cybersecurity.mx
Open in
urlscan Pro
138.68.1.78
Public Scan
Submission: On November 23 via api from US — Scanned from US
Summary
TLS certificate: Issued by R3 on November 10th 2023. Valid for: 3 months.
This is the only time cybersecurity.mx was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 138.68.1.78 138.68.1.78 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
8 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
cybersecurity.mx
cybersecurity.mx |
46 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
7 | cybersecurity.mx |
cybersecurity.mx
|
8 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
wordpress.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.cybersecurity.mx R3 |
2023-11-10 - 2024-02-08 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://cybersecurity.mx/
Frame ID: 707B1304250934CA602F160C69C5D2AF
Requests: 8 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: A WordPress Commenter
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
cybersecurity.mx/ |
24 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.min.css
cybersecurity.mx/wp-includes/css/dist/block-library/ |
107 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
cybersecurity.mx/wp-content/themes/twentytwentyone/ |
148 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
polyfills.js
cybersecurity.mx/wp-content/themes/twentytwentyone/assets/js/ |
1 KB 548 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
responsive-embeds.js
cybersecurity.mx/wp-content/themes/twentytwentyone/assets/js/ |
1 KB 626 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
print.css
cybersecurity.mx/wp-content/themes/twentytwentyone/assets/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
c4956e2b-9074-4aa5-8342-781188c160e4
https://cybersecurity.mx/ |
1 KB 0 |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wp-emoji-release.min.js
cybersecurity.mx/wp-includes/js/ |
18 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture object| _wpemojiSettings function| twentytwentyoneResponsiveEmbeds object| twemoji object| wp0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cybersecurity.mx
138.68.1.78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