https://www.splunk.com/en_us/blog/security/peak-threat-hunting-framework.html

ID de exploración:
1f07cb47-bc96-476c-b8a3-1bd263d1190aFinalizado
URL enviada:
https://www.splunk.com/en_us/blog/security/peak-threat-hunting-framework.html
Informe finalizado:

Cookies: 6 encontradas

NombreValorDominioRutaCaduca (UTC)SeguroSolo HTTP
is_botc0ab6a5484df4bdda218e89709afc42c.www.splunk.com/31 dic 1969, 23:59:59 No
_gaGA1.2.921357774.1734558564.splunk.com/22 ene 2026, 21:49:23 No No
_gidGA1.2.717168260.1734558564.splunk.com/19 dic 2024, 21:49:23 No No
trackAffiliate.splunk.com/22 ene 2026, 21:49:24 No No
OptanonConsentisGpcEnabled=0&datestamp=Wed+Dec+18+2024+21%3A49%3A25+GMT%2B0000+(Coordinated+Universal+Time)&version=202407.2.0&browserGpcFlag=0&isIABGlobal=false&hosts=&consentId=af04adde-0378-4de6-a315-977ddef291dc&interactionCount=0&isAnonUser=1&landingPath=https%3A%2F%2Fwww.splunk.com%2Fen_us%2Fblog%2Fsecurity%2Fpeak-threat-hunting-framework.html&groups=1%3A1%2C2%3A0%2C3%3A0%2C4%3A0.splunk.com/18 dic 2025, 21:49:25 No No
RT"z=1&dm=www.splunk.com&si=33a908b6-2eb6-4447-957d-64f0f8046bf0&ss=m4ufdsdp&sl=1&tt=2q3&bcn=%2F%2F0217990f.akstat.io%2F&ld=2qx".www.splunk.com/25 dic 2024, 21:49:25 No No