Who did/do this:
Party Script-address Info gathered
OnAudience htxp://api.behavioralengine.com/scripts/be-init.js User ID (hashed), Email (hashed), Gender
Augur htxps://cdn.augur.io/augur.min.js Email, Username
Lytics htxps://c.lytics.io/static/io.min.js (loaded via OpenTag) User ID
ntvk1.ru htxps://p1.ntvk1.ru/nv.js User ID
ProPS htxp://st-a.props.id/ai.js User ID (has code to collect more)
Tealium htxp://tags.tiqcdn.com/utag/ipc/[]/prod/utag.js User ID
Forter htxps://cdn4.forter.com/script.js?sn=[] User ID (info source tweakers.net - Sander van Voorst)
Here it seems toi be hidden through non-public Internet: https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=XiNuLnx1Z3V9LltdYHx1Z3V9Lm1bbi5qcw%3D%3D~enc
Other trackers via this Google IP address: https://urlquery.net/report/51ca5e0b-b634-4e14-b704-f4081d73470c
Several links broken: http://ismyblogworking.com/cdn.augur.io/forward.html
& http://ismyblogworking.com/https://p1.ntvk1.ru
uBlock Origin blocks all such trackers for me, via Peter Lowe’s Ad and tracking server list, that’s all I should know.
polonus (volunteer website security analyst and website error-hunter)