Report Overview

  1. Visited public
    2023-09-17 05:58:59
    Tags
  2. URL

    www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/

  3. Finishing URL

    www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/

  4. IP / ASN
    45.60.198.199

    #19551 INCAPSULA

    Title
    cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
Detections
urlquery
0
Network Intrusion Detection
1
Threat Detection Systems
0

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
www.cyberbit.comunknown2003-07-192017-07-10 21:31:582023-09-16 14:55:52

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
medium 45.60.198.199Client IP

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


JavaScript (65)

HTTP Transactions (33)

URLIPResponseSize
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/
45.60.198.199 0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently212 B
www.cyberbit.com/_Incapsula_Resource?SWJIYLWA=5074a744e2e3d891814e9a2dace20bd4,719d34d31c8e3a6e6fffd425f7e032f3
45.60.198.199200 OK27 kB
www.cyberbit.com/_Incapsula_Resource?SWHANEDL=5191065893601667230,12485238783252793481,17553558471110115423,373621
45.60.198.199200 OK29 B
www.cyberbit.com/_Incapsula_Resource?SWKMTFSR=1&e=0.5851931782007963
45.60.198.199200 OK1 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B
www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
45.60.198.199301 Moved Permanently0 B