
Full URL
http://gurgle.zdbb.net/?domain=itmanagement.com
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
gurgle.zdbb.net
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
x-stale
1
Connection
keep-alive
Content-Length
0
ga.js
www.google-analytics.com/
Redirect Chain
  • http://www.google-analytics.com/ga.js
  • https://www.google-analytics.com/ga.js
45 KB
0
Script
General
Full URL
https://www.google-analytics.com/ga.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:821::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
7c2c58fc24e2d3458b88680cfad4577011697df9a1406808f2f7d8f46060d8a7
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

:path
/ga.js
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
www.google-analytics.com
referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
:scheme
https
:method
GET
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Nov 2017 20:19:12 GMT
server
Golfe2
age
1708
date
Wed, 03 Jan 2018 19:44:44 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303431; quic=51303339; quic=51303338; quic=51303337; quic=51303335,quic=":443"; ma=2592000; v="41,39,38,37,35"
content-length
17172
expires
Wed, 03 Jan 2018 21:44:44 GMT

Redirect headers

Location
https://www.google-analytics.com/ga.js
Non-Authoritative-Reason
HSTS
css
fonts.googleapis.com/
14 KB
0
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,400,600,300
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
8b4a15c89255502d876b772505b60972322836595358854e2f1e79db188bc9db
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/css?family=Open+Sans:300italic,400italic,600italic,400,600,300
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
fonts.googleapis.com
referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
:scheme
https
:method
GET
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Wed, 03 Jan 2018 20:13:12 GMT
content-encoding
gzip
last-modified
Wed, 03 Jan 2018 20:13:12 GMT
server
ESF
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
status
200
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303431; quic=51303339; quic=51303338; quic=51303337; quic=51303335,quic=":443"; ma=2592000; v="41,39,38,37,35"
x-xss-protection
1; mode=block
expires
Wed, 03 Jan 2018 20:13:12 GMT
Cookie set 425686.gif
idsync.rlcdn.com/
Redirect Chain
  • http://zdbb.net/l/z0WVjCBSEeGLoxIxOQVEwQ?or=
  • http://zdbb.net/l/z0WVjCBSEeGLoxIxOQVEwQ?or=&_cc=1
  • http://sync.mathtag.com/sync/img?mt_exid=10015&redir=http%3A%2F%2Fzdbb.net%2Fl%2FqI109lRAEeGCiBIxORcFRw%2F%3Ftp%3DGye1vFnDEeGCiBIxORcFRw%26tpc%3D[MM_UUID]
  • http://sync.mathtag.com/sync/img?mt_exid=10015&redir=http%3A%2F%2Fzdbb.net%2Fl%2FqI109lRAEeGCiBIxORcFRw%2F%3Ftp%3DGye1vFnDEeGCiBIxORcFRw%26tpc%3D[MM_UUID]&mm_bnc&mm_bct
  • http://zdbb.net/l/qI109lRAEeGCiBIxORcFRw/?tp=Gye1vFnDEeGCiBIxORcFRw&tpc=30775a4d-3931-4f00-ad85-2f5376bf0b17
  • http://cm.g.doubleclick.net/pixel?google_nid=ziffdavis_dmp&google_cm
  • http://cm.g.doubleclick.net/pixel?google_nid=ziffdavis_dmp&google_cm=&google_tc=
  • http://zdbb.net/l/qI109lRAEeGCiBIxORcFRw/?google_gid=CAESEDQuRsDUrA7mJff-2NLd2f0&google_cver=1
  • http://tags.bluekai.com/site/31875?limit=0&id=e4c2fb38932a42a98053d3f5f2457ffd&redir=http%3A//zdbb.net/l/qI109lRAEeGCiBIxORcFRw/%3Ftp%3Dbkcsbftodcapjfixorcfrw%26tpc%3D%24_BK_UUID
  • http://tags.bluekai.com/site/31875?dt=0&r=1972638274&sig=108478634&bkca=KJyP0gLmQM9D9BYFvSm+4uQ1eYOisQKEJL0WwZbLP3ZNYzuFPI5pQ7dTUJwYt2ohx6spLZJ6T7u3uivRjuY9zgWcLWP0N34bZ7BWg1cTRfUKwals9qdAkkHOBD5lm...
  • http://zdbb.net/l/qI109lRAEeGCiBIxORcFRw/?tp=bkcsbftodcapjfixorcfrw&tpc=H4zuHQ9999eSHDNS
  • http://match.adsrvr.org/track/cmf/generic?ttd_pid=pexu87e&ttd_tpi=1
  • http://match.adsrvr.org/track/cmb/generic?ttd_pid=pexu87e&ttd_tpi=1
  • http://zdbb.net/l/qI109lRAEeGCiBIxORcFRw/?tp=lk45j3o5TTDlkj35h3g4&tpc=bb413286-2ffa-4c49-a371-353b7603d3db
  • https://match.prod.bidr.io/cookie-sync/ziffdavis?buyer_user_id=e4c2fb38932a42a98053d3f5f2457ffd
  • https://match.prod.bidr.io/cookie-sync/ziffdavis?buyer_user_id=e4c2fb38932a42a98053d3f5f2457ffd&_bee_ppp=1
  • https://zdbb.net/l/qI109lRAEeGCiBIxORcFRw/?tp=kh4u2bm23BBEWk4h35&zdbb=e4c2fb38932a42a98053d3f5f2457ffd&tpc=AAIZN060mnMAABYS52HnsA
  • https://idsync.rlcdn.com/425686.gif?partner_uid=e4c2fb38932a42a98053d3f5f2457ffd
43 B
0
Image
General
Full URL
https://idsync.rlcdn.com/425686.gif?partner_uid=e4c2fb38932a42a98053d3f5f2457ffd
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.210.155.19 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-210-155-19.compute-1.amazonaws.com
Software
/
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
idsync.rlcdn.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Cookie
ck1=ck1; rlas3=U4Ravm4aO30JlVMkMS2BtEdNWhp7O5g527eIFc7Hp+SHzZnvXkwKlWQCuaiIIB//qbobKkr6JpOhm1lWR1VGZofzEUoI2O64vg8zuLR78ovUTCJmhA2aM4er0QZpNVDEDzaQOhkOuFReNxqs2CC/bkLV+45pBWorcRr5SGe9FsansLTQedXfgHl/ID5KGuGJchBh0YbDxmasR1sOQcoxAi7oRv0qVm2fBqI3Q9OJjZwaAgmBzA9sysoUpv7ljKv8Yeru7PaxLgdQJHKI2QwYS/e+VlXEFPL1JwDUU0iHUag9wO9YcJg/Erh8UoUhow1qXa0JFFuWbf1TFcqe6MzNDPLtM3nIbn/Nbde03vnNE+th+C1wUnTbBjEEZRsD74SPZYi92y5PwwznfvJcbRCP9d0JSL6fwSlsFF8k4eeL0ag=; rtn1-z=IaPVs8VHz+To6d/1fHHeiA/TvRtZorpC/46Kjk9iyADZM8+0u13iagsDbGhvl4rk
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Expires
Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control
no-cache, no-store
Set-Cookie
rlas3=Fi3TUEU/DjQJlVMkMS2BtEdNWhp7O5g527eIFc7Hp+SHzZnvXkwKlWQCuaiIIB//qbobKkr6JpOhm1lWR1VGZofzEUoI2O64vg8zuLR78ovUTCJmhA2aM4er0QZpNVDEDzaQOhkOuFReNxqs2CC/bkLV+45pBWorcRr5SGe9FsansLTQedXfgHl/ID5KGuGJchBh0YbDxmasR1sOQcoxAi7oRv0qVm2fBqI3Q9OJjZwaAgmBzA9sysoUpv7ljKv8Yeru7PaxLgdQJHKI2QwYS/e+VlXEFPL1JwDUU0iHUag9wO9YcJg/Erh8UoUhow1qXa0JFFuWbf1TFcqe6MzNDPLtM3nIbn/Nbde03vnNE+th+C1wUnTbBjEEZRsD74SPZYi92y5PwwznfvJcbRCP9d0JSL6fwSlsFF8k4eeL0ag=;Domain=.rlcdn.com;Expires=Mon, 02-Jul-2018 20:13:14 GMT rtn1-z=IaPVs8VHz+To6d/1fHHeiA/TvRtZorpC/46Kjk9iyADZM8+0u13iagsDbGhvl4rk;Domain=.rlcdn.com;Expires=Mon, 02-Jul-2018 20:13:12 GMT
P3P
CP: "NON DSP COR PSDo SAMo BUS IND UNI COM NAV INT POL PRE"
Content-Length
43
Connection
keep-alive
Content-Type
image/gif; charset=ISO-8859-1

Redirect headers

pragma
no-cache
date
Wed, 03 Jan 2018 20:13:14 GMT
content-encoding
gzip
server
Apache
status
303
vary
Accept-Encoding
p3p
CP="ALL DSP COR NID"
location
https://idsync.rlcdn.com/425686.gif?partner_uid=e4c2fb38932a42a98053d3f5f2457ffd
cache-control
No-Cache, no-store, must-revalidate
set-cookie
lrtpid=1; Domain=.zdbb.net; expires=Fri, 02-Feb-2018 20:13:14 GMT; Path=/
content-type
text/html
content-length
20
expires
0
cJZKeOuBrn4kERxqtaUH3ZBw1xU1rKptJj_0jans920.woff2
fonts.gstatic.com/s/opensans/v15/
9 KB
0
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v15/cJZKeOuBrn4kERxqtaUH3ZBw1xU1rKptJj_0jans920.woff2
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8868d2a2f803ea6802d54a11564b5b96c7d8be56117a328c8f605539d6dee167
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:path
/s/opensans/v15/cJZKeOuBrn4kERxqtaUH3ZBw1xU1rKptJj_0jans920.woff2
pragma
no-cache
origin
http://www.itmanagement.com
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
fonts.gstatic.com
referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,400,600,300
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,400,600,300
Origin
http://www.itmanagement.com

Response headers

date
Sun, 10 Dec 2017 19:42:15 GMT
x-content-type-options
nosniff
last-modified
Wed, 11 Oct 2017 21:49:46 GMT
server
sffe
age
2075457
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303431; quic=51303339; quic=51303338; quic=51303337; quic=51303335,quic=":443"; ma=2592000; v="41,39,38,37,35"
content-length
8892
x-xss-protection
1; mode=block
expires
Mon, 10 Dec 2018 19:42:15 GMT
k3k702ZOKiLJc3WVjuplzBampu5_7CjHW5spxoeN3Vs.woff2
fonts.gstatic.com/s/opensans/v15/
9 KB
0
Font
General
Full URL
http://fonts.gstatic.com/s/opensans/v15/k3k702ZOKiLJc3WVjuplzBampu5_7CjHW5spxoeN3Vs.woff2
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
2a00:1450:4001:81a::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
fe32c9921874b35b87acb0a3b558784ca7b9fed91ed34c1d2a68b6566c9d09be
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Origin
http://www.itmanagement.com
Accept-Encoding
gzip, deflate
Host
fonts.gstatic.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://fonts.googleapis.com/css?family=Open+Sans:400,600,700
Connection
keep-alive
Cache-Control
no-cache
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Referer
http://fonts.googleapis.com/css?family=Open+Sans:400,600,700
Origin
http://www.itmanagement.com

Response headers

Date
Sat, 09 Dec 2017 22:35:46 GMT
X-Content-Type-Options
nosniff
Last-Modified
Wed, 11 Oct 2017 21:49:40 GMT
Server
sffe
Age
2151446
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
8800
X-XSS-Protection
1; mode=block
Expires
Sun, 09 Dec 2018 22:35:46 GMT
c.js
c.betrad.com/geo/
27 B
0
Script
General
Full URL
http://c.betrad.com/geo/c.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
92.123.93.84 , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a92-123-93-84.deploy.akamaitechnologies.com
Software
Apache /
Resource Hash
e099925c8a41c42b69f8d087376431ebe918c76af9c261adbaf8df1a252d1e8c

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
c.betrad.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
Content-Encoding
gzip
Last-Modified
Fri, 20 Feb 2015 01:13:52 GMT
Server
Apache
ETag
"11b0cb2abfd705f33d1c42f1d747fc55:1424394832"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
47
7hJiiEHoEeWRqiIAC39GJQ
www.pcmag.com/mst/n/
Redirect Chain
  • http://www.pcmag.com/mst/n/7hJiiEHoEeWRqiIAC39GJQ?g=f23480c3243b6b1a9e1dd189e8fdf98c&u=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lg...
  • https://www.pcmag.com/mst/n/7hJiiEHoEeWRqiIAC39GJQ?g=f23480c3243b6b1a9e1dd189e8fdf98c&u=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26l...
43 B
0
Image
General
Full URL
https://www.pcmag.com/mst/n/7hJiiEHoEeWRqiIAC39GJQ?g=f23480c3243b6b1a9e1dd189e8fdf98c&u=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&or=
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.33.31.80 Palo Alto, United States, ASN33047 (INSTART - Instart Logic, Inc, US),
Reverse DNS
a-sg01sl04.insnw.net
Software
Apache /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

:path
/mst/n/7hJiiEHoEeWRqiIAC39GJQ?g=f23480c3243b6b1a9e1dd189e8fdf98c&u=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&or=
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
www.pcmag.com
referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
:scheme
https
:method
GET
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 03 Jan 2018 20:13:13 GMT
content-encoding
gzip
server
Apache
age
0
vary
Accept-Encoding
p3p
CP="ALL DSP COR NID"
status
200
cache-control
max-age=0, no-cache
x-instart-request-id
14753879927869867428:SEN01-NPPRY03:1515010393:1911
set-cookie
zdbb=t5Y3j_TITO6-3SWLp0uMXQ; Domain=.zdbb.net; expires=Mon, 02-Jan-2023 20:13:13 GMT; Path=/ h_zdbb=b796378ff4c84ceebedd258ba74b8c5d; Domain=.zdbb.net; expires=Mon, 02-Jan-2023 20:13:13 GMT; Path=/
content-type
image/gif
content-length
64
expires
Wed, 03 Jan 2018 20:13:13 GMT

Redirect headers

Pragma
no-cache
Date
Wed, 03 Jan 2018 20:13:13 GMT
Server
AkamaiGHost
Age
0
Location
https://www.pcmag.com/mst/n/7hJiiEHoEeWRqiIAC39GJQ?g=f23480c3243b6b1a9e1dd189e8fdf98c&u=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&or=
Cache-Control
max-age=0, no-cache
X-Instart-Request-ID
14537457804667793375:SEN01-NPPRY14:1515010393:1911
Connection
keep-alive
Content-Length
0
Expires
Wed, 03 Jan 2018 20:13:13 GMT
zd_footer_logo.png
static.adziff.com/pcmag/images/
1 KB
0
Image
General
Full URL
http://static.adziff.com/pcmag/images/zd_footer_logo.png
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
d9ab271a58bd3e13c43b449f2f9a547f13a8acb8f8d266602d8acbd2679ac5a1

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
static.adziff.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

x-amz-version-id
null
Last-Modified
Thu, 21 Nov 2013 22:11:51 GMT
Server
AmazonS3
x-amz-request-id
D919BC7543414A7C
ETag
"214e1318e76c8eb636ba6a1d2235eba0"
Content-Type
image/png
Cache-Control
max-age=7776000
Date
Wed, 03 Jan 2018 20:13:13 GMT
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1272
x-amz-id-2
lIgIVUnwDzOcVbFljoClVRue4CtSP1pzAU9rqD6LBzRCr7R7+aUfqjD0yPI00keeY2E/Qdnl4Sk=
Expires
Tue, 03 Apr 2018 20:13:13 GMT
Cookie set a.gif
zdbb.net/n/
43 B
0
Image
General
Full URL
http://zdbb.net/n/a.gif
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
54.76.30.58 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-76-30-58.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
zdbb.net
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 03 Jan 2018 20:13:13 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Connection
keep-alive
P3P
CP="ALL DSP COR NID"
Cache-Control
No-Cache, no-store, must-revalidate
Transfer-Encoding
chunked
Set-Cookie
zdbb=5ML7OJMqQqmAU9P18kV__Q; Domain=.zdbb.net; expires=Mon, 02-Jan-2023 20:13:13 GMT; Path=/ h_zdbb=e4c2fb38932a42a98053d3f5f2457ffd; Domain=.zdbb.net; expires=Mon, 02-Jan-2023 20:13:13 GMT; Path=/
Content-Type
image/gif
Expires
0
activeview
pagead2.googlesyndication.com/
42 B
0
Image
General
Full URL
http://pagead2.googlesyndication.com/activeview?
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
2a00:1450:4001:825::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
pagead2.googlesyndication.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 03 Jan 2018 20:13:13 GMT
X-Content-Type-Options
nosniff
Server
cafe
P3P
policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
Content-Type
image/gif
Access-Control-Allow-Origin
*
Cache-Control
no-cache, must-revalidate
Timing-Allow-Origin
*
Content-Length
42
X-XSS-Protection
1; mode=block
Expires
Fri, 01 Jan 1990 00:00:00 GMT
__utm.gif
www.google-analytics.com/r/
Redirect Chain
  • http://www.google-analytics.com/r/__utm.gif?utmwv=5.7.1&utms=1&utmn=698141362&utmhn=www.itmanagement.com&utmcs=UTF-8&utmsr=1600x1200&utmvp=1600x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=C...
  • https://www.google-analytics.com/r/__utm.gif?utmwv=5.7.1&utms=1&utmn=698141362&utmhn=www.itmanagement.com&utmcs=UTF-8&utmsr=1600x1200&utmvp=1600x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=...
35 B
0
Image
General
Full URL
https://www.google-analytics.com/r/__utm.gif?utmwv=5.7.1&utms=1&utmn=698141362&utmhn=www.itmanagement.com&utmcs=UTF-8&utmsr=1600x1200&utmvp=1600x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Cybercrime%20Tactics%20and%20Techniques%20Q3%202017&utmhid=432939039&utmr=-&utmp=%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&utmht=1515010392962&utmac=UA-2641678-15&utmcc=__utma%3D223537091.1603197254.1515010393.1515010393.1515010393.1%3B%2B__utmz%3D223537091.1515010393.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=1680550714&utmredir=1&utmu=qAAAAAAAAAAAAAAAAAAAAAAE~
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:821::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

:path
/r/__utm.gif?utmwv=5.7.1&utms=1&utmn=698141362&utmhn=www.itmanagement.com&utmcs=UTF-8&utmsr=1600x1200&utmvp=1600x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Cybercrime%20Tactics%20and%20Techniques%20Q3%202017&utmhid=432939039&utmr=-&utmp=%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&utmht=1515010392962&utmac=UA-2641678-15&utmcc=__utma%3D223537091.1603197254.1515010393.1515010393.1515010393.1%3B%2B__utmz%3D223537091.1515010393.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=1680550714&utmredir=1&utmu=qAAAAAAAAAAAAAAAAAAAAAAE~
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
www.google-analytics.com
referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
:scheme
https
:method
GET
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 03 Jan 2018 20:13:13 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
hq=":443"; ma=2592000; quic=51303431; quic=51303339; quic=51303338; quic=51303337; quic=51303335,quic=":443"; ma=2592000; v="41,39,38,37,35"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://www.google-analytics.com/r/__utm.gif?utmwv=5.7.1&utms=1&utmn=698141362&utmhn=www.itmanagement.com&utmcs=UTF-8&utmsr=1600x1200&utmvp=1600x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Cybercrime%20Tactics%20and%20Techniques%20Q3%202017&utmhid=432939039&utmr=-&utmp=%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&utmht=1515010392962&utmac=UA-2641678-15&utmcc=__utma%3D223537091.1603197254.1515010393.1515010393.1515010393.1%3B%2B__utmz%3D223537091.1515010393.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=1680550714&utmredir=1&utmu=qAAAAAAAAAAAAAAAAAAAAAAE~
Non-Authoritative-Reason
HSTS
toolbox.js
cdn.static.zdbb.net/js/domain/
291 B
0
Script
General
Full URL
http://cdn.static.zdbb.net/js/domain/toolbox.js?v=0
Requested by
Host: cdn.static.zdbb.net
URL: http://cdn.static.zdbb.net/js/z0WVjCBSEeGLoxIxOQVEwQ.min.js
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
4720013523a6cb9633c9ed38cb04621ccc82eec2b24231a26cf4643ffb3907af

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.static.zdbb.net
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Cookie
zdbb=5ML7OJMqQqmAU9P18kV__Q; h_zdbb=e4c2fb38932a42a98053d3f5f2457ffd; tpid=17
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
Last-Modified
Thu, 07 May 2015 12:33:11 GMT
Server
AmazonS3
x-amz-request-id
3D289B07BDBBC2F5
ETag
"4eaa68a26f79d255128579e74c61bc6c"
Content-Type
application/javascript
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
291
x-amz-id-2
Kem6rt2tp3NE+bLJjiy4sDP0Muj2cQaVsiWqK8UdzX6G5sf8g2AHDPcdPtSZzlCwlIs70enDWeU=
Expires
Wed, 03 Jan 2018 21:13:13 GMT
zd-core-olt.min.js
cdn.static.zdbb.net/js/
838 B
0
Script
General
Full URL
http://cdn.static.zdbb.net/js/zd-core-olt.min.js
Requested by
Host: cdn.static.zdbb.net
URL: http://cdn.static.zdbb.net/js/z0WVjCBSEeGLoxIxOQVEwQ.min.js
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
7726616f2c5b7ac4e771b370a20c0214e4c1d18ece9e70f4600434745cbe5ac9

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.static.zdbb.net
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Cookie
zdbb=5ML7OJMqQqmAU9P18kV__Q; h_zdbb=e4c2fb38932a42a98053d3f5f2457ffd; tpid=17
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
Last-Modified
Fri, 08 Jan 2016 17:45:48 GMT
Server
AmazonS3
x-amz-request-id
3156FD63D69837A2
ETag
"8bbbef12b9192ad25d63aaff120b22f8"
Content-Type
application/javascript
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
838
x-amz-id-2
aMIbNB8lWiiE7Ktmye4TBGIoKDhNIhp6Hmnahl/KGyMxzyfdKIOdOqX1vMlPVoUfEnInCCAwvaE=
Expires
Wed, 10 Jan 2018 20:13:13 GMT
zd-core.min.js
cdn.static.zdbb.net/js/
34 KB
0
Script
General
Full URL
http://cdn.static.zdbb.net/js/zd-core.min.js?v=0
Requested by
Host: cdn.static.zdbb.net
URL: http://cdn.static.zdbb.net/js/z0WVjCBSEeGLoxIxOQVEwQ.min.js
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
e81ea80e14a9a1514afd6f0473f447e00c36cb0dbd3361ea5b709bcaad58cd11

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.static.zdbb.net
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Cookie
zdbb=5ML7OJMqQqmAU9P18kV__Q; h_zdbb=e4c2fb38932a42a98053d3f5f2457ffd; tpid=17
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Jul 2017 15:57:58 GMT
Server
AmazonS3
x-amz-request-id
381CCF3BB7CC14E1
ETag
"6a5c0d35a5aa1953bf1e16c8d83d111d"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
5550
x-amz-id-2
R2bgMekcpdGfTBBek2QOqcomVEm1YQyZHnLfcwMDx/H4eohMjmq2F0mhNVvYZtygh03dADcdn94=
Expires
Wed, 10 Jan 2018 20:13:13 GMT
beacon.js
b.scorecardresearch.com/
1 KB
0
Script
General
Full URL
http://b.scorecardresearch.com/beacon.js
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
2.21.246.91 , Austria, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
b.scorecardresearch.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=1209600
Connection
keep-alive
Content-Length
901
Expires
Wed, 17 Jan 2018 20:13:13 GMT
m
secure-us.imrworldwide.com/cgi-bin/
Redirect Chain
  • http://secure-us.imrworldwide.com/cgi-bin/m?ci=us-806031h&cg=0&cc=1&si=http%3A//www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&rp=&ts=comp...
  • http://secure-us.imrworldwide.com/cgi-bin/m?ci=us-806031h&cg=0&cc=1&si=http%3A//www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&rp=&ts=comp...
44 B
0
Image
General
Full URL
http://secure-us.imrworldwide.com/cgi-bin/m?ci=us-806031h&cg=0&cc=1&si=http%3A//www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&rp=&ts=compact&rnd=1515010393409&ja=1
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
138.108.96.100 Schaumburg, United States, ASN16477 (ACNIELSEN-AS - ACNIELSEN, US),
Reverse DNS
Software
nginx /
Resource Hash
5ecb58845a9ac30e4eb4b18eb0e7431ba1fb195ce035309735efaee67421c7a3

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
secure-us.imrworldwide.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Cookie
IMRID=c9b5ed1a-a8a4-424a-b56a-6fb971e3c53d
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 03 Jan 2018 20:13:13 GMT
Server
nginx
P3P
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
44
Expires
Thu, 01 Dec 1994 16:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Wed, 03 Jan 2018 20:13:13 GMT
Server
nginx
P3P
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
Location
http://secure-us.imrworldwide.com/cgi-bin/m?ci=us-806031h&cg=0&cc=1&si=http%3A//www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&rp=&ts=compact&rnd=1515010393409&ja=1
Set-Cookie
IMRID=af668855-0fc9-4cee-ad4b-9213d10c15a6;Path=/;Domain=imrworldwide.com;Expires=Mon, 28-Jan-2019 20:13:13 GMT;Max-Age=33696000
Cache-Control
no-cache
Connection
close
Content-Length
0
Expires
Thu, 01 Dec 1994 16:00:00 GMT
m
secure-us.imrworldwide.com/cgi-bin/
Redirect Chain
  • http://secure-us.imrworldwide.com/cgi-bin/m?ci=us-806031h&cg=0&cc=1&si=http%3A//www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&rp=&ts=comp...
  • http://secure-us.imrworldwide.com/cgi-bin/m?ci=us-806031h&cg=0&cc=1&si=http%3A//www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&rp=&ts=comp...
44 B
0
Image
General
Full URL
http://secure-us.imrworldwide.com/cgi-bin/m?ci=us-806031h&cg=0&cc=1&si=http%3A//www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&rp=&ts=compact&rnd=1515010393410&ja=1
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
138.108.96.100 Schaumburg, United States, ASN16477 (ACNIELSEN-AS - ACNIELSEN, US),
Reverse DNS
Software
nginx /
Resource Hash
5ecb58845a9ac30e4eb4b18eb0e7431ba1fb195ce035309735efaee67421c7a3

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
secure-us.imrworldwide.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Cookie
IMRID=c9b5ed1a-a8a4-424a-b56a-6fb971e3c53d
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 03 Jan 2018 20:13:13 GMT
Server
nginx
P3P
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
44
Expires
Thu, 01 Dec 1994 16:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Wed, 03 Jan 2018 20:13:13 GMT
Server
nginx
P3P
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
Location
http://secure-us.imrworldwide.com/cgi-bin/m?ci=us-806031h&cg=0&cc=1&si=http%3A//www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&rp=&ts=compact&rnd=1515010393410&ja=1
Set-Cookie
IMRID=c9b5ed1a-a8a4-424a-b56a-6fb971e3c53d;Path=/;Domain=imrworldwide.com;Expires=Mon, 28-Jan-2019 20:13:13 GMT;Max-Age=33696000
Cache-Control
no-cache
Connection
close
Content-Length
0
Expires
Thu, 01 Dec 1994 16:00:00 GMT
segments.js
gurgle.zdbb.net/
0
0
Script
General
Full URL
http://gurgle.zdbb.net/segments.js?url=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627
Requested by
Host: gurgle.zdbb.net
URL: http://gurgle.zdbb.net/segments.js
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
/
Resource Hash

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
gurgle.zdbb.net
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Cookie
zdbb=5ML7OJMqQqmAU9P18kV__Q; h_zdbb=e4c2fb38932a42a98053d3f5f2457ffd; tpid=17
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
x-stale
1
Connection
keep-alive
Content-Length
0
walker-min.js
cdn.static.zdbb.net/js/
8 KB
0
Script
General
Full URL
http://cdn.static.zdbb.net/js/walker-min.js?v=0
Requested by
Host: cdn.static.zdbb.net
URL: http://cdn.static.zdbb.net/js/domain/toolbox.js?v=0
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
375bc588b1ce8c9eb4600b092537218c7909f05a939d721842fabb54d9734ec2

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.static.zdbb.net
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Cookie
zdbb=5ML7OJMqQqmAU9P18kV__Q; h_zdbb=e4c2fb38932a42a98053d3f5f2457ffd; tpid=17
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:13 GMT
Content-Encoding
gzip
Last-Modified
Wed, 19 Oct 2016 20:48:08 GMT
Server
AmazonS3
x-amz-request-id
8B5A0E77D59033FF
ETag
"4290d67fc279c5db3815c9a43594e30c"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2863
x-amz-id-2
jk+RSzzlf/p4uTg5Wlsgf4JAH1kIpjl/JTxuv9Lze2VfmjYiBFKm/8dDjmlk27aDUUonci1p8CE=
Expires
Wed, 10 Jan 2018 20:13:13 GMT
b2
b.scorecardresearch.com/
Redirect Chain
  • http://b.scorecardresearch.com/b?c1=2&c2=6036202&ns__t=1515010393426&ns_c=UTF-8&cv=3.1&c8=Cybercrime%20Tactics%20and%20Techniques%20Q3%202017&c7=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcyber...
  • http://b.scorecardresearch.com/b2?c1=2&c2=6036202&ns__t=1515010393426&ns_c=UTF-8&cv=3.1&c8=Cybercrime%20Tactics%20and%20Techniques%20Q3%202017&c7=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybe...
0
0
Image
General
Full URL
http://b.scorecardresearch.com/b2?c1=2&c2=6036202&ns__t=1515010393426&ns_c=UTF-8&cv=3.1&c8=Cybercrime%20Tactics%20and%20Techniques%20Q3%202017&c7=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&c9=
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
2.21.246.91 , Austria, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
b.scorecardresearch.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Cookie
UID=1F32aa21a24687a17ae94381515010393; UIDR=1515010393
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 03 Jan 2018 20:13:13 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Wed, 03 Jan 2018 20:13:13 GMT
Location
http://b.scorecardresearch.com/b2?c1=2&c2=6036202&ns__t=1515010393426&ns_c=UTF-8&cv=3.1&c8=Cybercrime%20Tactics%20and%20Techniques%20Q3%202017&c7=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627&c9=
Set-Cookie
UID=1F32aa21a24687a17ae94381515010393; expires=Tue, 24-Dec-2019 20:13:13 GMT; path=/; domain=.scorecardresearch.com UIDR=1515010393; expires=Tue, 24-Dec-2019 20:13:13 GMT; path=/; domain=.scorecardresearch.com
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
check
walker.zdbb.net/
4 B
0
XHR
General
Full URL
http://walker.zdbb.net/check?href=http%3A%2F%2Fwww.itmanagement.com%2Fresearch%2Fcybercrime-tactics-and-techniques-q3-2017-61965%3Flsid%3D6%26lgid%3D7361627
Requested by
Host: www.itmanagement.com
URL: http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Protocol
HTTP/1.1
Server
104.111.230.107 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-230-107.deploy.static.akamaitechnologies.com
Software
TornadoServer/4.0.2 /
Resource Hash
dfe88090c5ed7ac2f32571f0fc822fda4d8cd281fc7138c7cd6db656f6e2d081

Request headers

Pragma
no-cache
Origin
http://www.itmanagement.com
Accept-Encoding
gzip, deflate
Host
walker.zdbb.net
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Connection
keep-alive
Cache-Control
no-cache
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Origin
http://www.itmanagement.com

Response headers

Date
Wed, 03 Jan 2018 20:13:14 GMT
Server
TornadoServer/4.0.2
ETag
"fddf1df7c30cac7908d10246256efd264ce7aa32"
Access-Control-Max-Age
86400
Access-Control-Allow-Methods
GET
Content-Type
text/html; charset=UTF-8
Access-Control-Allow-Origin
http://www.itmanagement.com
Cache-Control
private, no-cache
Access-Control-Allow-Credentials
true
Connection
keep-alive
Access-Control-Allow-Headers
*
Content-Length
4
lzma-min.js
cdn.static.zdbb.net/js/
2 KB
0
Script
General
Full URL
http://cdn.static.zdbb.net/js/lzma-min.js
Requested by
Host: cdn.static.zdbb.net
URL: http://cdn.static.zdbb.net/js/walker-min.js?v=0
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
8e4002ba7c05b384460a363ef53c917bc4a86e1fec855ef5871989e6ee632758

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.static.zdbb.net
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Cookie
zdbb=5ML7OJMqQqmAU9P18kV__Q; h_zdbb=e4c2fb38932a42a98053d3f5f2457ffd; tpid=465
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:14 GMT
Content-Encoding
gzip
Last-Modified
Wed, 13 Aug 2014 22:44:58 GMT
Server
AmazonS3
x-amz-request-id
15C6B63AA3EB3664
ETag
"e9fb778d9408f34020c08f44c288c330"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
928
x-amz-id-2
BOF2AyC4iEN7TBu/dKCofVujM2VqECwIInRAQcHUZNiqPYajhQGKXso5Ome5cYfBYF0vrwViuks=
Expires
Wed, 10 Jan 2018 20:13:14 GMT
lzma-worker-min.js
cdn.static.zdbb.net/js/
53 KB
0
Script
General
Full URL
http://cdn.static.zdbb.net/js/lzma-worker-min.js
Requested by
Host: cdn.static.zdbb.net
URL: http://cdn.static.zdbb.net/js/lzma-min.js
Protocol
HTTP/1.1
Server
104.111.250.65 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-111-250-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
b5a65752e251883ca0ff0b641a0408f96608442dcd28f2c53d798a25db467683

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
cdn.static.zdbb.net
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
Cookie
zdbb=5ML7OJMqQqmAU9P18kV__Q; h_zdbb=e4c2fb38932a42a98053d3f5f2457ffd; tpid=465
Connection
keep-alive
Cache-Control
no-cache
Referer
http://www.itmanagement.com/research/cybercrime-tactics-and-techniques-q3-2017-61965?lsid=6&lgid=7361627
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Wed, 03 Jan 2018 20:13:14 GMT
Content-Encoding
gzip
Last-Modified
Wed, 13 Aug 2014 22:44:58 GMT
Server
AmazonS3
x-amz-request-id
1ABDCAA45695460A
ETag
"44d21c8adc9b9ceaff8067f307ec2349"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
15161
x-amz-id-2
sXVcE0lbrF9280tOYkLE7qbnVaFbDCfYlvMaz7UCeD/T6ZKgdo+824V5AURULJa8DteDi0oGPc4=
Expires
Wed, 10 Jan 2018 20:13:14 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
consent.truste.com
URL
http://consent.truste.com/notice?domain=ziffdavis.com&c=teconsent&js=bb&noticeType=bb
Domain
gurgle.zdbb.net
URL
http://gurgle.zdbb.net/js/v2/gurgle.js

Verdicts & Comments Add Verdict or Comment

213 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onafterprint object| onbeforeprint function| $ function| jQuery object| __ZDDMP object| ZDVTools function| yourMoatListener object| googletag object| __ZDRefresher object| _gaq object| NREUM object| newrelic function| __nr_require object| jQuery17205204585901908212 function| zdcore_getCookie function| zdcore_getRootDomain function| get_categories_from_offers_url function| get_categories_from_ign_url function| get_categories_from_pcmag_url function| get_categories_from_askmen_url function| zd_call_ODC_tag function| Process_ODC_Phints function| getCookie object| theForm function| __doPostBack function| WebForm_PostBackOptions function| WebForm_DoPostBackWithOptions object| __pendingCallbacks number| __synchronousCallBackIndex function| WebForm_DoCallback function| WebForm_CallbackComplete function| WebForm_ExecuteCallback function| WebForm_FillFirstAvailableSlot boolean| __nonMSDOMBrowser string| __theFormPostData object| __theFormPostCollection object| __callbackTextTypes function| WebForm_InitCallback function| WebForm_InitCallbackAddField function| WebForm_EncodeCallback object| __disabledControlArray function| WebForm_ReEnableControls function| WebForm_ReDisableControls function| WebForm_SimulateClick function| WebForm_FireDefaultButton function| WebForm_GetScrollX function| WebForm_GetScrollY function| WebForm_SaveScrollPositionSubmit function| WebForm_SaveScrollPositionOnSubmit function| WebForm_RestoreScrollPosition function| WebForm_TextBoxKeyHandler function| WebForm_TrimString function| WebForm_AppendToClassName function| WebForm_RemoveClassName function| WebForm_GetElementById function| WebForm_GetElementByTagName function| WebForm_GetElementsByTagName function| WebForm_GetElementDir function| WebForm_GetElementPosition function| WebForm_GetParentByTagName function| WebForm_SetElementHeight function| WebForm_SetElementWidth function| WebForm_SetElementX function| WebForm_SetElementY object| _zdi object| errorMsg undefined| isEmedia function| enableButton function| createPost function| ResponceLogic function| enableOther function| SetCookie function| readCookie function| getParameterByName function| handleCountryChange undefined| NOTICE_ID object| callback object| chin string| domain object| s function| showInPage function| showHoverImplied string| CDNImageURL object| __ZDSTICKY object| topSidebarAd object| bottomSidebarAd object| bottomSidebarAnchor object| pageContainer object| topMenuHeight boolean| enableDebug object| __ZDABCB object| TaboolaWatchdog function| initUkCRE string| __ZDGC object| _sp_ object| _gat object| gaGlobal string| _bap_p_country function| LightboxBackground function| UndoLightboxBackground function| addEvent function| SaveForLaterOnSubmit function| SaveForLater function| ShowSuccess function| isMouseLeaveOrEnter string| currentFeedMenu string| lastFeedMenu function| feed_showMenu function| feed_hideMenu function| feed_stopShowMenu function| feed_menuWorker object| currentButton function| feed_showButton function| feed_hideButton function| feed_Connect function| feed_showMessage function| stopDisplay function| hideMessage function| escapeHTML function| CtahandleNonSignedIn function| CtahandleSignedInUserCustom function| CtashowConfirmation function| CtahideConfirmation function| CtaGetEmail function| CtaRedirect function| CtaEmailIsValid function| PollVoteBtnClick function| getSelectedPollAnswer object| _tmplCache function| PullJobs function| setWatermarks boolean| _overrideSubmit object| md function| RegisterSubNavMenu boolean| signin_shown function| showSigninBox function| doHomePageSignIn function| hideSigninMessage function| doSearchDropDown function| setInMenu function| hideSearchDropDown function| leaveMenu function| setSearchHeader function| GlobalSearch function| SetWaterMark function| InitCodeHighlighting function| HighlightCode function| SiteCatalystLinkTracking function| SCImpressionTracking number| lazyLoadBuffer undefined| lazyObjects function| CheckUserImageScroll function| toggleNode function| checkProfileValidWorker function| handleUserNameAvailResult function| handleSuggestedProfileNames function| hideProfileNameSuggestBox function| isEmpty boolean| loadingFlag function| loading function| notLoading number| subProductOverride function| getSubProductOverride function| setSubProductOverride function| getMailFrequency function| handleProcessFail function| Register function| checkProfileValid function| handleEmailAvailResult function| getSuggestedProfileNames function| populateProfileName function| validate function| focusFirstName function| memberLinksBuilder function| discussionPaneHandler function| ajaxforgroupslist function| closeallpanels function| tmpl string| inviteApiFail function| declineInvite function| acceptInvite function| hideMinidashInvite function| showInviteConfirm object| fp_domains object| _comscore object| BKTAG function| bk_addUserCtx function| bk_addPageCtx function| bk_addEmailHash function| bk_addPhoneHash function| bk_doJSTag function| bk_doJSTag2 function| bk_doCarsJSTag function| bk_doPartnerAltTag function| bk_doCallbackTag function| bk_doCallbackTagWithTimeOut string| zd_gurgle_script_domain object| zd_walker_skip_nodes object| script function| udm_ object| ns_p object| COMSCORE object| zdc object| zd object| zd_domain_regex string| zd_domain_match string| zd_bbdomain function| is_array function| convert_to_formated_hex number| k boolean| no_worker function| LZMA object| LZMA_WORKER

0 Cookies

1 Console Messages

Source Level URL
Text
console-api log URL: http://cdn.static.zdbb.net/js/zd-core-olt.min.js(Line 1)
Message:
ZD Core :: Outbound Link Tracking Initialized

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy frame-ancestors https://*.toolbox.com 'self'
X-Frame-Options SAMEORIGIN

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

ajax.googleapis.com
b.scorecardresearch.com
b2b-hosteddocs.s3.amazonaws.com
c.betrad.com
cdn.static.zdbb.net
cdn.toolbox.com
cdn.ziffstatic.com
cm.g.doubleclick.net
consent.truste.com
d3ujids68p6xmq.cloudfront.net
fonts.googleapis.com
fonts.gstatic.com
gurgle.zdbb.net
hosteddocs.ittoolbox.com
idsync.rlcdn.com
images.zdb2bmail.com
match.adsrvr.org
match.prod.bidr.io
pagead2.googlesyndication.com
pippio.com
pippio.zdimg.net
privacy-policy.truste.com
s3.amazonaws.com
secure-us.imrworldwide.com
static.adziff.com
static.ziffdavis.com
static.ziffprod.com
sync.mathtag.com
tags.bkrtx.com
tags.bluekai.com
walker.zdbb.net
www.google-analytics.com
www.itmanagement.com
www.pcmag.com
zdbb.net
consent.truste.com
gurgle.zdbb.net
104.111.230.107
104.111.232.108
104.111.250.65
107.178.254.65
138.108.96.100
172.217.22.98
185.29.135.234
192.33.31.80
2.21.246.149
2.21.246.91
23.193.41.238
2a00:1450:4001:81a::2003
2a00:1450:4001:81a::200a
2a00:1450:4001:821::200e
2a00:1450:4001:825::2002
34.196.188.236
52.215.63.219
52.216.228.227
52.219.20.124
52.85.249.215
54.154.146.124
54.210.155.19
54.230.128.200
54.76.30.58
54.77.23.202
92.123.93.84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