Submitted URL: https://t.sidekickopen75.com/s1t/c/5/f18dQhb0S7lM8dDMPbW2n0x6l2B9nMJN7t5X-FfhMynW2z8P4K1q7rw8W56dCwh4mc6JF102?t=https%3A%2F%2...
Effective URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Submission: On December 10 via manual from GB

Summary

This website contacted 23 IPs in 3 countries across 20 domains to perform 69 HTTP transactions. The main IP is 54.194.43.96, located in Dublin, Ireland and belongs to AMAZON-02 - Amazon.com, Inc., US. The main domain is resources.cybsafe.com.
TLS certificate: Issued by Amazon on August 26th 2018. Valid for: a year.
This is the only time resources.cybsafe.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 2606:4700::68... 13335 (CLOUDFLAR...)
1 1 2606:4700::68... 13335 (CLOUDFLAR...)
32 54.194.43.96 16509 (AMAZON-02)
3 2a00:1450:400... 15169 (GOOGLE)
1 209.197.3.15 20446 (HIGHWINDS3)
2 2606:4700::68... 13335 (CLOUDFLAR...)
6 192.0.77.2 2635 (AUTOMATTIC)
1 2a00:1450:400... 15169 (GOOGLE)
1 192.0.77.32 2635 (AUTOMATTIC)
2 192.0.76.3 2635 (AUTOMATTIC)
5 2a00:1450:400... 15169 (GOOGLE)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 143.204.214.21 16509 (AMAZON-02)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 2 2a00:1450:400... 15169 (GOOGLE)
2 3 2620:109:c00c... 14413 (LINKEDIN)
1 1 2a05:f500:10:... 14413 (LINKEDIN)
1 2a00:1450:400... 15169 (GOOGLE)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 143.204.214.7 16509 (AMAZON-02)
1 1 143.204.214.4 16509 (AMAZON-02)
2 143.204.214.24 16509 (AMAZON-02)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 143.204.214.76 16509 (AMAZON-02)
1 143.204.214.111 16509 (AMAZON-02)
2 143.204.214.103 16509 (AMAZON-02)
69 23
Domain Requested by
32 resources.cybsafe.com resources.cybsafe.com
5 fonts.gstatic.com resources.cybsafe.com
4 i1.wp.com resources.cybsafe.com
3 js.intercomcdn.com js.intercomcdn.com
3 px.ads.linkedin.com 2 redirects resources.cybsafe.com
3 fonts.googleapis.com resources.cybsafe.com
2 static.intercomassets.com
2 www.google-analytics.com 1 redirects www.googletagmanager.com
2 js.hs-scripts.com resources.cybsafe.com
1 api-iam.intercom.io js.intercomcdn.com
1 track.hubspot.com
1 widget.intercom.io 1 redirects
1 api.getdrip.com tag.getdrip.com
1 forms.hubspot.com js.hscollectedforms.net
1 stats.g.doubleclick.net resources.cybsafe.com
1 pixel.wp.com resources.cybsafe.com
1 www.linkedin.com 1 redirects
1 js.hs-analytics.net js.hs-scripts.com
1 js.hscollectedforms.net js.hs-scripts.com
1 tag.getdrip.com resources.cybsafe.com
1 snap.licdn.com resources.cybsafe.com
1 stats.wp.com resources.cybsafe.com
1 s0.wp.com resources.cybsafe.com
1 www.googletagmanager.com resources.cybsafe.com
1 i2.wp.com resources.cybsafe.com
1 i0.wp.com resources.cybsafe.com
1 maxcdn.bootstrapcdn.com resources.cybsafe.com
1 et1.getsidekick.com 1 redirects
1 t.sidekickopen75.com 1 redirects
69 29
Subject Issuer Validity Valid
*.cybsafe.com
Amazon
2018-08-26 -
2019-09-26
a year crt.sh
*.googleapis.com
Google Internet Authority G3
2018-11-27 -
2019-02-19
3 months crt.sh
*.bootstrapcdn.com
COMODO RSA Domain Validation Secure Server CA
2018-10-03 -
2019-10-12
a year crt.sh
ssl817718.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-09-25 -
2019-04-03
6 months crt.sh
*.wp.com
Go Daddy Secure Certificate Authority - G2
2018-04-10 -
2020-05-11
2 years crt.sh
*.google-analytics.com
Google Internet Authority G3
2018-11-27 -
2019-02-19
3 months crt.sh
*.google.com
Google Internet Authority G3
2018-11-27 -
2019-02-19
3 months crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2016-02-16 -
2019-04-17
3 years crt.sh
*.getdrip.com
Go Daddy Secure Certificate Authority - G2
2017-04-16 -
2019-05-16
2 years crt.sh
ssl803673.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-07-11 -
2019-01-17
6 months crt.sh
ssl803670.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-07-11 -
2019-01-17
6 months crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2017-06-06 -
2019-06-11
2 years crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2018-11-07 -
2019-01-30
3 months crt.sh
hubspot.com
CloudFlare Inc ECC CA-2
2018-09-28 -
2019-09-28
a year crt.sh
*.intercomcdn.com
Amazon
2018-05-25 -
2019-06-25
a year crt.sh
*.intercom.com
Amazon
2018-07-09 -
2019-08-09
a year crt.sh
intercomassets.com
Amazon
2018-10-11 -
2019-11-11
a year crt.sh

This page contains 3 frames:

Primary Page: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Frame ID: 28896A7866CB311EEEACE2E8BDF4F782
Requests: 64 HTTP requests in this frame

Frame: https://js.intercomcdn.com/frame.82530c7f.js
Frame ID: A6D174A2D8ADBD1BA2AFE235D6DD4824
Requests: 2 HTTP requests in this frame

Frame: https://js.intercomcdn.com/fonts/proximanova-regular.a7942249.woff
Frame ID: D7D6DBD49D6065D259FBCA03371AA493
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://t.sidekickopen75.com/s1t/c/5/f18dQhb0S7lM8dDMPbW2n0x6l2B9nMJN7t5X-FfhMynW2z8P4K1q7rw8W56dCwh4mc6J... HTTP 301
    http://et1.getsidekick.com/s1t/c/5/f18dQhb0S7lM8dDMPbW2n0x6l2B9nMJN7t5X-FfhMynW2z8P4K1q7rw8W56dCwh4mc6J... HTTP 307
    https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i
  • html /<link[^>]+s\d+\.wp\.com/i
  • script /\/wp-includes\//i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i
  • html /<link[^>]+s\d+\.wp\.com/i
  • script /\/wp-includes\//i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+font-awesome(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • env /^google_tag_manager$/i

Overall confidence: 100%
Detected patterns
  • env /^(?:_hsq|hubspot)$/i

Overall confidence: 100%
Detected patterns
  • env /^Intercom$/i

Overall confidence: 100%
Detected patterns
  • env /^twemoji$/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js/i
  • env /^jQuery$/i

Overall confidence: 100%
Detected patterns
  • env /^_paq$/i

Page Statistics

69
Requests

100 %
HTTPS

56 %
IPv6

20
Domains

29
Subdomains

23
IPs

3
Countries

1322 kB
Transfer

5489 kB
Size

4
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://t.sidekickopen75.com/s1t/c/5/f18dQhb0S7lM8dDMPbW2n0x6l2B9nMJN7t5X-FfhMynW2z8P4K1q7rw8W56dCwh4mc6JF102?t=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F&si=7000000002083499&pi=00504b52a5046be407411e39556ee355 HTTP 301
    http://et1.getsidekick.com/s1t/c/5/f18dQhb0S7lM8dDMPbW2n0x6l2B9nMJN7t5X-FfhMynW2z8P4K1q7rw8W56dCwh4mc6JF102?t=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F&si=7000000002083499&pi=00504b52a5046be407411e39556ee355 HTTP 307
    https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 52
  • https://px.ads.linkedin.com/collect/?time=1544439855911&pid=524089%2C116505&url=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F&fmt=js&s=1 HTTP 302
  • https://px.ads.linkedin.com/collect/?time=1544439855911&pid=524089%2C116505&url=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F&fmt=js&s=1&cookiesTest=true HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%2F%3Ftime%3D1544439855911%26pid%3D524089%252C116505%26url%3Dhttps%253A%252F%252Fresources.cybsafe.com%252Fhow-are-phishing-attacks-used-in-identity-theft%252F%26fmt%3Djs%26s%3D1%26cookiesTest%3Dtrue%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect/?time=1544439855911&pid=524089%2C116505&url=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F&fmt=js&s=1&cookiesTest=true&liSync=true
Request Chain 54
  • https://www.google-analytics.com/r/collect?v=1&_v=j72&a=403846728&t=pageview&_s=1&dl=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F&ul=en-us&de=UTF-8&dt=How%20are%20phishing%20attacks%20used%20in%20identity%20theft%3F&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IEBAAUAB~&jid=208293648&gjid=141016742&cid=85625382.1544439856&tid=UA-77783374-1&_gid=407084115.1544439856&_r=1&gtm=2oubc0&z=179083158 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-77783374-1&cid=85625382.1544439856&jid=208293648&_gid=407084115.1544439856&gjid=141016742&_v=j72&z=179083158
Request Chain 60
  • https://widget.intercom.io/widget/ya7brvp1 HTTP 302
  • https://js.intercomcdn.com/shim.latest.js

69 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Redirect Chain
  • https://t.sidekickopen75.com/s1t/c/5/f18dQhb0S7lM8dDMPbW2n0x6l2B9nMJN7t5X-FfhMynW2z8P4K1q7rw8W56dCwh4mc6JF102?t=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft...
  • http://et1.getsidekick.com/s1t/c/5/f18dQhb0S7lM8dDMPbW2n0x6l2B9nMJN7t5X-FfhMynW2z8P4K1q7rw8W56dCwh4mc6JF102?t=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2...
  • https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
84 KB
19 KB
Document
General
Full URL
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache / PHP/7.0.18
Resource Hash
02ec972eaff5bd3b06a8e4bb0b621f9600a2ee8524089ddddb74a2ba5f055037
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:method
GET
:authority
resources.cybsafe.com
:scheme
https
:path
/how-are-phishing-attacks-used-in-identity-theft/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Mon, 10 Dec 2018 11:04:15 GMT
content-type
text/html; charset=UTF-8
content-length
18652
server
Apache
x-powered-by
PHP/7.0.18
x-pingback
https://resources.cybsafe.com/xmlrpc.php
link
<https://resources.cybsafe.com/wp-json/>; rel="https://api.w.org/", <https://wp.me/p9dDRs-Jb>; rel=shortlink
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
x-mod-pagespeed
1.9.32.14-0
content-encoding
gzip
cache-control
max-age=0, no-cache

Redirect headers

Date
Mon, 10 Dec 2018 11:04:14 GMT
Content-Type
img/png
Content-Length
0
Connection
keep-alive
Set-Cookie
__cfduid=d8fdf7854991af77aef91cbef75244c4d1544439854; expires=Tue, 10-Dec-19 11:04:14 GMT; path=/; domain=.getsidekick.com; HttpOnly _hetc=13ace7b1-5a16-4255-805c-e7506ff859d2|1544439854508|ACOD57cwLAIUEtd9WNhogJNI28Auwnw0Kol0UgECFHyt4dvfbk/pmSZlJ9Fr8lSbpZq5;Version=1;Comment=;Domain=et1.getsidekick.com;Path=/;Max-Age=31536000
Access-Control-Allow-Credentials
false
Link
<https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/>; rel="canonical"
Location
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Referrer-Policy
no-referrer
X-Robots-Tag
none
X-Trace
2B6739A6B4EF63190305F70730B596DF77473ADAE8000000000000000000
Server
cloudflare
CF-RAY
486f3ac237a99762-FRA
style.min.css
resources.cybsafe.com/wp-content/plugins/wpupper-share-buttons/assets/stylesheets/
73 KB
9 KB
Stylesheet
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/wpupper-share-buttons/assets/stylesheets/style.min.css?ver=1533901131
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
73292a6d08b95d6326f6ff78f0d4b66abc571d0c76067278f239dd4c3ca26912
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/wpupper-share-buttons/assets/stylesheets/style.min.css?ver=1533901131
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Fri, 10 Aug 2018 11:38:51 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"12526-57313301378a6-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
8776
css
fonts.googleapis.com/
5 KB
771 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans:400,700
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:809::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
b3dd58a587d33c5200140cee13c1332ac4d7f59b2551d3a8b841738616e54eee
Security Headers
Name Value
Strict-Transport-Security max-age=604800
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=604800
content-encoding
gzip
last-modified
Mon, 10 Dec 2018 11:04:15 GMT
server
ESF
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
status
200
date
Mon, 10 Dec 2018 11:04:15 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
x-xss-protection
1; mode=block
expires
Mon, 10 Dec 2018 11:04:15 GMT
style.css
resources.cybsafe.com/wp-content/plugins/monarch/css/
113 KB
13 KB
Stylesheet
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/monarch/css/style.css?ver=1.3.20
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
f820d93daf383e178bda2912f5bee00e90e56390597820622643fa8e5e487143
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/monarch/css/style.css?ver=1.3.20
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Thu, 05 Oct 2017 09:30:30 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"1c56d-55ac960176146-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
12734
dashicons.min.css
resources.cybsafe.com/wp-includes/css/
45 KB
28 KB
Stylesheet
General
Full URL
https://resources.cybsafe.com/wp-includes/css/dashicons.min.css?ver=4.9.8
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
d0df2ff25fded9e43a0cfa5159393d4482725bfb390e8ca94f34da85b5304117
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-includes/css/dashicons.min.css?ver=4.9.8
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Fri, 24 Nov 2017 17:01:31 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"b518-55ebd811d4e26-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
28645
style.css
resources.cybsafe.com/wp-content/themes/Divi/
410 KB
51 KB
Stylesheet
General
Full URL
https://resources.cybsafe.com/wp-content/themes/Divi/style.css?ver=3.0.71
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
47974c0ad0fcd40b14f358d09f8f4101aa08b379ee14ed72d3f4d9bf9d9aa1d7
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/themes/Divi/style.css?ver=3.0.71
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Fri, 01 Sep 2017 14:36:42 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"66603-55821b08e5c36-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
52022
social-icons.css
resources.cybsafe.com/wp-content/plugins/jetpack/modules/widgets/social-icons/
1 KB
774 B
Stylesheet
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/jetpack/modules/widgets/social-icons/social-icons.css?ver=20170506
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
4d2fef3f0344b569191b52074050dad75bbd9e0d25534490e2d9f92330048b10
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/jetpack/modules/widgets/social-icons/social-icons.css?ver=20170506
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Tue, 11 Sep 2018 08:46:31 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"579-5759482a67f86-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
563
general_foundicons.css
resources.cybsafe.com/wp-content/plugins/buttons-shortcode-and-widget/include/otw_components/otw_shortcode/css/
3 KB
941 B
Stylesheet
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/buttons-shortcode-and-widget/include/otw_components/otw_shortcode/css/general_foundicons.css?ver=4.9.8
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
23cd1a1f5a25a43d06063f6b12c5c364fe94bca0cf2261ade2a84d064d8b6be2
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/buttons-shortcode-and-widget/include/otw_components/otw_shortcode/css/general_foundicons.css?ver=4.9.8
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Fri, 25 May 2018 08:35:17 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"d41-56d03a5d1db66-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
730
social_foundicons.css
resources.cybsafe.com/wp-content/plugins/buttons-shortcode-and-widget/include/otw_components/otw_shortcode/css/
2 KB
844 B
Stylesheet
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/buttons-shortcode-and-widget/include/otw_components/otw_shortcode/css/social_foundicons.css?ver=4.9.8
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
cf7199ce1394d349212173ef3e0b404d98d03949f1391dc3dc97b03ea415696b
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/buttons-shortcode-and-widget/include/otw_components/otw_shortcode/css/social_foundicons.css?ver=4.9.8
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Fri, 25 May 2018 08:35:17 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"9c7-56d03a5d1db66-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
633
otw_shortcode.css
resources.cybsafe.com/wp-content/plugins/buttons-shortcode-and-widget/include/otw_components/otw_shortcode/css/
63 KB
10 KB
Stylesheet
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/buttons-shortcode-and-widget/include/otw_components/otw_shortcode/css/otw_shortcode.css?ver=4.9.8
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
74f8c5b45107d800cb37a7a1c857c8d55a17cf92a2deddd3adc78fcec24c5a4c
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/buttons-shortcode-and-widget/include/otw_components/otw_shortcode/css/otw_shortcode.css?ver=4.9.8
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Fri, 25 May 2018 08:35:17 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"fc7c-56d03a5d1db66-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
10264
jetpack.css
resources.cybsafe.com/wp-content/plugins/jetpack/css/
66 KB
12 KB
Stylesheet
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/jetpack/css/jetpack.css?ver=6.5
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
1ffb14cf85d0e0fb2e652cd0d7d812bbbf82e7852540c4606f913a97f733260d
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/jetpack/css/jetpack.css?ver=6.5
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Tue, 11 Sep 2018 08:46:31 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"10948-5759482a73b06-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
12051
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/
23 KB
6 KB
Stylesheet
General
Full URL
https://maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css?ver=4.3.0
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
209.197.3.15 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
vip0x00f.map2.ssl.hwcdn.net
Software
/
Resource Hash
541ac58217a8ade1a5e292a65a0661dc9db7a49ae13654943817a4fbc6761afd

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Fri, 07 Dec 2018 23:36:43 GMT
status
200
etag
"1544225803"
vary
Accept-Encoding
x-cache
HIT
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-hello-human
Say hello back! @getBootstrapCDN on Twitter
accept-ranges
bytes
timing-allow-origin
*
content-length
5442
css
fonts.googleapis.com/
7 KB
787 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans%3A400%2C300%2C700&ver=4.9.8
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:809::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
6e61f09047d771ab9d8a4b153c4e592e3cd0c0cddd674bc5abb50e5b88747303
Security Headers
Name Value
Strict-Transport-Security max-age=604800
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=604800
content-encoding
gzip
last-modified
Mon, 10 Dec 2018 11:04:15 GMT
server
ESF
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
status
200
date
Mon, 10 Dec 2018 11:04:15 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
x-xss-protection
1; mode=block
expires
Mon, 10 Dec 2018 11:04:15 GMT
mb-button.css
resources.cybsafe.com/wp-content/plugins/mango-buttons/public/style/
10 KB
2 KB
Stylesheet
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/mango-buttons/public/style/mb-button.css?ver=1.2.9
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
5190a9752c2dfbe2d702965f3d30c8d8ea97dd51eede8c03d73a6b41194bbc1f
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/mango-buttons/public/style/mb-button.css?ver=1.2.9
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Mon, 08 Jan 2018 10:15:42 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"26ba-5624114adcee6-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
accept-ranges
bytes
content-length
1342
jquery.js
resources.cybsafe.com/wp-includes/js/jquery/
95 KB
33 KB
Script
General
Full URL
https://resources.cybsafe.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
fc48d1d80ece71a79a7b39877f4104d49d3da6c3665cf6dc203000fb7df4447e
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-includes/js/jquery/jquery.js?ver=1.12.4
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Mon, 23 May 2016 09:00:29 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"17ba0-5337eac0d4540-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
33766
jquery-migrate.min.js
resources.cybsafe.com/wp-includes/js/jquery/
10 KB
4 KB
Script
General
Full URL
https://resources.cybsafe.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
48eb8b500ae6a38617b5738d2b3faec481922a7782246e31d2755c034a45cd5d
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Fri, 20 May 2016 06:11:28 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"2748-5333ff613c400-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
4014
related-posts.min.js
resources.cybsafe.com/wp-content/plugins/jetpack/_inc/build/related-posts/
5 KB
2 KB
Script
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/jetpack/_inc/build/related-posts/related-posts.min.js?ver=20150408
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
dbaff56b0c1e18b645e106606b7391dbe2d7fa3d569bd5368898ba22ae81a66e
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/jetpack/_inc/build/related-posts/related-posts.min.js?ver=20150408
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Tue, 11 Sep 2018 08:46:31 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"1268-5759482a7a866-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
1656
front.js
resources.cybsafe.com/wp-content/plugins/maxbuttons/js/min/
0
169 B
Script
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/maxbuttons/js/min/front.js?ver=7.4.1
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/maxbuttons/js/min/front.js?ver=7.4.1
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
last-modified
Fri, 31 Aug 2018 12:35:09 GMT
server
Apache
etag
"0-574ba6c0e4bc6"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
0
4820846.js
js.hs-scripts.com/
1 KB
640 B
Script
General
Full URL
https://js.hs-scripts.com/4820846.js
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:d5cc , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f8eb420ded56c3b22ffe2c42f2b7f1700897b0fb85ab3637d2849a8ca6377366

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
status
200
cf-cache-status
EXPIRED
server
cloudflare
x-trace
2B5BCEFBB909EF81EDF53F7A53920DBF205B8F5974000000000000000000
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding, User-Agent
content-type
application/javascript; charset=utf-8
access-control-allow-origin
https://resources.cybsafe.com
access-control-max-age
3600
cache-control
public, max-age=60
access-control-allow-credentials
true
cf-ray
486f3ac8088c6415-FRA
expires
Mon, 10 Dec 2018 11:05:15 GMT
rc_logo_fin.png
resources.cybsafe.com/wp-content/uploads/2017/10/
23 KB
23 KB
Image
General
Full URL
https://resources.cybsafe.com/wp-content/uploads/2017/10/rc_logo_fin.png
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
2c12280a036d71d8df4287b012ec256c70f45b074975c12b763dc8731d6f579d
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/uploads/2017/10/rc_logo_fin.png
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
last-modified
Mon, 16 Oct 2017 07:25:32 GMT
server
Apache
etag
"5cc3-55ba4e96fa166"
x-frame-options
SAMEORIGIN
content-type
image/png
status
200
accept-ranges
bytes
content-length
23747
CYBSAFE-blog_images29-181122-JH.png
i1.wp.com/resources.cybsafe.com/wp-content/uploads/2018/11/
26 KB
26 KB
Image
General
Full URL
https://i1.wp.com/resources.cybsafe.com/wp-content/uploads/2018/11/CYBSAFE-blog_images29-181122-JH.png?resize=1080%2C629&ssl=1
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.2 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
i1.wp.com
Software
nginx /
Resource Hash
7fc7e005b7722feed7bb0c7efc3a340122e21721ddea0acad8425426adeddbd4
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 20
date
Mon, 10 Dec 2018 11:04:17 GMT
x-content-type-options
nosniff
x-bytes-saved
105264
last-modified
Mon, 10 Dec 2018 11:04:17 GMT
server
nginx
etag
"88c4889e0d984e52"
vary
Accept
content-type
image/webp
status
200
cache-control
public, max-age=63115200
link
<https://resources.cybsafe.com/wp-content/uploads/2018/11/CYBSAFE-blog_images29-181122-JH.png>; rel="canonical"
content-length
26320
expires
Wed, 09 Dec 2020 23:04:17 GMT
mail-04.png
i0.wp.com/resources.cybsafe.com/wp-content/uploads/2017/09/
4 KB
4 KB
Image
General
Full URL
https://i0.wp.com/resources.cybsafe.com/wp-content/uploads/2017/09/mail-04.png?resize=300%2C87&ssl=1
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.2 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
i1.wp.com
Software
nginx /
Resource Hash
a538c66efb556d040581a511a35e3aa213f96587c762d658e247344c4710e5b0
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 17
date
Mon, 10 Dec 2018 11:04:15 GMT
x-content-type-options
nosniff
x-bytes-saved
2761
last-modified
Thu, 06 Dec 2018 03:09:46 GMT
server
nginx
etag
"c79e2b322a5e1225"
vary
Accept
content-type
image/webp
status
200
cache-control
public, max-age=63115200
link
<https://resources.cybsafe.com/wp-content/uploads/2017/09/mail-04.png>; rel="canonical"
content-length
3672
expires
Sat, 05 Dec 2020 15:09:46 GMT
resources-14-2-14.png
i2.wp.com/resources.cybsafe.com/wp-content/uploads/2017/10/
3 KB
3 KB
Image
General
Full URL
https://i2.wp.com/resources.cybsafe.com/wp-content/uploads/2017/10/resources-14-2-14.png?resize=300%2C93&ssl=1
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.2 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
i1.wp.com
Software
nginx /
Resource Hash
103827be77be3c02485d6ebf6097a8b39aca4cd6d9e7438aa641411040fc30d6
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 20
date
Mon, 10 Dec 2018 11:04:15 GMT
x-content-type-options
nosniff
x-bytes-saved
1583
last-modified
Thu, 06 Dec 2018 03:09:46 GMT
server
nginx
etag
"321b0f3ba5ba5a85"
vary
Accept
content-type
image/webp
status
200
cache-control
public, max-age=63115200
link
<https://resources.cybsafe.com/wp-content/uploads/2017/10/resources-14-2-14.png>; rel="canonical"
content-length
2564
expires
Sat, 05 Dec 2020 15:09:46 GMT
wp-emoji-release.min.js
resources.cybsafe.com/wp-includes/js/
12 KB
5 KB
Script
General
Full URL
https://resources.cybsafe.com/wp-includes/js/wp-emoji-release.min.js?ver=4.9.8
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
d2458b9fd9089fdcb9de317093e004ef3a65597dc68b9adfdeb15a7c9968d0d5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-includes/js/wp-emoji-release.min.js?ver=4.9.8
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 03 Aug 2018 02:24:09 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"2efa-5727e9f660dc6-gzip-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
4382
expires
Mon, 10 Dec 2018 11:12:22 GMT
js
www.googletagmanager.com/gtag/
87 KB
32 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-77783374-1
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:809::2008 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager (scaffolding) /
Resource Hash
464a1dc7a31862c5f6479be9129b5c949735ebefff56cf07ba4835990806a284
Security Headers
Name Value
X-Xss-Protection 1; mode=block

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
server
Google Tag Manager (scaffolding)
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
32166
x-xss-protection
1; mode=block
expires
Mon, 10 Dec 2018 11:04:15 GMT
so-css-Divi.css
resources.cybsafe.com/wp-content/uploads/so-css/
4 KB
1 KB
Stylesheet
General
Full URL
https://resources.cybsafe.com/wp-content/uploads/so-css/so-css-Divi.css?ver=1528196914
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
85d7249807c6aae30e2673cc54f9387418402bc37ad85f2c6988ebfecf54e049
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/uploads/so-css/so-css-Divi.css?ver=1528196914
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 05 Jun 2018 11:08:34 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"f45-56de31237cfa6-gzip-gzip"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
1174
expires
Mon, 10 Dec 2018 11:12:22 GMT
css
fonts.googleapis.com/
7 KB
710 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Raleway:400,100,200,300,600,500,700,800,900&subset=latin,latin-ext
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:809::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
4be65ebb215cb59d7d8b75767f0a8a616a14a7973d2bfee669103d6581b0d445
Security Headers
Name Value
Strict-Transport-Security max-age=604800
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=604800
content-encoding
gzip
last-modified
Mon, 10 Dec 2018 11:04:15 GMT
server
ESF
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
status
200
date
Mon, 10 Dec 2018 11:04:15 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
x-xss-protection
1; mode=block
expires
Mon, 10 Dec 2018 11:04:15 GMT
photon.min.js
resources.cybsafe.com/wp-content/plugins/jetpack/_inc/build/photon/
580 B
577 B
Script
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/jetpack/_inc/build/photon/photon.min.js?ver=20130122
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
f5fa487416676288b5e92b1530f85fbc61d2875f4a74926affa77be11223cfe9
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/jetpack/_inc/build/photon/photon.min.js?ver=20130122
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Tue, 11 Sep 2018 08:46:31 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"244-5759482a78926-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
356
hlst-extend.min.js
resources.cybsafe.com/wp-content/plugins/highlight-search-terms/
6 KB
3 KB
Script
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/highlight-search-terms/hlst-extend.min.js?ver=1.5
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
8bdb5b9f57298554614d08ee7dd38bf9ff450ce2b78237b31eed38e4b8021538
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/highlight-search-terms/hlst-extend.min.js?ver=1.5
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
last-modified
Sun, 18 Mar 2018 10:14:18 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"16d4-567ad1ab344c6-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
2729
devicepx-jetpack.js
s0.wp.com/wp-content/js/
10 KB
3 KB
Script
General
Full URL
https://s0.wp.com/wp-content/js/devicepx-jetpack.js?ver=201850
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
f32d41f2099a0be20e6b57c5e0d1b71c079d3e1345827b0f5c5b97c6e5e3f78d

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
HIT fra 32
date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
server
nginx
etag
W/"5841a56f-52b6"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Mon, 09 Dec 2019 05:10:17 GMT
built.js
resources.cybsafe.com/wp-content/plugins/wpupper-share-buttons/assets/javascripts/front/
15 KB
5 KB
Script
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/wpupper-share-buttons/assets/javascripts/front/built.js?ver=3.37.0
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
1f876d121cf9ca8ecab583297da703fd9bee01daeaeadf241a19989001d0a665
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/wpupper-share-buttons/assets/javascripts/front/built.js?ver=3.37.0
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 10 Aug 2018 11:37:47 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"3a1d-573132c39d086-gzip-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
4670
expires
Mon, 10 Dec 2018 11:12:22 GMT
idle-timer.min.js
resources.cybsafe.com/wp-content/plugins/monarch/js/
2 KB
1 KB
Script
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/monarch/js/idle-timer.min.js?ver=1.3.20
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
92c35f839d90ea55730d05ce3ea859cb598cd85eb20be3ed55621bb8baa3aa36
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/monarch/js/idle-timer.min.js?ver=1.3.20
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 05 Oct 2017 09:30:30 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"9d6-55ac960176146-gzip-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
966
expires
Mon, 10 Dec 2018 11:12:22 GMT
custom.js
resources.cybsafe.com/wp-content/plugins/monarch/js/
26 KB
6 KB
Script
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/monarch/js/custom.js?ver=1.3.20
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
3a923c50c91e0fb7b1ff0b2806fa088087b441339c15fda5747dcde2eb4ae112
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/monarch/js/custom.js?ver=1.3.20
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 05 Oct 2017 09:30:30 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"6703-55ac960176146-gzip-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
5472
expires
Mon, 10 Dec 2018 11:12:22 GMT
4820846.js
js.hs-scripts.com/
875 B
931 B
Script
General
Full URL
https://js.hs-scripts.com/4820846.js?integration=wordpress&ver=4.9.8
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:d5cc , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4a3ab950cdf2ad290c05a4ea7b4c98bdac69d780cc79030390d653be5cf56c22

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
vary
Accept-Encoding, User-Agent
cf-cache-status
UPDATING
cf-polished
origSize=1072
status
200
cf-bgj
minify
server
cloudflare
x-trace
2B4A7346F7710761FEDD7DDF3890364FE5C4244556000000000000000000
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
content-type
application/javascript; charset=utf-8
access-control-allow-origin
https://www.cybsafe.com
cache-control
public, max-age=60
access-control-allow-credentials
true
cf-ray
486f3ac9c9626415-FRA
expires
Mon, 10 Dec 2018 11:05:15 GMT
comment-reply.min.js
resources.cybsafe.com/wp-includes/js/
1 KB
888 B
Script
General
Full URL
https://resources.cybsafe.com/wp-includes/js/comment-reply.min.js?ver=4.9.8
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
1b1ca0f15010e0124bd4ca481404643c88f7eda1b276e9554d0ed83fb45b7e30
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-includes/js/comment-reply.min.js?ver=4.9.8
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 18 Nov 2015 19:15:28 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"436-524d577143400-gzip-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
589
expires
Mon, 10 Dec 2018 11:12:22 GMT
custom.min.js
resources.cybsafe.com/wp-content/themes/Divi/js/
226 KB
55 KB
Script
General
Full URL
https://resources.cybsafe.com/wp-content/themes/Divi/js/custom.min.js?ver=3.0.71
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
97d641678c640b01b1a1e944a64a9b1833c34752ad49278d8ffea9f4d52c0a27
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/themes/Divi/js/custom.min.js?ver=3.0.71
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 01 Sep 2017 14:36:42 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"389a4-55821b08e5c36-gzip-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
55612
expires
Mon, 10 Dec 2018 11:12:22 GMT
new-tab.min.js
resources.cybsafe.com/wp-content/plugins/page-links-to/js/
3 KB
2 KB
Script
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/page-links-to/js/new-tab.min.js?ver=3.0.0-beta.1
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
fc43c24316a9e6fac93f395ab6c413e6d8c33d42969ac23a1d04bd94e1ff1fc6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/page-links-to/js/new-tab.min.js?ver=3.0.0-beta.1
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 03 Aug 2018 07:31:05 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"c77-57282e911f5c6-gzip-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
1941
expires
Mon, 10 Dec 2018 11:12:22 GMT
wp-embed.min.js
resources.cybsafe.com/wp-includes/js/
1 KB
1 KB
Script
General
Full URL
https://resources.cybsafe.com/wp-includes/js/wp-embed.min.js?ver=4.9.8
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
dcb5e540e62fc85857254a1066afb6a7e8999279c6d4c583eef855d39f9289c0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-includes/js/wp-embed.min.js?ver=4.9.8
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
:method
GET
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 23 Nov 2016 13:38:33 GMT
server
Apache
x-frame-options
SAMEORIGIN
etag
"576-541f8014be840-gzip-gzip"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
751
expires
Mon, 10 Dec 2018 11:12:22 GMT
e-201850.js
stats.wp.com/
8 KB
3 KB
Script
General
Full URL
https://stats.wp.com/e-201850.js
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
32055d9b971d8d2401fef1314f3ab521670dc4d913c65e27279aaa0b85f57e5e

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
content-encoding
gzip
server
nginx
etag
W/"5bfee306-331d"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
expires
Mon, 09 Dec 2019 05:10:17 GMT
modules.ttf
resources.cybsafe.com/wp-content/themes/Divi/core/admin/fonts/
81 KB
81 KB
Font
General
Full URL
https://resources.cybsafe.com/wp-content/themes/Divi/core/admin/fonts/modules.ttf
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
c683211e591f2048ec4a840586e4f849894c8a57c147f23d7b5652d61c1260e2
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/themes/Divi/core/admin/fonts/modules.ttf
pragma
no-cache
origin
https://resources.cybsafe.com
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/wp-content/themes/Divi/style.css?ver=3.0.71
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://resources.cybsafe.com/wp-content/themes/Divi/style.css?ver=3.0.71
Origin
https://resources.cybsafe.com

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
last-modified
Fri, 01 Sep 2017 14:36:42 GMT
server
Apache
etag
"143e8-55821b08e4c96"
x-frame-options
SAMEORIGIN
content-type
application/x-font-ttf
status
200
accept-ranges
bytes
content-length
82920
wpusb.woff2
resources.cybsafe.com/wp-content/plugins/wpupper-share-buttons/assets/fonts/
18 KB
18 KB
Font
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/wpupper-share-buttons/assets/fonts/wpusb.woff2?wuny4d
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
7f89ce98ef32ac3fbd1ec1d22cf26c92e66f0f5189a2b3aaaf6428ac006df057
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/wpupper-share-buttons/assets/fonts/wpusb.woff2?wuny4d
pragma
no-cache
origin
https://resources.cybsafe.com
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/wp-content/plugins/wpupper-share-buttons/assets/stylesheets/style.min.css?ver=1533901131
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://resources.cybsafe.com/wp-content/plugins/wpupper-share-buttons/assets/stylesheets/style.min.css?ver=1533901131
Origin
https://resources.cybsafe.com

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
last-modified
Fri, 10 Aug 2018 11:37:47 GMT
server
Apache
etag
"46b0-573132c39e026"
x-frame-options
SAMEORIGIN
status
200
accept-ranges
bytes
content-length
18096
monarch.ttf
resources.cybsafe.com/wp-content/plugins/monarch/css/fonts/
15 KB
15 KB
Font
General
Full URL
https://resources.cybsafe.com/wp-content/plugins/monarch/css/fonts/monarch.ttf
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
8c102baea959329be23bb8a5d6bc268ce1668484995f0d23c2f88b46d7653c4f
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/wp-content/plugins/monarch/css/fonts/monarch.ttf
pragma
no-cache
origin
https://resources.cybsafe.com
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/wp-content/plugins/monarch/css/style.css?ver=1.3.20
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://resources.cybsafe.com/wp-content/plugins/monarch/css/style.css?ver=1.3.20
Origin
https://resources.cybsafe.com

Response headers

date
Mon, 10 Dec 2018 11:04:15 GMT
last-modified
Thu, 05 Oct 2017 09:30:30 GMT
server
Apache
etag
"3af8-55ac960176146"
x-frame-options
SAMEORIGIN
content-type
application/x-font-ttf
status
200
accept-ranges
bytes
content-length
15096
mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
fonts.gstatic.com/s/opensans/v15/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v15/mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:809::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8868d2a2f803ea6802d54a11564b5b96c7d8be56117a328c8f605539d6dee167
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:400,700
Origin
https://resources.cybsafe.com

Response headers

date
Fri, 07 Dec 2018 20:02:45 GMT
x-content-type-options
nosniff
last-modified
Wed, 11 Oct 2017 21:49:46 GMT
server
sffe
age
226890
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
8892
x-xss-protection
1; mode=block
expires
Sat, 07 Dec 2019 20:02:45 GMT
insight.min.js
snap.licdn.com/li.lms-analytics/
15 KB
5 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:28c::25ea , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
bc9cef10d07e8da3ce80181de07a056414731f86e0dc12e2c81d652b28ac770b

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 10 Dec 2018 11:04:15 GMT
Content-Encoding
gzip
Last-Modified
Mon, 03 Dec 2018 23:03:30 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=69422
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
4571
4648572.js
tag.getdrip.com/
656 KB
51 KB
Script
General
Full URL
https://tag.getdrip.com/4648572.js
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.21 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-21.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
bdbbd3a523cfe1cfe708f4393e46a8b858215c800e56be71d7bf53bba60622e0

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:17 GMT
content-encoding
gzip
last-modified
Mon, 10 Dec 2018 10:26:44 GMT
server
AmazonS3
vary
Accept-Encoding
x-cache
Miss from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
UmDpJJwd7f9zf37jgJSbqFCQXdhf62kEj_NKN_70kMdL-4Nr9wQjJg==
via
1.1 18e87eada05046c231b7f49230fa6dc4.cloudfront.net (CloudFront)
1Ptrg8zYS_SKggPNwN4rWqZPANqczVs.woff2
fonts.gstatic.com/s/raleway/v12/
13 KB
13 KB
Font
General
Full URL
https://fonts.gstatic.com/s/raleway/v12/1Ptrg8zYS_SKggPNwN4rWqZPANqczVs.woff2
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:809::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
daaf076296a2374b283696533335420e6807ce50944b1fa7bde29933de3823df
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Raleway:400,100,200,300,600,500,700,800,900&subset=latin,latin-ext
Origin
https://resources.cybsafe.com

Response headers

date
Wed, 14 Nov 2018 13:33:25 GMT
x-content-type-options
nosniff
last-modified
Wed, 11 Oct 2017 18:26:25 GMT
server
sffe
age
2237450
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
13540
x-xss-protection
1; mode=block
expires
Thu, 14 Nov 2019 13:33:25 GMT
1Ptrg8zYS_SKggPNwJYtWqZPANqczVs.woff2
fonts.gstatic.com/s/raleway/v12/
13 KB
13 KB
Font
General
Full URL
https://fonts.gstatic.com/s/raleway/v12/1Ptrg8zYS_SKggPNwJYtWqZPANqczVs.woff2
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:809::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
b9eb54a7bc036b92da19d3f8253113bb2f9c2c5405939b50bac3444e5e21f369
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Raleway:400,100,200,300,600,500,700,800,900&subset=latin,latin-ext
Origin
https://resources.cybsafe.com

Response headers

date
Thu, 06 Dec 2018 09:04:48 GMT
x-content-type-options
nosniff
last-modified
Wed, 11 Oct 2017 18:26:12 GMT
server
sffe
age
352767
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
13016
x-xss-protection
1; mode=block
expires
Fri, 06 Dec 2019 09:04:48 GMT
1Ptug8zYS_SKggPNyC0IT4ttDfA.woff2
fonts.gstatic.com/s/raleway/v12/
13 KB
13 KB
Font
General
Full URL
https://fonts.gstatic.com/s/raleway/v12/1Ptug8zYS_SKggPNyC0IT4ttDfA.woff2
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:809::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
1c21dd409e977f176ae963b5510fbdd57669e9861fff9f5d9a46b6fc73f430fa
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Raleway:400,100,200,300,600,500,700,800,900&subset=latin,latin-ext
Origin
https://resources.cybsafe.com

Response headers

date
Tue, 04 Dec 2018 16:29:33 GMT
x-content-type-options
nosniff
last-modified
Wed, 11 Oct 2017 18:25:45 GMT
server
sffe
age
498882
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
13160
x-xss-protection
1; mode=block
expires
Wed, 04 Dec 2019 16:29:33 GMT
1Ptrg8zYS_SKggPNwPIsWqZPANqczVs.woff2
fonts.gstatic.com/s/raleway/v12/
13 KB
13 KB
Font
General
Full URL
https://fonts.gstatic.com/s/raleway/v12/1Ptrg8zYS_SKggPNwPIsWqZPANqczVs.woff2
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:809::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8358a5e5f6c29621587eb76c3cb54d39b08ac821898865e57166ff8fe4fac21f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Raleway:400,100,200,300,600,500,700,800,900&subset=latin,latin-ext
Origin
https://resources.cybsafe.com

Response headers

date
Fri, 07 Dec 2018 20:02:44 GMT
x-content-type-options
nosniff
last-modified
Wed, 11 Oct 2017 18:26:23 GMT
server
sffe
age
226891
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
13196
x-xss-protection
1; mode=block
expires
Sat, 07 Dec 2019 20:02:44 GMT
collectedforms.js
js.hscollectedforms.net/
47 KB
14 KB
Script
General
Full URL
https://js.hscollectedforms.net/collectedforms.js
Requested by
Host: js.hs-scripts.com
URL: https://js.hs-scripts.com/4820846.js?integration=wordpress&ver=4.9.8
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:7fab , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
da2b5b599f36dfcced5c034f193747d7d68f79c4884260d22b60b09d4dcd62cc

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Origin
https://resources.cybsafe.com

Response headers

date
Mon, 10 Dec 2018 11:04:16 GMT
via
1.1 a0dce0e49d06dce2c392604440772209.cloudfront.net (CloudFront)
vary
Accept-Encoding,Origin,Access-Control-Request-Headers,Access-Control-Request-Method
cf-cache-status
MISS
cf-ray
486f3acaffe56409-FRA
x-cache
Miss from cloudfront
status
200
x-amz-replication-status
COMPLETED
content-encoding
gzip
last-modified
Wed, 31 Oct 2018 10:22:51 GMT
server
cloudflare
etag
W/"42c74905d123052b1fd87bb54ccc57d4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3000
access-control-allow-methods
GET
x-amz-version-id
uXkKm7w5e4ROzXXT4aooZ.v9DiWoJX9M
access-control-allow-origin
*
cache-control
max-age=600
content-type
application/javascript; charset=utf-8
x-amz-cf-id
-5Of2WifP8_HcCrPzyc3SkxuWzGDoSEMHh61ZBM1K0U1BEy7PG_Drg==
4820846.js
js.hs-analytics.net/analytics/1544377500000/
72 KB
25 KB
Script
General
Full URL
https://js.hs-analytics.net/analytics/1544377500000/4820846.js
Requested by
Host: js.hs-scripts.com
URL: https://js.hs-scripts.com/4820846.js?integration=wordpress&ver=4.9.8
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:45b0 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e8f5e1a1bed56dda447cb4124062cd3ba22580c8053eded56985e72db1e512d1

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:16 GMT
content-encoding
gzip
cf-cache-status
MISS
x-amz-request-id
7BCEB0CF84C7A8AE
cf-ray
486f3acafd8396e8-FRA
status
200
content-length
24817
x-amz-id-2
lMaIo/vNCzLNjC2eD/2KKZ4gukfQdXq4sjX/+e2Hv4qjIEp7tI/6/rRls+Dl8i2Sh9izVdHq0Po=
last-modified
Fri, 07 Dec 2018 20:11:33 GMT
server
cloudflare
etag
W/"06e53fca05341be0f6bbb05444195976"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-amz-version-id
null
cache-control
max-age=300, public
access-control-allow-credentials
false
accept-ranges
bytes
content-type
text/javascript
expires
Mon, 10 Dec 2018 11:09:15 GMT
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-77783374-1
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:809::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
b688a3bcd1297cc0fe08e6e52fea14ba9108ee4b9a2052c03e7bac6e19347255
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 05 Nov 2018 21:10:09 GMT
server
Golfe2
age
3652
date
Mon, 10 Dec 2018 10:03:23 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
17404
expires
Mon, 10 Dec 2018 12:03:23 GMT
/
resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
2 KB
3 KB
XHR
General
Full URL
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/?relatedposts=1
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/wp-includes/js/jquery/jquery.js?ver=1.12.4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache / PHP/7.0.18
Resource Hash
63a59b10ef600a0248dcfb49ff0f3ab5a04781c35041da6d2363cbe818ea014c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

:path
/how-are-phishing-attacks-used-in-identity-theft/?relatedposts=1
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
application/json, text/javascript, */*; q=0.01
cache-control
no-cache
:authority
resources.cybsafe.com
x-requested-with
XMLHttpRequest
:scheme
https
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:method
GET
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:16 GMT
x-content-type-options
nosniff
server
Apache
x-frame-options
SAMEORIGIN
x-powered-by
PHP/7.0.18
x-pingback
https://resources.cybsafe.com/xmlrpc.php
content-type
application/json; charset=utf-8
status
200
/
px.ads.linkedin.com/collect/
Redirect Chain
  • https://px.ads.linkedin.com/collect/?time=1544439855911&pid=524089%2C116505&url=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F&fmt=js&s=1
  • https://px.ads.linkedin.com/collect/?time=1544439855911&pid=524089%2C116505&url=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F&fmt=js&s=1&cookiesTest=true
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%2F%3Ftime%3D1544439855911%26pid%3D524089%252C116505%26url%3Dhttps%253A%252F%252Fresources.cybsafe.com%252Fho...
  • https://px.ads.linkedin.com/collect/?time=1544439855911&pid=524089%2C116505&url=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F&fmt=js&s=1&cookiesTest=true&...
0
88 B
Script
General
Full URL
https://px.ads.linkedin.com/collect/?time=1544439855911&pid=524089%2C116505&url=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F&fmt=js&s=1&cookiesTest=true&liSync=true
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:109:c00c:104::b93f:9005 , United States, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:16 GMT
content-encoding
gzip
server
Play
vary
Accept-Encoding
x-li-fabric
prod-lor1
status
200
x-li-proto
http/2
x-li-pop
prod-tln1
content-type
application/javascript
content-length
20
x-li-uuid
R/Eq493zbhXAfdB8ZysAAA==

Redirect headers

date
Mon, 10 Dec 2018 11:04:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
302
vary
Accept-Encoding
content-length
20
x-li-uuid
lor+193zbhVg9EbPASsAAA==
server
Play
pragma
no-cache
x-li-pop
prod-efr5
x-frame-options
sameorigin
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
strict-transport-security
max-age=2592000
x-li-fabric
prod-lor1
location
https://px.ads.linkedin.com/collect/?time=1544439855911&pid=524089%2C116505&url=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F&fmt=js&s=1&cookiesTest=true&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
g.gif
pixel.wp.com/
50 B
74 B
Image
General
Full URL
https://pixel.wp.com/g.gif?v=ext&j=1%3A6.5&blog=136238518&post=2801&tz=0&srv=resources.cybsafe.com&host=resources.cybsafe.com&ref=&rand=0.0031761648644612617
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
f3a8992acb9ab911e0fa4ae12f4b85ef8e61008619f13ee51c7a121ff87f63b1

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Mon, 10 Dec 2018 11:04:15 GMT
cache-control
no-cache
server
nginx
content-length
50
content-type
image/gif
collect
stats.g.doubleclick.net/r/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j72&a=403846728&t=pageview&_s=1&dl=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F&ul=en-us&de=UTF-8&dt=Ho...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-77783374-1&cid=85625382.1544439856&jid=208293648&_gid=407084115.1544439856&gjid=141016742&_v=j72&z=179083158
35 B
102 B
Image
General
Full URL
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-77783374-1&cid=85625382.1544439856&jid=208293648&_gid=407084115.1544439856&gjid=141016742&_v=j72&z=179083158
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:400c:c0c::9d , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Mon, 10 Dec 2018 11:04:15 GMT
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 10 Dec 2018 11:04:15 GMT
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
302
location
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-77783374-1&cid=85625382.1544439856&jid=208293648&_gid=407084115.1544439856&gjid=141016742&_v=j72&z=179083158
content-type
text/html; charset=UTF-8
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
414
expires
Fri, 01 Jan 1990 00:00:00 GMT
json
forms.hubspot.com/collected-forms/v1/config/
115 B
632 B
XHR
General
Full URL
https://forms.hubspot.com/collected-forms/v1/config/json?portalId=4820846
Requested by
Host: js.hscollectedforms.net
URL: https://js.hscollectedforms.net/collectedforms.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:fd05 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7d6a0f6ea6087f6923a53c0ca8c731395e45dab4408a86e970f7e15bd2964971
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Origin
https://resources.cybsafe.com

Response headers

date
Mon, 10 Dec 2018 11:04:16 GMT
content-encoding
gzip
vary
Accept-Encoding, User-Agent
status
200
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-length
124
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
180
access-control-allow-methods
GET, OPTIONS, PUT, POST, DELETE, PATCH, HEAD
content-type
application/json;charset=utf-8
access-control-allow-origin
https://resources.cybsafe.com
access-control-allow-credentials
false
accept-ranges
bytes
cf-ray
486f3acc9e52973e-FRA
access-control-allow-headers
*
96-96.png
i1.wp.com/resources.cybsafe.com/wp-content/uploads/2018/10/
8 KB
8 KB
Image
General
Full URL
https://i1.wp.com/resources.cybsafe.com/wp-content/uploads/2018/10/96-96.png?fit=1200%2C646&ssl=1&resize=350%2C200
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.2 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
i1.wp.com
Software
nginx /
Resource Hash
5d060cdeaa6c04321c4861e04de1d30421d4cb52ef791f1c8020e7f682a12dcc
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
MISS fra 17
date
Mon, 10 Dec 2018 11:04:17 GMT
x-content-type-options
nosniff
x-bytes-saved
30862
last-modified
Mon, 10 Dec 2018 11:04:17 GMT
server
nginx
etag
"3dc97f9fed152575"
vary
Accept
content-type
image/webp
status
200
cache-control
public, max-age=63115200
link
<https://resources.cybsafe.com/wp-content/uploads/2018/10/96-96.png>; rel="canonical"
content-length
7852
expires
Wed, 09 Dec 2020 23:04:17 GMT
CYBSAFE-blog_image14.jpg
i1.wp.com/resources.cybsafe.com/wp-content/uploads/2017/03/
6 KB
7 KB
Image
General
Full URL
https://i1.wp.com/resources.cybsafe.com/wp-content/uploads/2017/03/CYBSAFE-blog_image14.jpg?fit=1200%2C628&ssl=1&resize=350%2C200
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.2 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
i1.wp.com
Software
nginx /
Resource Hash
d0d743d68270e35024b1a5f2957c7deb14952f49a21388f965073b68ef94de26
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
MISS fra 21
date
Mon, 10 Dec 2018 11:04:17 GMT
x-content-type-options
nosniff
x-bytes-saved
25271
last-modified
Mon, 10 Dec 2018 11:04:17 GMT
server
nginx
etag
"71f1e4259daf6183"
vary
Accept
content-type
image/webp
status
200
cache-control
public, max-age=63115200
link
<https://resources.cybsafe.com/wp-content/uploads/2017/03/CYBSAFE-blog_image14.jpg>; rel="canonical"
content-length
6534
expires
Wed, 09 Dec 2020 23:04:17 GMT
CYBSAFE-blog_image-181204-JH-104.jpg
i1.wp.com/resources.cybsafe.com/wp-content/uploads/2018/12/
6 KB
6 KB
Image
General
Full URL
https://i1.wp.com/resources.cybsafe.com/wp-content/uploads/2018/12/CYBSAFE-blog_image-181204-JH-104.jpg?fit=1200%2C629&ssl=1&resize=350%2C200
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
192.0.77.2 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
i1.wp.com
Software
nginx /
Resource Hash
03d943061228360330a4e8ec09c5cc99b56550618d65c196d0417218cb45e22d
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-nc
MISS fra 21
date
Mon, 10 Dec 2018 11:04:17 GMT
x-content-type-options
nosniff
x-bytes-saved
23664
last-modified
Mon, 10 Dec 2018 11:04:17 GMT
server
nginx
etag
"85e126fd4cb5a4b4"
vary
Accept
content-type
image/webp
status
200
cache-control
public, max-age=63115200
link
<https://resources.cybsafe.com/wp-content/uploads/2018/12/CYBSAFE-blog_image-181204-JH-104.jpg>; rel="canonical"
content-length
6294
expires
Wed, 09 Dec 2020 23:04:17 GMT
visit
api.getdrip.com/client/events/
84 B
875 B
Script
General
Full URL
https://api.getdrip.com/client/events/visit?drip_account_id=4648572&referrer=&url=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F&domain=resources.cybsafe.com&time_zone=UTC&enable_third_party_cookies=t&callback=Drip_987862706
Requested by
Host: tag.getdrip.com
URL: https://tag.getdrip.com/4648572.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.7 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-7.fra53.r.cloudfront.net
Software
/
Resource Hash
2a14ec822bdcbe7636899f36fee4c0f26dc3f4bf7ad62362bdd87244c8ea3322
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:16 GMT
via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
x-content-type-options
nosniff
x-amzn-remapped-content-length
84
x-amzn-requestid
55e6f68b-fc6b-11e8-9d10-371caf0943bc
x-cache
Miss from cloudfront
status
200
x-amzn-remapped-server
nginx
x-amz-apigw-id
RsA3nE8PIAMFZEg=
content-length
84
x-xss-protection
1; mode=block
x-request-id
cc794c46-61d7-4332-9c49-0b0b5256ff53
x-runtime
0.035862
x-frame-options
SAMEORIGIN
etag
W/"2a14ec822bdcbe7636899f36fee4c0f2"
strict-transport-security
max-age=15552000
content-type
text/javascript; charset=utf-8
x-amzn-remapped-connection
keep-alive
cache-control
max-age=0, private, must-revalidate
x-amzn-remapped-date
Mon, 10 Dec 2018 11:04:16 GMT
x-amz-cf-id
0HZMVKT6OAnnbKllKOYg6KJ4TG6o3RyR-FlDUY9ES-gNPLIShQD2cw==
shim.latest.js
js.intercomcdn.com/
Redirect Chain
  • https://widget.intercom.io/widget/ya7brvp1
  • https://js.intercomcdn.com/shim.latest.js
3 KB
2 KB
Script
General
Full URL
https://js.intercomcdn.com/shim.latest.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.24 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
59fc7db02e3627852def439ac69672e33d99b0570c08f7d91ac29c49093d7caa

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-server-side-encryption
AES256
date
Mon, 10 Dec 2018 11:00:25 GMT
content-encoding
gzip
last-modified
Mon, 10 Dec 2018 10:50:22 GMT
server
AmazonS3
age
233
etag
"0fc06184a1568cc1b959e4ec71e8975c"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
max-age=300, s-maxage=300, public
accept-ranges
bytes
content-length
1319
via
1.1 c5c25772c7f14e267596e0f8ce51d9bc.cloudfront.net (CloudFront)
x-amz-cf-id
amXJcsalcfSybVgOSGMOYSz0vw5FK-l0Gx5vpfSM8nB9jTT6Q_BsBw==

Redirect headers

date
Wed, 05 Dec 2018 21:14:47 GMT
via
1.1 73f3a23156999272233949c078c30859.cloudfront.net (CloudFront)
server
AmazonS3
age
395371
status
302
x-cache
Hit from cloudfront
location
https://js.intercomcdn.com/shim.latest.js
content-length
0
x-amz-cf-id
sUWHLt5OiW0Db-GipgGPMRGiWhIZ-Soo00-MEdbIGYYfuf-4xmR7xg==
__ptq.gif
track.hubspot.com/
45 B
469 B
Image
General
Full URL
https://track.hubspot.com/__ptq.gif?k=1&sd=1600x1200&cd=24-bit&cs=UTF-8&ln=en-us&bfp=1332804328&v=1.1&a=4820846&rcu=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft&pu=https%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F&t=How+are+phishing+attacks+used+in+identity+theft%3F&cts=1544439857769&vi=beeb94c44f9e08ffc11318e03a160a88&nc=true&ce=false&pt=1
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:fa05 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
dc111a70984a9eda00752b06277113029ef288f1125c31eff2477413e15e8aa4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 11:04:17 GMT
via
1.1 google
x-robots-tag
none
server
cloudflare
p3p
CP="NOI CUR ADM OUR NOR STA NID"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
image/gif
status
200
cache-control
no-cache, no-store, no-transform
access-control-allow-credentials
false
cf-ray
486f3ad748536457-FRA
alt-svc
clear
mod_pagespeed_beacon
resources.cybsafe.com/
0
96 B
XHR
General
Full URL
https://resources.cybsafe.com/mod_pagespeed_beacon?url=http%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F
Requested by
Host: resources.cybsafe.com
URL: https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.43.96 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-43-96.eu-west-1.compute.amazonaws.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:path
/mod_pagespeed_beacon?url=http%3A%2F%2Fresources.cybsafe.com%2Fhow-are-phishing-attacks-used-in-identity-theft%2F
pragma
no-cache
cookie
_ga=GA1.2.85625382.1544439856; _gid=GA1.2.407084115.1544439856; _gat_gtag_UA_77783374_1=1; _drip_client_4648572=vid%253D42674680de990136c4340e0ef9f74c10%2526pageViews%253D1%2526sessionPageCount%253D1%2526lastVisitedAt%253D1544439856866%2526weeklySessionCount%253D1%2526lastSessionAt%253D1544439856866
origin
https://resources.cybsafe.com
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
content-type
application/x-www-form-urlencoded
accept
*/*
cache-control
no-cache
:authority
resources.cybsafe.com
referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
:scheme
https
content-length
73
:method
POST
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Origin
https://resources.cybsafe.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

status
204
date
Mon, 10 Dec 2018 11:04:17 GMT
cache-control
max-age=0, no-cache
server
Apache
x-frame-options
SAMEORIGIN
frame.82530c7f.js
js.intercomcdn.com/ Frame A6D1
3 MB
580 KB
Script
General
Full URL
https://js.intercomcdn.com/frame.82530c7f.js
Requested by
Host: js.intercomcdn.com
URL: https://js.intercomcdn.com/shim.latest.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.24 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-24.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
98fb9a114d4f3899617953b451a5531fdc2792053eccfee2ad36130a662a6555

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-server-side-encryption
AES256
date
Mon, 10 Dec 2018 10:50:26 GMT
content-encoding
gzip
last-modified
Mon, 10 Dec 2018 10:32:02 GMT
server
AmazonS3
age
832
etag
"7af656456f18ea919f38db23bb04991b"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
max-age=604800, s-maxage=7200, public
accept-ranges
bytes
content-length
592905
via
1.1 c5c25772c7f14e267596e0f8ce51d9bc.cloudfront.net (CloudFront)
x-amz-cf-id
qvB5ptttJ4asljYd7EsB4H8_AfA7KNC-3BoVnQgcpMb8qnRCMMzoig==
ping
api-iam.intercom.io/messenger/web/ Frame A6D1
4 KB
2 KB
XHR
General
Full URL
https://api-iam.intercom.io/messenger/web/ping
Requested by
Host: js.intercomcdn.com
URL: https://js.intercomcdn.com/frame.82530c7f.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.76 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-76.fra53.r.cloudfront.net
Software
nginx /
Resource Hash
e44611287666f1b70747173eeb38d861f990194b4c4fc09d957311a2b712458a
Security Headers
Name Value
Strict-Transport-Security max-age=31557600; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Origin
https://resources.cybsafe.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

date
Mon, 10 Dec 2018 11:04:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
access-control-allow-origin
https://resources.cybsafe.com
x-cache
Miss from cloudfront
status
200, 200 OK
strict-transport-security
max-age=31557600; includeSubDomains; preload
vary
Accept-Encoding
x-xss-protection
1; mode=block
x-request-id
000mc7mar6tv7fr2tb40
x-runtime
0.221350
server
nginx
x-frame-options
SAMEORIGIN
etag
W/"e44611287666f1b70747173eeb38d861"
x-ratelimit-remaining
1998
access-control-allow-methods
POST, GET, OPTIONS
content-type
application/json; charset=utf-8
via
1.1 c90147ea5199ff7ce77981c8da4247c4.cloudfront.net (CloudFront)
x-intercom-version
48b1f89f9bc886bc104919a49da97f40744d1ac6
cache-control
max-age=0, private, must-revalidate
access-control-allow-credentials
true
x-ratelimit-reset
1544439900
x-ratelimit-limit
2000
access-control-allow-headers
Content-Type
x-amz-cf-id
VINs2uCgcanFl2FWmzeGNmWQTCbYhVqL-s5KtNU1GQOI8El9_uTGLw==
proximanova-regular.a7942249.woff
js.intercomcdn.com/fonts/ Frame D7D6
28 KB
29 KB
Font
General
Full URL
https://js.intercomcdn.com/fonts/proximanova-regular.a7942249.woff
Requested by
Host: js.intercomcdn.com
URL: https://js.intercomcdn.com/frame.82530c7f.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.111 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-111.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ad1e595d26035487333f48604244ddab94b13bec3e2f4545f13d8dd8a3ecba20

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
Origin
https://resources.cybsafe.com

Response headers

date
Mon, 10 Dec 2018 11:04:20 GMT
via
1.1 a4a46c5a6cdf81ec1d08cf6e63389765.cloudfront.net (CloudFront)
vary
Origin
x-amz-server-side-encryption
AES256
x-cache
Miss from cloudfront
status
200
content-length
28960
last-modified
Mon, 10 Dec 2018 10:32:02 GMT
server
AmazonS3
etag
"a7942249ca925ef356c0f2b1dab17ef3"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/font-woff
access-control-allow-origin
*
cache-control
max-age=604800, s-maxage=7200, public
accept-ranges
bytes
x-amz-cf-id
9h1NGdOwO7okf0O5Qx6St1UqG07ln2j0tVU6jNuAEWWu0xsWwf4lhw==
angie-small-23-1531902998.png
static.intercomassets.com/avatars/2224386/square_128/ Frame D7D6
14 KB
15 KB
Image
General
Full URL
https://static.intercomassets.com/avatars/2224386/square_128/angie-small-23-1531902998.png?1531902998
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.103 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-103.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
bd50caa5514d04684200935fef5c899a9d787c8e5d7e4ea4d9b419394e830676

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 09:09:02 GMT
via
1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
last-modified
Wed, 18 Jul 2018 08:36:39 GMT
server
AmazonS3
age
6917
etag
"52d93d597c4b02435c95b32652691317"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=86400
accept-ranges
bytes
content-length
14759
x-amz-cf-id
tQfDzVUxRRzAQ2PPIQwLrq-G4BelKTGnfrHNbunz4gfm1wycGBYyYQ==
kay_round-27_%281%29-1536838497.png
static.intercomassets.com/avatars/2360168/square_128/ Frame D7D6
15 KB
15 KB
Image
General
Full URL
https://static.intercomassets.com/avatars/2360168/square_128/kay_round-27_%281%29-1536838497.png?1536838497
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.214.103 Wilmington, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-214-103.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
88fa858d6891512fbdf4ae115bf011d64a9506a7fd0320c6dfd13a18130844a6

Request headers

Referer
https://resources.cybsafe.com/how-are-phishing-attacks-used-in-identity-theft/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 10 Dec 2018 09:09:02 GMT
via
1.1 d7524ff4a82155dd51a24800cf39deec.cloudfront.net (CloudFront)
last-modified
Thu, 13 Sep 2018 11:34:59 GMT
server
AmazonS3
age
6917
etag
"d30c3172520640386733d281aed5783b"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=86400
accept-ranges
bytes
content-length
15321
x-amz-cf-id
V8IvO7kGt70sb9vDFEfk0k_wM6gsCvavVt7dTXk14qI3yCVa465kDQ==

Verdicts & Comments Add Verdict or Comment

115 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

string| et_site_url string| et_post_id function| et_core_page_resource_fallback object| _wpemojiSettings undefined| $ function| jQuery object| related_posts_js_options object| mb_ajax object| intercomSettings function| Intercom object| pagespeed string| _linkedin_data_partner_id object| _dcq object| _dcs function| gtag object| dataLayer object| jQuery11240882512728664872 string| _linkedin_partner_id object| _linkedin_data_partner_ids object| hlst_query object| hlst_areas object| wpcom_img_zoomer object| detectZoom object| WPUSBVars function| WPUSB object| monarchSettings object| leadin_wordpress object| addComment object| et_shortcodes_strings object| et_pb_custom object| twemoji object| wp object| google_tag_manager string| GoogleAnalyticsObject function| ga boolean| et_load_event_fired boolean| et_is_transparent_nav boolean| et_is_vertical_nav boolean| et_is_fixed_nav function| et_pb_init_modules function| et_pb_debounce function| et_pb_smooth_scroll function| et_fix_video_wmode function| et_pb_form_placeholders_init function| et_duplicate_menu function| et_pb_remove_placeholder_text function| et_fix_fullscreen_section function| et_bar_counters_init function| et_fix_pricing_currency_position function| et_pb_set_responsive_grid function| et_pb_set_tabs_height object| salvattore function| Waypoint object| ET_SmoothScroll boolean| et_calculating_scroll_position boolean| et_side_nav_links_initialized object| _stq object| $et_tooltip object| $et_learn_more function| et_pb_slider_init function| et_pb_audio_module_init function| et_countdown_timer function| et_countdown_timer_labels function| et_apply_parallax function| et_parallax_set_height function| et_pb_play_overlayed_video function| et_pb_resize_section_video_bg function| et_pb_center_video function| et_pb_adjust_video_margin function| et_fix_slider_height number| window_width function| et_pb_submit_newsletter function| et_fix_testimonial_inner_width function| et_pb_video_background_init function| et_reinit_waypoint_modules function| et_calc_fullscreen_section function| et_pb_parallax_init function| et_pb_fullwidth_header_scroll function| et_pb_search_init function| et_pb_search_percentage_custom_margin_fix function| et_pb_comments_init function| et_calculate_header_values function| et_pb_window_side_nav_scroll_init function| et_pb_side_nav_page_init function| _bizo_local_logger function| _bizo_fire_partners boolean| _bizo_main_already_called function| st_go function| linktracker_init object| wpcom object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| _hsq object| _paq boolean| _hstc_loaded object| globalRoot undefined| hns object| leadin function| hmerge object| hubspot function| OutpostErrorReporter undefined| hns2 boolean| COLLECTED_FORMS_RAN boolean| COMMON_SETUP_RAN boolean| COLLECTED_FORM_DOCUMENT_READY_RAN object| _dcfg object| _dc undefined| Drip_987862706 number| $logo_width string| waypointContextKey boolean| _hstc_ran string| __hsUserToken number| expireDateTime

4 Cookies

Domain/Path Name / Value
.cybsafe.com/ Name: _drip_client_4648572
Value: vid%253D42674680de990136c4340e0ef9f74c10%2526pageViews%253D1%2526sessionPageCount%253D1%2526lastVisitedAt%253D1544439856866%2526weeklySessionCount%253D1%2526lastSessionAt%253D1544439856866
.cybsafe.com/ Name: _gat_gtag_UA_77783374_1
Value: 1
.cybsafe.com/ Name: _gid
Value: GA1.2.407084115.1544439856
.cybsafe.com/ Name: _ga
Value: GA1.2.85625382.1544439856

1 Console Messages

Source Level URL
Text
console-api log URL: https://resources.cybsafe.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1(Line 2)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options SAMEORIGIN

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

api-iam.intercom.io
api.getdrip.com
et1.getsidekick.com
fonts.googleapis.com
fonts.gstatic.com
forms.hubspot.com
i0.wp.com
i1.wp.com
i2.wp.com
js.hs-analytics.net
js.hs-scripts.com
js.hscollectedforms.net
js.intercomcdn.com
maxcdn.bootstrapcdn.com
pixel.wp.com
px.ads.linkedin.com
resources.cybsafe.com
s0.wp.com
snap.licdn.com
static.intercomassets.com
stats.g.doubleclick.net
stats.wp.com
t.sidekickopen75.com
tag.getdrip.com
track.hubspot.com
widget.intercom.io
www.google-analytics.com
www.googletagmanager.com
www.linkedin.com
143.204.214.103
143.204.214.111
143.204.214.21
143.204.214.24
143.204.214.4
143.204.214.7
143.204.214.76
192.0.76.3
192.0.77.2
192.0.77.32
209.197.3.15
2606:4700::6810:314e
2606:4700::6810:fa05
2606:4700::6810:fd05
2606:4700::6811:45b0
2606:4700::6811:7fab
2606:4700::6811:d5cc
2606:4700::6812:d68f
2620:109:c00c:104::b93f:9005
2a00:1450:4001:809::2003
2a00:1450:4001:809::2008
2a00:1450:4001:809::200a
2a00:1450:4001:809::200e
2a00:1450:400c:c0c::9d
2a02:26f0:6c00:28c::25ea
2a05:f500:10:101::b93f:9101
54.194.43.96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