cybershieldblog.com
Open in
urlscan Pro
143.198.138.32
Public Scan
Effective URL: https://cybershieldblog.com/
Submission: On December 16 via api from NL — Scanned from CA
Summary
TLS certificate: Issued by R11 on December 16th 2024. Valid for: 3 months.
This is the only time cybershieldblog.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
22 | 143.198.138.32 143.198.138.32 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 | 142.250.65.234 142.250.65.234 | 15169 (GOOGLE) (GOOGLE) | |
2 | 142.251.40.99 142.251.40.99 | 15169 (GOOGLE) (GOOGLE) | |
25 | 3 |
ASN14061 (DIGITALOCEAN-ASN, US)
PTR: 1107962.cloudwaysapps.com
cybershieldblog.com |
ASN15169 (GOOGLE, US)
PTR: lga25s73-in-f10.1e100.net
fonts.googleapis.com |
ASN15169 (GOOGLE, US)
PTR: lga25s79-in-f3.1e100.net
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
cybershieldblog.com
cybershieldblog.com |
1 MB |
2 |
gstatic.com
fonts.gstatic.com |
57 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 29 |
1 KB |
25 | 3 |
Domain | Requested by | |
---|---|---|
22 | cybershieldblog.com |
cybershieldblog.com
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
cybershieldblog.com
|
25 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
thehackernews.com |
www.csoonline.com |
cyble.com |
www.darkreading.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
cybershieldblog.com R11 |
2024-12-16 - 2025-03-16 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-11-04 - 2025-01-27 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-11-04 - 2025-01-27 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://cybershieldblog.com/
Frame ID: CAE13C1A9574EC47158F3DD603D7424A
Requests: 25 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://cybershieldblog.com/
HTTP 307
https://cybershieldblog.com/ Page URL
Detected technologies
WordPress (CMS) ExpandDetected patterns
- <link rel=["']stylesheet["'] [^>]+/wp-(?:content|includes)/
- /wp-(?:content|includes)/
Oxygen (Page builders) Expand
Detected patterns
- <link [^>]*href=(?:"|')[^>]*wp-content/plugins/oxygen/
- wp-content/plugins/oxygen
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Title: The Hacker News
Search URL Search Domain Scan URL
Title: CSO Online
Search URL Search Domain Scan URL
Title: Cyble
Search URL Search Domain Scan URL
Title: Dark Reading
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://cybershieldblog.com/
HTTP 307
https://cybershieldblog.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
25 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
cybershieldblog.com/ Redirect Chain
|
46 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
23 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oxygen.css
cybershieldblog.com/wp-content/plugins/oxygen/component-framework/ |
20 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
breeze-prefetch-links.min.js
cybershieldblog.com/wp-content/plugins/breeze/assets/js/js-front-end/ |
1 KB 891 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cybershieldblog.com/wp-includes/js/jquery/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1409.css
cybershieldblog.com/wp-content/uploads/oxygen/css/ |
12 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1410.css
cybershieldblog.com/wp-content/uploads/oxygen/css/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
universal.css
cybershieldblog.com/wp-content/uploads/oxygen/css/ |
23 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cyber-shield-blog-logo.png
cybershieldblog.com/wp-content/uploads/2024/04/ |
32 KB 32 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Harley-300x300.png
cybershieldblog.com/wp-content/uploads/2024/05/ |
105 KB 105 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
byline.334a.min.js
cybershieldblog.com/wp-content/plugins/molongui-authorship/assets/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
how-effective-is-cyber-security-illustration.png
cybershieldblog.com/wp-content/uploads/2024/04/ |
284 KB 284 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
how-can-we-improve-cyber-security-illustration.png
cybershieldblog.com/wp-content/uploads/2024/04/ |
286 KB 287 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
how-has-cyber-security-become-a-matter-of-concern-illustration.png
cybershieldblog.com/wp-content/uploads/2024/04/ |
280 KB 281 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
how-do-i-train-my-employees-for-cyber-security-illustration.png
cybershieldblog.com/wp-content/uploads/2024/04/ |
305 KB 305 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
how-can-identity-theft-be-prevented-in-cyber-security-illustration.png
cybershieldblog.com/wp-content/uploads/2024/04/ |
64 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
how-can-i-become-a-cyber-security-expert-illustration.png
cybershieldblog.com/wp-content/uploads/2024/04/ |
97 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
who-dictates-policy-in-cyber-security-illustration.png
cybershieldblog.com/wp-content/uploads/2024/04/ |
0 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
which-of-the-following-actions-compromise-cyber-security-illustration.png
cybershieldblog.com/wp-content/uploads/2024/04/ |
0 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
which-laptop-is-best-for-cyber-security-students-illustration.png
cybershieldblog.com/wp-content/uploads/2024/04/ |
0 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
which-is-better-cyber-security-or-data-analytics-illustration.png
cybershieldblog.com/wp-content/uploads/2024/04/ |
0 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
what-to-learn-for-cyber-security-illustration.png
cybershieldblog.com/wp-content/uploads/2024/04/ |
0 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
what-programming-language-is-used-in-cyber-security-illustration.png
cybershieldblog.com/wp-content/uploads/2024/04/ |
0 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
7Au9p_AqnyWWAxW2Wk3GzWQI.woff2
fonts.gstatic.com/s/mavenpro/v36/ |
20 KB 20 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
JTUSjIg1_i6t8kCHKm459Wlhyw.woff2
fonts.gstatic.com/s/montserrat/v29/ |
37 KB 37 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| breeze_prefetch function| ready function| search_for_banned_links function| breeze_ignore_special_links function| jQuery object| molongui_authorship_byline_params0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cybershieldblog.com
fonts.googleapis.com
fonts.gstatic.com
142.250.65.234
142.251.40.99
143.198.138.32
138241e1c6f2ea72438e2c5438745ddedc6580a604300a9722dfcc1ea2802152
1c4fa4b441f62ecf2b3f9f1499f3523fe483706df50706fd5cbc684037a5d7ee
2b39485d9fe25291c2a21d83ddd1073616e59e7057db5e4f4126cb19620c6748
3f708c2d4a53541f6b29071ace6704c0609f7c31c9bf3b7cb1bcf273b7d3e049
52b14906d431f4169ae615361f6391278f5d35b9e93e57d076717b0d398435b8
72f6b66bc24153ce718f5d79fabb662012fb3b5d685a44368148c4d295a21f98
74eddce65d5805999e6bfe6e10506dafb2b8a3d201898a1128710ec31c91e78e
8adeed9f90d6d8d483a208f54d5733a0336ee6888436fe8e2e5fb1c41433eaec
9b10ae01244072c779f8fed7b5309941b75ca10e6b50ebcccbdb8121003dfdb5
9d7fe0f97b16a752e4cd03c8efc4371e17e4c53beb272810fed7dc5e065d9ee4
9df6c4c7c9ded0611ccf30c49f5a271fe7ab2405cdecbfbf38413a1430d5f75e
c04e2cca6b6af3669060bebd2c9f9b8089658537760703ddbfda850bc3c6c8bd
c23703d26d79fe35100d6b23d7584b902690265b6731dd7b90ea7493af627214
cb6f2d32c49d1c2b25e9ffc9aaafa3f83075346c01bcd4ae6eb187392a4292cf
d4b3c951307c250c45a41fc20ccd30b6a282704798625de465211633ae7a08bf
e01ff174b198a863bff0ffe71112d5bdf3a64e1dcb3259e0abf6710105876681
fdc9964050bfa24c27a3c76c6791b3674292a5f352cbc83d7a4dc49595bc3fb1