URL: https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
Submission: On May 10 via manual from DE — Scanned from DE

Summary

This website contacted 19 IPs in 4 countries across 14 domains to perform 54 HTTP transactions. The main IP is 2606:4700:20::ac43:4615, located in United States and belongs to CLOUDFLARENET, US. The main domain is thehackernews.com. The Cisco Umbrella rank of the primary domain is 249728.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on May 1st 2022. Valid for: a year.
This is the only time thehackernews.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
14 2606:4700:20:... 13335 (CLOUDFLAR...)
3 2606:4700:440... 13335 (CLOUDFLAR...)
1 2001:4de0:ac1... 20446 (STACKPATH...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
2 2a00:1450:400... 15169 (GOOGLE)
3 172.217.16.130 15169 (GOOGLE)
4 108.138.3.177 16509 (AMAZON-02)
1 51.124.210.81 8075 (MICROSOFT...)
4 23.97.225.52 8075 (MICROSOFT...)
1 2a00:1450:400... 15169 (GOOGLE)
8 2a00:1450:400... 15169 (GOOGLE)
1 2620:116:800d... 16509 (AMAZON-02)
1 2600:9000:249... 16509 (AMAZON-02)
1 2 2a02:2638:1::13 44788 (ASN-CRITE...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
2 178.250.0.157 44788 (ASN-CRITE...)
1 2a00:1450:400... 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
54 19
Apex Domain
Subdomains
Transfer
14 thehackernews.com
thehackernews.com — Cisco Umbrella Rank: 249728
230 KB
8 google.com
fundingchoicesmessages.google.com — Cisco Umbrella Rank: 2344
85 KB
8 adpushup.com
cdn.adpushup.com — Cisco Umbrella Rank: 12159
aplogger.adpushup.com — Cisco Umbrella Rank: 12927
e3.adpushup.com — Cisco Umbrella Rank: 15239
214 KB
4 gstatic.com
fonts.gstatic.com
256 KB
4 criteo.com
gum.criteo.com — Cisco Umbrella Rank: 448
mug.criteo.com — Cisco Umbrella Rank: 1931
1 KB
4 amazon-adsystem.com
c.amazon-adsystem.com — Cisco Umbrella Rank: 375
40 KB
4 doubleclick.net
securepubads.g.doubleclick.net — Cisco Umbrella Rank: 245
googleads.g.doubleclick.net — Cisco Umbrella Rank: 65
158 KB
2 googlesyndication.com
pagead2.googlesyndication.com — Cisco Umbrella Rank: 119
165 KB
1 googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 111
4 KB
1 jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 574
2 KB
1 quantcount.com
rules.quantcount.com — Cisco Umbrella Rank: 1160
345 B
1 quantserve.com
secure.quantserve.com — Cisco Umbrella Rank: 1338
10 KB
1 cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 341
28 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 936
30 KB
54 14
Domain Requested by
14 thehackernews.com thehackernews.com
8 fundingchoicesmessages.google.com cdn.adpushup.com
4 fonts.gstatic.com fonts.googleapis.com
4 e3.adpushup.com
4 c.amazon-adsystem.com cdn.adpushup.com
c.amazon-adsystem.com
3 securepubads.g.doubleclick.net cdn.adpushup.com
securepubads.g.doubleclick.net
3 cdn.adpushup.com thehackernews.com
cdn.adpushup.com
2 mug.criteo.com
2 gum.criteo.com 1 redirects
2 pagead2.googlesyndication.com thehackernews.com
pagead2.googlesyndication.com
1 fonts.googleapis.com
1 cdn.jsdelivr.net cdn.adpushup.com
1 rules.quantcount.com secure.quantserve.com
1 secure.quantserve.com cdn.adpushup.com
1 googleads.g.doubleclick.net pagead2.googlesyndication.com
1 aplogger.adpushup.com
1 cdnjs.cloudflare.com thehackernews.com
1 code.jquery.com cdn.adpushup.com
54 18
Subject Issuer Validity Valid
thehackernews.com
Cloudflare Inc ECC CA-3
2022-05-01 -
2023-05-01
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-06-22 -
2022-06-21
a year crt.sh
*.jquery.com
Sectigo RSA Domain Validation Secure Server CA
2021-07-14 -
2022-08-14
a year crt.sh
*.g.doubleclick.net
GTS CA 1C3
2022-04-18 -
2022-07-11
3 months crt.sh
c.amazon-adsystem.com
Amazon
2021-07-06 -
2022-06-27
a year crt.sh
*.adpushup.com
Sectigo RSA Domain Validation Secure Server CA
2020-05-27 -
2022-08-29
2 years crt.sh
*.google.com
GTS CA 1C3
2022-04-18 -
2022-07-11
3 months crt.sh
*.quantserve.com
DigiCert TLS RSA SHA256 2020 CA1
2021-09-22 -
2022-09-21
a year crt.sh
*.criteo.com
DigiCert TLS Hybrid ECC SHA384 2020 CA1
2022-04-11 -
2022-07-07
3 months crt.sh
upload.video.google.com
GTS CA 1C3
2022-04-25 -
2022-07-18
3 months crt.sh
*.gstatic.com
GTS CA 1C3
2022-04-18 -
2022-07-11
3 months crt.sh

This page contains 2 frames:

Primary Page: https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
Frame ID: 9C0463F00D6A325D3B544D36FFF64F86
Requests: 58 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20220505/r20190131/zrt_lookup.html
Frame ID: 64B7E0FFD185D7A2227D5AC14315F0DD
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

Chinese Hackers Caught Exploiting Popular Antivirus Products to Target Telecom Sector

Detected technologies

Overall confidence: 100%
Detected patterns
  • googlesyndication\.com/

Overall confidence: 100%
Detected patterns

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com

Overall confidence: 100%
Detected patterns
  • \.quantserve\.com/quant\.js

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • /([\d.]+)/jquery(?:\.min)?\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Overall confidence: 100%
Detected patterns
  • //cdn\.jsdelivr\.net/

Page Statistics

54
Requests

96 %
HTTPS

72 %
IPv6

14
Domains

18
Subdomains

19
IPs

4
Countries

1231 kB
Transfer

3024 kB
Size

5
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 48
  • https://gum.criteo.com/sid/json?origin=prebid&topUrl=https%3A%2F%2Fthehackernews.com%2F&domain=thehackernews.com&cw=1&lsw=1 HTTP 302
  • https://mug.criteo.com/sid?cpp=sGw5ZHxFc2w1OVpuZmRwampzTGJ0NlpPcjVnbUdlY3dQK2xDN0ZTNjFGWjcxYkwyQ0UzQ1ROcDNGdmlWVzdha3dGNHlyZDkxdU5rbytxMkgzMW44cE1ENnBTdldaWnFlUG16NE10N0hkdWdIUE5GeitmVFRhSjk1SUxYdFlrbzBQdDd6UCs1SnpUOVVmUktVem9naE9Gc1NYakFLTmplM2haVU9GYUtzdis0WHFuSTJsYlNiSXBEUGEwbEVuT1hDeWg3SUFta1lqY2FtZXdlUk9mSUpzRDQ1dTc3NSs0ZC80RFVCNDB2a295TWxyajF3PXw&cppv=2

54 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request chinese-hackers-caught-exploiting.html
thehackernews.com/2022/05/
112 KB
43 KB
Document
General
Full URL
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::ac43:4615 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / WordPress VIP
Resource Hash
c684e1eb970ea08f9a6bb79313fca89f0412268228a5b91be2fae6711254fbdd
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

age
223
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cache-control
public, s-maxage=604800, max-age=0
cf-cache-status
HIT
cf-ray
709158e8d8675ca4-FRA
content-encoding
br
content-security-policy
upgrade-insecure-requests
content-type
text/html; charset=UTF-8
date
Tue, 10 May 2022 08:36:28 GMT
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
expires
Tue, 10 May 2022 08:32:44 GMT
last-modified
Tue, 10 May 2022 08:30:19 GMT
link
</css/roboto.css>; as=style; rel=preload
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
permissions-policy
camera=(), geolocation=(), microphone=()
referrer-policy
no-referrer-when-downgrade
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=09AM2CqsxgYosZ3Ezyxqq%2F7HzROPBis3ZufQ8wEy%2BSjWtXKo9hK4UKbDOHHnXCwpe%2Bew%2B2xideteLckMWq96SN5FQftARFymstgIkiqKmns%2BoMItWaHG%2FVEZAI44JoarlxKZ2K4r487BgMpuf2CD"}],"group":"cf-nel","max_age":604800}
server
cloudflare
strict-transport-security
max-age=15552000; includeSubDomains; preload
vary
Accept-Encoding
x-content-type-options
nosniff
x-forwarded-for
2a01:4a0:5a::8
x-frame-options
DENY
x-powered-by
WordPress VIP
x-xss-protection
1; mode=block
roboto.css
thehackernews.com/css/
77 KB
57 KB
Stylesheet
General
Full URL
https://thehackernews.com/css/roboto.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::ac43:4615 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3d8ab8467b889847c12c542bee765afc54acbaff1cc91ce3197ab4f2be8f08ff
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
br
x-content-type-options
nosniff
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=hI%2Ba5nToMeuwoFk7KrKtJ2LuoeBiFxw8Y%2B1ZodgJfeGK3PtO5BqilG1cueKrhuNAROedM66dpBe%2Fk9SrEM0F7aCDcoeM6wDfIGjMdp4ZVQc8msbg5BHRKkH8WJWdVFn33kut0vA2vAdRA8lQcgcf"}],"group":"cf-nel","max_age":604800}
content-type
text/css
cache-control
public, max-age=2592000, immutable, s-maxage=8640000
strict-transport-security
max-age=15552000; includeSubDomains; preload
cf-ray
709158eb5c765ca4-FRA
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
antivirus.jpg
thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEiydBXbnGwv54S9m0hpl8wm3f-UbjH2HaAyX797SC9Tm5a6RyYYS9kE8UAqUyNMWIMDI3RN4MU1xxL31JZe_ORPa-WU_TtAmacG0DFebXs2-RdZ_aqX_7158XFQ7mOgN9eUgYs5U8V_7KoiezhES...
27 KB
28 KB
Image
General
Full URL
https://thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEiydBXbnGwv54S9m0hpl8wm3f-UbjH2HaAyX797SC9Tm5a6RyYYS9kE8UAqUyNMWIMDI3RN4MU1xxL31JZe_ORPa-WU_TtAmacG0DFebXs2-RdZ_aqX_7158XFQ7mOgN9eUgYs5U8V_7KoiezhES9Hfv76iqDwYjucQbLC07YxBK-jHKrsfxunicMSR/s728-e1000/antivirus.jpg
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::ac43:4615 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d333b3524aa26529e8303fca55cf25d3688206369fe130de250ecba08bbe6a35
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
448033
cf-polished
origSize=31210, status=webp_bigger
x-forwarded-for
164.92.164.141
content-disposition
inline;filename="antivirus.jpg"
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
27493
x-xss-protection
0
expires
Wed, 29 Jan 2025 04:09:15 GMT
cf-bgj
imgq:100,h2pri
server
cloudflare
etag
"v18ff"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SaZqvP4eCnx8Ec3tTu%2BTeZzoQnCBL7e2iqH5eUJAdURzXctdGfFp3vaRb%2BuNg8vGF5p6BZewusXJIeYnHNnTDZ0jqIUYUvtP%2FFCKFq90A4TOJbKkW35dxbxggkDtUcRcVvcDwIwz8gOsQ9BuvMBT"}],"group":"cf-nel","max_age":604800}
content-type
image/jpeg
vary
Accept-Encoding
cache-control
public, max-age=8640000, immutable, s-maxage=8640000
accept-ranges
bytes
cf-ray
709158eb78489b2d-FRA
access-control-expose-headers
Content-Length
malware-flow.jpg
thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEhftPHzgCivRqQQJfxJuWQvLd1k3pd5FBiXAvGv4wMjj9PsAX6VzaFavaLDUbrtyRecoe9Qwb77Y1hzFgMYYXuhz4515Cu4vjNP6UnY-0GDSRmeXnx6vxKm5IdAS_Do7Hckn7QPvc4w5BqVIUny-...
24 KB
25 KB
Image
General
Full URL
https://thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEhftPHzgCivRqQQJfxJuWQvLd1k3pd5FBiXAvGv4wMjj9PsAX6VzaFavaLDUbrtyRecoe9Qwb77Y1hzFgMYYXuhz4515Cu4vjNP6UnY-0GDSRmeXnx6vxKm5IdAS_Do7Hckn7QPvc4w5BqVIUny-62e9KqX3OpR2bsAhs0G_WURq2QzNuRQZIL4Lr4_/s728-e1000/malware-flow.jpg
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::ac43:4615 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
84118455047eb25e39355470f67ee9e0fed8ed9fe1184a74a47eaaa62e90c46d
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
448313
cf-polished
origSize=30524, status=webp_bigger
x-forwarded-for
164.92.164.141
content-disposition
inline;filename="malware-flow.jpg"
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
24967
x-xss-protection
0
expires
Wed, 29 Jan 2025 04:04:35 GMT
cf-bgj
imgq:100,h2pri
server
cloudflare
etag
"v1900"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=VLhTDu20DISEA40Tjs1Zr7HloecV7KKtpvrEX%2FXmDmjCLSrYJPg1kvZMYOSL1WqYIN70JB6nNE4wlNfXJXRwtmPcz62%2BkZSE%2BwniT4HRaBfqYZKMuhliJeHIia%2F1OotYp9vBgjwv8V5NubD5mrbC"}],"group":"cf-nel","max_age":604800}
content-type
image/jpeg
vary
Accept-Encoding
cache-control
public, max-age=8640000, immutable, s-maxage=8640000
accept-ranges
bytes
cf-ray
709158eb88799b2d-FRA
access-control-expose-headers
Content-Length
rocket-loader.min.js
thehackernews.com/cdn-cgi/scripts/7d0fa10a/cloudflare-static/
12 KB
4 KB
Script
General
Full URL
https://thehackernews.com/cdn-cgi/scripts/7d0fa10a/cloudflare-static/rocket-loader.min.js
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::ac43:4615 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ccf00d1923b0131a10e0c6d26f95e5dee6ebf8621a27e83c5a2f68a2e0093142
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
vary
Accept-Encoding
last-modified
Fri, 29 Apr 2022 17:17:34 GMT
server
cloudflare
x-frame-options
DENY
etag
W/"626c1dae-302c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=wkBDXMyEzTenTxkqVjOIiRXvefi3RxaTP3b4PmXj5h92GuL%2F9rJB0yt1Txw3ZVLafAJohHruqRGui4OEJhjK%2FRrAob39tjQgeVtmpGGKKwnqizrtcodJBCoiwMRHYy1U8KOMKsnvwlxehDPZTuFu"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
cache-control
max-age=172800, public
cf-ray
709158eb887e9b2d-FRA
expires
Thu, 12 May 2022 08:36:28 GMT
adpushup.js
cdn.adpushup.com/37020/
440 KB
118 KB
Script
General
Full URL
https://cdn.adpushup.com/37020/adpushup.js
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:4400::ac40:99f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e487efe46bb929e6389f07121f9489589b3d9a9285a74ef50f0f6daa0406454f

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Tue, 03 May 2022 09:32:54 GMT
server
cloudflare
age
601339
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=86400
x-cf-geodata
SI
cf-ray
709158ebce3a6969-FRA
expires
Wed, 11 May 2022 08:36:28 GMT
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c6a9d65e5bd6eb2447ea57e398e1d30f3c6e2d022ecf195933d161ffed964690

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
7 KB
7 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a71328300f380217ae0abf7f805052a10a0c196cb241eb97adf9b905e4a48c8a

Request headers

Referer
Origin
https://thehackernews.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Type
application/font-woff
truncated
/
442 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6795c5c8b9b0aeb87d6663ccd7a71fb9d2f2817fe9b5c2e67bce0d5a5e1309a1

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
103 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
688a1e2444a1171a4cfbc8674c62d53bc663bf35a7825eb3563851e79694411c

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
37 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
bb229a48bee31f5d54ca12dc9bd960c63a671f0d4be86a054c1d324a44499d96

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Type
image/gif
truncated
/
194 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f88754ecdaeedbf69845f3cb4015909beff31f92b173185c075ff8ab40ae3d02

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Type
image/png
s.js
thehackernews.com/cdn-cgi/zaraz/
4 KB
3 KB
Script
General
Full URL
https://thehackernews.com/cdn-cgi/zaraz/s.js?z=JTdCJTIyZXhlY3V0ZWQlMjIlM0ElNUIlNUQlMkMlMjJ0JTIyJTNBJTIyQ2hpbmVzZSUyMEhhY2tlcnMlMjBDYXVnaHQlMjBFeHBsb2l0aW5nJTIwUG9wdWxhciUyMEFudGl2aXJ1cyUyMFByb2R1Y3RzJTIwdG8lMjBUYXJnZXQlMjBUZWxlY29tJTIwU2VjdG9yJTIyJTJDJTIydyUyMiUzQTE2MDAlMkMlMjJoJTIyJTNBMTIwMCUyQyUyMmolMjIlM0ExMjAwJTJDJTIyZSUyMiUzQTE2MDAlMkMlMjJsJTIyJTNBJTIyaHR0cHMlM0ElMkYlMkZ0aGVoYWNrZXJuZXdzLmNvbSUyRjIwMjIlMkYwNSUyRmNoaW5lc2UtaGFja2Vycy1jYXVnaHQtZXhwbG9pdGluZy5odG1sJTIyJTJDJTIyciUyMiUzQSUyMiUyMiUyQyUyMmslMjIlM0EyNCUyQyUyMm4lMjIlM0ElMjJVVEYtOCUyMiUyQyUyMm8lMjIlM0EwJTJDJTIycSUyMiUzQSU1QiU1RCU3RA==
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::ac43:4615 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
89c32dbb7afdd523fdcba2ef4c2f7bb921824b74627c8330d4058544cfc242ab
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
br
x-content-type-options
nosniff
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
content-security-policy-report-only
script-src 'none'; report-uri https://csp-reporting.cloudflare.com/cdn-cgi/script_monitor/report?m=0wAC2.0gRZglXPF2HuIOFDmn3S7rG4ILSNNzMiDp59U-1652171788-0-AVsobb9jTgu-yyP91eR8bUZeCR-v_hkrBpKNZ9d0dhMbuBSdSbU8ft190PdytlLtDFQzpKkQX9oG4viE7erB6Ps
access-control-allow-methods
GET, HEAD, POST, OPTIONS
strict-transport-security
max-age=15552000; includeSubDomains; preload
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
600
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=aO3OhW5KSc%2Fs0fPswnQ1VX3Q7d8UOqZ1gfBpM4VHrUZKcEcVHKDwSQ37xW3TGTuRUs%2Fg%2F2MOXldxcgDuGStK1VrAcYEFvnvaw2x2EaQDJdAMRUdKGTlF8Drd2YjkyKl%2FH7GHaXsMSU7sbPU7Clo5"}],"group":"cf-nel","max_age":604800}
content-type
text/javascript
access-control-allow-origin
https://thehackernews.com
vary
Origin, Accept-Encoding
access-control-allow-credentials
true
cf-ray
709158ebe9599b2d-FRA
access-control-allow-headers
Content-Type, Set-Cookie, Cache-Control
AVvXsEiN2CRfA_ceqxVqUhWgQghksIlR--dFXivRiP_Zg-Imyju-DxkJsRqAwMZTHptnxs57fD9WZmF-r0rSMTTmTsDQxuSSveVz3PCX_3vRCCJfInCb6CwrA7DzHnLFlcTMEcG5unhBWOA42n8TdYPH4Zbev3is3ygxwbqRjajda3u7AchyDh0rSt5_WqXjyQ
thehackernews.com/new-images/img/a/
14 KB
15 KB
Image
General
Full URL
https://thehackernews.com/new-images/img/a/AVvXsEiN2CRfA_ceqxVqUhWgQghksIlR--dFXivRiP_Zg-Imyju-DxkJsRqAwMZTHptnxs57fD9WZmF-r0rSMTTmTsDQxuSSveVz3PCX_3vRCCJfInCb6CwrA7DzHnLFlcTMEcG5unhBWOA42n8TdYPH4Zbev3is3ygxwbqRjajda3u7AchyDh0rSt5_WqXjyQ
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::ac43:4615 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
13f1878fabdff05f47a87ea13c69587873e49579185df0fa40a3fe150b59600b
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
452533
cf-polished
origSize=14792, status=webp_bigger
x-forwarded-for
2605:6400:30:f76a:9173:2e5e:3926:ebb7
content-disposition
inline;filename="hacking.jpg"
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
14660
x-xss-protection
0
expires
Fri, 06 May 2022 02:54:15 GMT
cf-bgj
imgq:100,h2pri
server
cloudflare
etag
"ve30c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=7bbSnaR8tBTgjpgiAnLxK9qlaQ3ZRADO6bIQY72%2F1PNiMVmRaw%2BCN3re8lvBaCwTpSqJ1EegUUt%2F7VJDPPTEyLFnqG21e0NhHbHDAriidUHQvZ%2FrNHNH2QWk75ejuY6rI7e8myPi0nHo1ZFBkcYT"}],"group":"cf-nel","max_age":604800}
content-type
image/jpeg
vary
Accept-Encoding
cache-control
public, max-age=8640000, immutable, s-maxage=8640000
accept-ranges
bytes
cf-ray
709158ebe9639b2d-FRA
access-control-expose-headers
Content-Length
jquery-3.6.0.min.js
code.jquery.com/
87 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.6.0.min.js
Requested by
Host: cdn.adpushup.com
URL: https://cdn.adpushup.com/37020/adpushup.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac18::1:a:2b , Netherlands, ASN20446 (STACKPATH-CDN, US),
Reverse DNS
Software
nginx /
Resource Hash
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
gzip
last-modified
Fri, 20 Aug 2021 17:47:53 GMT
server
nginx
etag
W/"611feac9-15d9d"
vary
Accept-Encoding
x-hw
1652171788.dop141.fr8.t,1652171788.cds272.fr8.hn,1652171788.cds144.fr8.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
30875
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.6.0/
87 KB
28 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery/3.6.0/jquery.min.js
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:180e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
age
1681998
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
27938
timing-allow-origin
*
last-modified
Tue, 02 Mar 2021 18:58:36 GMT
server
cloudflare
cf-cdnjs-via
cfworker/kv
etag
"603e8adc-15d9d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15780000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=QegPNL9QKH7oeIAlB3J9J9Z7pHeT1i8sPn3277adBjsDWutSQ5obvu8JvbfEyj%2BtmQCFs%2Bh5sA4yAj1CrDujXcgfDtDEQaNa6bTRcjQx6YHq6qs2E0rN2suE5ixrZ1mk1F5vE8S6TttE9gKpJ5OKXeKG"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=30672000
accept-ranges
bytes
cf-ray
709158ecabc968ec-FRA
expires
Sun, 30 Apr 2023 08:36:28 GMT
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/
156 KB
55 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: thehackernews.com
URL: https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0eb7dcf2a09c07fd0788a6d5e5313d5c5edf907a73626ffdafe91a1ce268421a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
55907
x-xss-protection
0
server
cafe
etag
14465919851522530410
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 10 May 2022 08:36:28 GMT
pb.37020.1631637442652.js
cdn.adpushup.com/prebid/
314 KB
95 KB
Script
General
Full URL
https://cdn.adpushup.com/prebid/pb.37020.1631637442652.js
Requested by
Host: cdn.adpushup.com
URL: https://cdn.adpushup.com/37020/adpushup.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:4400::ac40:99f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b6285dce6b9fb557bd0c15683c62f9be0f2e0b760086854b59c952791ba9e8ae

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Tue, 14 Sep 2021 16:38:00 GMT
server
cloudflare
age
4574023
etag
W/"6140cfe8-4e812"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
cf-ray
709158eccfda6969-FRA
expires
Wed, 10 May 2023 08:36:28 GMT
0aa42bd3-0fa8-420f-a7fe-0ba58227d3a3
https://thehackernews.com/
4 KB
0
Other
General
Full URL
blob:https://thehackernews.com/0aa42bd3-0fa8-420f-a7fe-0ba58227d3a3
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
41f36457d5ec5bd7d115c29bea53e0d1ff77de7418837ef39e897f3b7d497e8a

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Length
3743
f5.jpg
thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEiuH2aYZ8HZSVwPgRk2LN5GoU1qBSksYewifLauRGHFOJYPjWQpTWEJihVR0aDyAzitI4lIjSeBEFzeMdCIelXR4Tuiqqaj8FaPPmj6qmE8pDhOtwbJi_LSk0D7KSj8oBpZ9KhTZl4yUTIpHnLjH...
4 KB
4 KB
Image
General
Full URL
https://thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEiuH2aYZ8HZSVwPgRk2LN5GoU1qBSksYewifLauRGHFOJYPjWQpTWEJihVR0aDyAzitI4lIjSeBEFzeMdCIelXR4Tuiqqaj8FaPPmj6qmE8pDhOtwbJi_LSk0D7KSj8oBpZ9KhTZl4yUTIpHnLjHuDZ3E3FxES1Y7EK91ZaqaIeWAy85BlaKUFzfesP/w72-h72-p-k-no-nu/f5.jpg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::ac43:4615 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
11301c4daa15ddd27e6b30d725fcf3745e19c4f808e07760d9e0385b27159a64
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
388475
cf-polished
origFmt=jpeg, origSize=4368
x-forwarded-for
89.58.16.22
content-disposition
inline; filename="f5.webp"
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
3662
x-xss-protection
0
expires
Fri, 06 May 2022 20:41:53 GMT
cf-bgj
imgq:100,h2pri
server
cloudflare
etag
"v191c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ehZ5o%2FF24r6DkRDUL7Mr6Ty7A2kPDYVDHs0cP5VLCiH2c9vEgd%2BRvIkqpJqaifdjLef%2BqouVh8IBCkjxuENbC1wBO2%2B0mffWqXKHfCNE%2B0FLemXW5222%2Fd7QXAgOgoZuBLkiGjw0NU7lanaRuggP"}],"group":"cf-nel","max_age":604800}
content-type
image/webp
vary
Accept, Accept-Encoding
cache-control
public, max-age=8640000, immutable, s-maxage=8640000
accept-ranges
bytes
cf-ray
709158eceb409b2d-FRA
access-control-expose-headers
Content-Length
red-malware.jpg
thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEi_JJTRy0WEXV5vdQ0fCUCI6BSSboudL85qjwAQNL6Mccy9DxMPmyEMnjUHCTG0HVroriI1v6O51ZTP5AGdh3nPYt1tB6ng1EPnSHoA9pZfRQqj_xV74Ln1fZ5kVDTIrj-c0C0bdFZTUD53UfSVU...
4 KB
5 KB
Image
General
Full URL
https://thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEi_JJTRy0WEXV5vdQ0fCUCI6BSSboudL85qjwAQNL6Mccy9DxMPmyEMnjUHCTG0HVroriI1v6O51ZTP5AGdh3nPYt1tB6ng1EPnSHoA9pZfRQqj_xV74Ln1fZ5kVDTIrj-c0C0bdFZTUD53UfSVUIJyRT9JjwvTL57gJlL3aMKXFlqt3oPQO0a_namY/w72-h72-p-k-no-nu/red-malware.jpg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::ac43:4615 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c465b446e7e9537df30f5f5c41f0749f4abfd422c1fc2ca3d9bedaade0f246d7
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
238629
cf-polished
origFmt=jpeg, origSize=4642
x-forwarded-for
37.120.232.54
content-disposition
inline; filename="red-malware.webp"
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
3982
x-xss-protection
0
expires
Sun, 08 May 2022 14:19:19 GMT
cf-bgj
imgq:100,h2pri
server
cloudflare
etag
"v193e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=BhQ3cG0Sktmu71nzH353OtOCoEBXJYZidgtVSGNrVYTocziuINvLOi1Od0BxiniVRys8PMYwlfCwGOhU0wfb4Sav8GACYBO3xffOuZwRyL0WW5OBRjFteIgWz%2BJ3NBvdqy%2BfedgLGyEdSpZrLQtX"}],"group":"cf-nel","max_age":604800}
content-type
image/webp
vary
Accept, Accept-Encoding
cache-control
public, max-age=8640000, immutable, s-maxage=8640000
accept-ranges
bytes
cf-ray
709158eceb449b2d-FRA
access-control-expose-headers
Content-Length
nistt.jpg
thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEgXKEMdd59pgdyNz9Rdu4cNd4MFXU9-Z3pQip3ib9ieKXrMWBnO-DtB8GbDsUf1wwJm9ixww2Jx6HFyNhAciArl1OZhgqzp2OxmQ_mcL8UwBkP_UURo1ZM6rKBU8e6gBF81Qdbb46iP3X7k6b84V...
4 KB
4 KB
Image
General
Full URL
https://thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEgXKEMdd59pgdyNz9Rdu4cNd4MFXU9-Z3pQip3ib9ieKXrMWBnO-DtB8GbDsUf1wwJm9ixww2Jx6HFyNhAciArl1OZhgqzp2OxmQ_mcL8UwBkP_UURo1ZM6rKBU8e6gBF81Qdbb46iP3X7k6b84VSYnz-bvE-Hp2Kd13t1t9oROnFvlxcAYnLIWKqZq/w72-h72-p-k-no-nu/nistt.jpg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::ac43:4615 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
01eb6af577e8fb4bdcd2d6e99c3f02515c24e5a3837475706f0c966052627ed6
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
304368
cf-polished
origFmt=jpeg, origSize=4249
x-forwarded-for
213.14.113.195
content-disposition
inline; filename="nistt.webp"
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
3682
x-xss-protection
0
expires
Sat, 07 May 2022 20:03:40 GMT
cf-bgj
imgq:100,h2pri
server
cloudflare
etag
"v1930"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=H07zEN1wbly4Fu4EsFt0hX7pO2H5jxdaPdTW6toEIgYit7Qu2jULm8PG5fbk2Px8kcr7WbZti2IjFuIjlCdyzsUtN0Yl7wwcJJkYnl5uvFBtvofSjw4xUXYqm12ODkIKFO3Or6kqzkjrj%2BVHOjIZ"}],"group":"cf-nel","max_age":604800}
content-type
image/webp
vary
Accept, Accept-Encoding
cache-control
public, max-age=8640000, immutable, s-maxage=8640000
accept-ranges
bytes
cf-ray
709158eceb489b2d-FRA
access-control-expose-headers
Content-Length
exploit.jpg
thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEg5YVTszIPCrdhSDdbiNHZLx_7Y2PAuginDDFpNuucqQi41rQJzZBQsCVl76q-q6zR9HFVZXmi0yyFewOigZ5wHmfwe70i2i4vV2o1SBRVjWao43lzjnjfsf46ec97G23hfDsQIp9h-V1YqO63aT...
2 KB
3 KB
Image
General
Full URL
https://thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEg5YVTszIPCrdhSDdbiNHZLx_7Y2PAuginDDFpNuucqQi41rQJzZBQsCVl76q-q6zR9HFVZXmi0yyFewOigZ5wHmfwe70i2i4vV2o1SBRVjWao43lzjnjfsf46ec97G23hfDsQIp9h-V1YqO63aTfI3IpP5L2FNeKMjZZI4kwSp-TrlkIBAZv6Cc902/w72-h72-p-k-no-nu/exploit.jpg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::ac43:4615 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cd24f5731d34c929cd209444714bbb865d4d6891b77ada39b9429fc9ba05f57c
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
9265
cf-polished
status=not_needed
x-forwarded-for
193.28.217.23
content-disposition
inline;filename="exploit.jpg"
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
1972
x-xss-protection
0
expires
Wed, 11 May 2022 06:02:03 GMT
cf-bgj
imgq:100,h2pri
server
cloudflare
etag
"v1950"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
report-to
{"group":"gfe-default_product_name","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/default_product_name"}]}
content-type
image/jpeg
vary
Accept-Encoding
cache-control
public, max-age=8640000, immutable, s-maxage=8640000
accept-ranges
bytes
cf-ray
709158eceb4b9b2d-FRA
cross-origin-opener-policy-report-only
same-origin; report-to="gfe-default_product_name"
access-control-expose-headers
Content-Length
quantcast.js
cdn.adpushup.com/pbuseridscripts/
450 B
347 B
Script
General
Full URL
https://cdn.adpushup.com/pbuseridscripts/quantcast.js
Requested by
Host: cdn.adpushup.com
URL: https://cdn.adpushup.com/37020/adpushup.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:4400::ac40:99f7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
26914004d3a8d5ddde2202b642d7936eb61c9f195b5cd3c87e44ef8ad4d57c16

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Mon, 28 Jun 2021 04:15:23 GMT
server
cloudflare
age
6129173
etag
W/"60d94cdb-1c2"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=31536000
cf-ray
709158ed38906969-FRA
expires
Wed, 10 May 2023 08:36:28 GMT
gpt.js
securepubads.g.doubleclick.net/tag/js/
80 KB
28 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: cdn.adpushup.com
URL: https://cdn.adpushup.com/37020/adpushup.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
sffe /
Resource Hash
201e61defb5f864cbfa2a3ec44fb4dfad940083668484254d8de856a6834384d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
28363
x-xss-protection
0
server
sffe
etag
"1210 / 813 of 1000 / last-modified: 1652133895"
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Tue, 10 May 2022 08:36:28 GMT
apstag.js
c.amazon-adsystem.com/aax2/
135 KB
37 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: cdn.adpushup.com
URL: https://cdn.adpushup.com/37020/adpushup.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
108.138.3.177 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-108-138-3-177.fra56.r.cloudfront.net
Software
Server /
Resource Hash
1909b2a83fd41494d94862c4323944d9d0aa1f1e653f252ea5a73fc5944308b0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:31:31 GMT
content-encoding
gzip
age
297
x-cache
Hit from cloudfront
timing-allow-origin
*
server
Server
x-amz-rid
036WV79SXZDP59MJW6X3
etag
4abd427e43cd6822329a2c05539e321f
vary
Accept-Encoding
x-amz-version-id
STlSjRvyyTgJyl_raxUeHIFBn6F5DqB3
via
1.1 3a4987afa567e120a2fa0d82969d4c0a.cloudfront.net (CloudFront)
cache-control
public, max-age=900
x-amz-cf-pop
FRA56-P6
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
PRpqMEFA5MDYAToGyVpDCsDp3f4oHaO7kZzM9UUVoQUHVnVetMa0xA==
log
aplogger.adpushup.com/
0
119 B
Image
General
Full URL
https://aplogger.adpushup.com/log?pxRes=false&event=PPID_ANALYTICS_C1&data=eyJ1c2VySWQiOm51bGwsInNlc3Npb25JZCI6bnVsbCwicHBpZEFwcGxpY2FibGUiOiJNaXNzaW5nIiwic2l0ZUlkIjozNzAyMH0%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
51.124.210.81 Amsterdam, Netherlands, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Connection
keep-alive
Date
Tue, 10 May 2022 08:36:28 GMT
Server
nginx/1.14.0 (Ubuntu)
sync
e3.adpushup.com/AdPushupFeedbackWebService/user/
70 B
320 B
Image
General
Full URL
https://e3.adpushup.com/AdPushupFeedbackWebService/user/sync
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.97.225.52 Amsterdam, Netherlands, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3849fdc1eab88579b20b1b56875d6ef8299c4ad165e03921400ccae69149861

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 10 May 2022 08:36:27 GMT
ap-cookie-status
cookies ap_uid and ap_usid not set due to GDPR
access-control-allow-methods
GET, POST
content-type
image/png
access-control-allow-origin
https://thehackernews.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
x-robots-tag
noindex
content-length
70
expires
0
show_ads_impl_with_ama_fy2019.js
pagead2.googlesyndication.com/pagead/managed/js/adsense/m202205050101/
308 KB
110 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/managed/js/adsense/m202205050101/show_ads_impl_with_ama_fy2019.js?client=ca-pub-7983783048239650&plah=thehackernews.com&bust=31067451
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
8a0d568b0991ef267e3b43710bed820c4e54c8c0e9cf7eff879ae5b842e52135
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
112664
x-xss-protection
0
server
cafe
etag
9001647133351033269
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600, stale-while-revalidate=3600
timing-allow-origin
*
expires
Tue, 10 May 2022 08:36:28 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20220505/r20190131/ Frame 64B7
10 KB
5 KB
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20220505/r20190131/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:812::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
42b853168bb627593eb95b83db66183f7b3bd442db24c37398f1958d1451acd6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

age
55103
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
cache-control
public, max-age=1209600
content-encoding
gzip
content-length
4421
content-type
text/html; charset=UTF-8
cross-origin-resource-policy
cross-origin
date
Mon, 09 May 2022 17:18:05 GMT
etag
1428802124239944296
expires
Mon, 23 May 2022 17:18:05 GMT
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
server
cafe
timing-allow-origin
*
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
AGSKWxWGtL7zuZ1y1IcNdDu97XV3A1nSFYlAxzUsMF11iBnZwCEpDsaZDLJvauA2_Cx3VImW-PkAxWSsA1Yld5y1tqA=
fundingchoicesmessages.google.com/f/
91 KB
32 KB
Script
General
Full URL
https://fundingchoicesmessages.google.com/f/AGSKWxWGtL7zuZ1y1IcNdDu97XV3A1nSFYlAxzUsMF11iBnZwCEpDsaZDLJvauA2_Cx3VImW-PkAxWSsA1Yld5y1tqA=
Requested by
Host: cdn.adpushup.com
URL: https://cdn.adpushup.com/37020/adpushup.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
5bc8a1033ffbdc0f0080882053f51a7f277f8a4dd029cab1b999dc8cdf728059
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-nheyTjAgU6CcMw1mvCCd0w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorGlobalRouterHttp/cspreport;worker-src 'self', script-src 'nonce-nheyTjAgU6CcMw1mvCCd0w' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorGlobalRouterHttp/cspreport, require-trusted-types-for 'script';report-uri /_/ContributorGlobalRouterHttp/cspreport
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
pragma
no-cache
server
ESF
cross-origin-opener-policy
same-origin
x-frame-options
SAMEORIGIN
vary
Sec-Fetch-Dest, Sec-Fetch-Mode, Sec-Fetch-Site
content-type
application/javascript; charset=utf-8
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
cache-control
no-cache, no-store, max-age=0, must-revalidate
permissions-policy
ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-platform=*, ch-ua-platform-version=*
content-security-policy
script-src 'report-sample' 'nonce-nheyTjAgU6CcMw1mvCCd0w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorGlobalRouterHttp/cspreport;worker-src 'self', script-src 'nonce-nheyTjAgU6CcMw1mvCCd0w' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorGlobalRouterHttp/cspreport, require-trusted-types-for 'script';report-uri /_/ContributorGlobalRouterHttp/cspreport
expires
Mon, 01 Jan 1990 00:00:00 GMT
quant.js
secure.quantserve.com/
24 KB
10 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: cdn.adpushup.com
URL: https://cdn.adpushup.com/pbuseridscripts/quantcast.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:116:800d:21:5a23:9c4e:e774:96c1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
8d6580af877387b05d9ffac3ebeacfe25a7728c77adef6d9b32fd72ccbe21468

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
gzip
etag
"u2JtyZzqnTXwzBUswy2r+w=="
vary
Accept-Encoding
content-type
application/javascript
cache-control
private, max-age=604800
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
expires
Tue, 17 May 2022 08:36:28 GMT
shellcode-malware.jpg
thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEgvJfLXdUTf2BzHvnefcr_Fva7UCjqWOBZwOPJoij9C9ibwvcV-5qEaY-JxGOpW5ssQx16vD43gW6tjuuynIUVQBtvKSB28AJDraP1kTWPLaodJtBwbWhXQebLyQUamwS5Vn-ImTRkaob4ot0xDu...
3 KB
4 KB
Image
General
Full URL
https://thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEgvJfLXdUTf2BzHvnefcr_Fva7UCjqWOBZwOPJoij9C9ibwvcV-5qEaY-JxGOpW5ssQx16vD43gW6tjuuynIUVQBtvKSB28AJDraP1kTWPLaodJtBwbWhXQebLyQUamwS5Vn-ImTRkaob4ot0xDur334LrwRy7TlfKBKw2Eil-ReBVl-Zcjy5hqI0IW/w72-h72-p-k-no-nu/shellcode-malware.jpg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::ac43:4615 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f5f5b73fd7cec06eb703c026c7d4e3e68ba69c23cd2278c679763daea9b5d39c
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
150492
cf-polished
origSize=3014, status=webp_bigger
x-forwarded-for
2003:c4:df15:d64a:8c3e:9600:dd84:59e9
content-disposition
inline;filename="shellcode-malware.jpg"
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
2995
x-xss-protection
0
expires
Mon, 09 May 2022 14:48:16 GMT
cf-bgj
imgq:100,h2pri
server
cloudflare
etag
"v1948"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=D5ikaHq6bxGYYfcSCM6RSjVupW761GaHSwdSNU3CyI3ono5Hy296tJxrM02AFjS%2FCJ4FRYVf7a1NZBK28DmH%2B6qAYdSUxOpm%2FyDuhWLQJLW8OOpEO037KgPxm7cHWQ8ooJjiZ0xv8wb8CWXWPDbh"}],"group":"cf-nel","max_age":604800}
content-type
image/jpeg
vary
Accept-Encoding
cache-control
public, max-age=8640000, immutable, s-maxage=8640000
accept-ranges
bytes
cf-ray
709158edbd439b2d-FRA
access-control-expose-headers
Content-Length
config
c.amazon-adsystem.com/cdn/prod/
0
310 B
XHR
General
Full URL
https://c.amazon-adsystem.com/cdn/prod/config?src=600&u=https%3A%2F%2Fthehackernews.com&pubid=2e7e1587-d92f-46dd-8721-80b53eccb87e
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
108.138.3.177 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-108-138-3-177.fra56.r.cloudfront.net
Software
Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 07:43:45 GMT
via
1.1 3a4987afa567e120a2fa0d82969d4c0a.cloudfront.net (CloudFront)
server
Server
age
3163
x-cache
Hit from cloudfront
access-control-allow-origin
https://thehackernews.com
cache-control
max-age=21550, s-maxage=21600
access-control-allow-credentials
true
x-amz-cf-pop
FRA56-P6
x-amz-cf-id
wUdRQPONA0iTw7hWAy-jzgTT1-BHeW9lIscgLBTiYBAa_jTVWbSRjA==
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
108.138.3.177 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-108-138-3-177.fra56.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

x-amz-version-id
aaJeHz3g2a7aWr9hYquBq.aDaObnNoK3
content-encoding
gzip
etag
W/"a4d296427fc806b21335359e398c025c"
age
15483
x-cache
Hit from cloudfront
access-control-max-age
3000
access-control-allow-origin
*
last-modified
Thu, 28 Apr 2022 01:41:20 GMT
server
AmazonS3
date
Tue, 10 May 2022 04:18:26 GMT
vary
Origin
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 bfb5bffe90e3b0e760933a7a07d850ba.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA56-P6
x-amz-cf-id
fBI6_ZIsbAybtB3muHo_AID5YXYzIsMjOCmvw52j9b6Nl4q5MoIdQQ==
pubads_impl_2022050501.js
securepubads.g.doubleclick.net/gpt/
368 KB
125 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022050501.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
sffe /
Resource Hash
e680f84f5a15d5113b3d271f4f26456bbdd12103f70eaaf21ab08ef68aee9753
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:31:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
274
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
127685
x-xss-protection
0
last-modified
Thu, 05 May 2022 08:34:36 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
public, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Wed, 10 May 2023 08:31:54 GMT
ppub_config
securepubads.g.doubleclick.net/pagead/
164 B
138 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/pagead/ppub_config?ippd=thehackernews.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
019d22d3e70ec460a085db138f131a9d77cb25175dd7eecb155305c270ed221c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private, max-age=3600, stale-while-revalidate=3600
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
113
x-xss-protection
0
expires
Tue, 10 May 2022 08:36:28 GMT
rules-p-54Nt-1NAaEEe0.js
rules.quantcount.com/
2 B
345 B
Script
General
Full URL
https://rules.quantcount.com/rules-p-54Nt-1NAaEEe0.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2490:8e00:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:02:44 GMT
via
1.1 57eb57a4c7d431365ab5b2e18c495bf4.cloudfront.net (CloudFront)
server
AmazonS3
age
2024
access-control-allow-methods
GET
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=3600
cross-origin-resource-policy
cross-origin
x-cache
Hit from cloudfront
x-amz-cf-pop
FRA56-P6
content-length
2
x-amz-cf-id
_Mc0vrGitCMVr_p7KL10fbnw2VtIMUYzwniUyG9PpzaC6fHerFOJBw==
AGSKWxV8PwvPdYvqc2wp5VoZ4xmjgjeEnXpAiPQ3WZVcRiqc8egi0XizmMvaZogxSfLUA8AxWrhPz2OKMU_RAkzMLjM=
fundingchoicesmessages.google.com/el/
0
29 B
XHR
General
Full URL
https://fundingchoicesmessages.google.com/el/AGSKWxV8PwvPdYvqc2wp5VoZ4xmjgjeEnXpAiPQ3WZVcRiqc8egi0XizmMvaZogxSfLUA8AxWrhPz2OKMU_RAkzMLjM=?pvid=4E79E5C0-0EB7-40F9-B765-AB958C7C89C8&anonid=46126F82-04EE-478C-A8E6-A445E15CACB0
Requested by
Host:
URL: /_/mss/boq-content-ads-contributor/_/js/k=boq-content-ads-contributor.ContributorServingResponseClientJs.de.sN44RTDkm6g.es5.O/d=1/rs=AJlcJMyO9XmU5jwt-2mjmHECLUNgoFMBkg/m=kernel_loader,loader_js_executable
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-4u0eDpJEBQCp1gRFOqOOuQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorLoggingHttp/cspreport;worker-src 'self', script-src 'nonce-4u0eDpJEBQCp1gRFOqOOuQ' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorLoggingHttp/cspreport, require-trusted-types-for 'script';report-uri /_/ContributorLoggingHttp/cspreport
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
access-control-allow-methods
POST, GET, OPTIONS
x-content-type-options
nosniff
access-control-allow-origin
https://thehackernews.com
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
pragma
no-cache
server
ESF
cross-origin-opener-policy
same-origin; report-to="ContributorLoggingHttp"
x-frame-options
SAMEORIGIN
access-control-max-age
86400
report-to
{"group":"ContributorLoggingHttp","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ContributorLoggingHttp/external"}]}
content-type
text/html; charset=utf-8
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
vary
Sec-Fetch-Dest, Sec-Fetch-Mode, Sec-Fetch-Site
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
permissions-policy
ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-platform=*, ch-ua-platform-version=*
content-security-policy
script-src 'report-sample' 'nonce-4u0eDpJEBQCp1gRFOqOOuQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorLoggingHttp/cspreport;worker-src 'self', script-src 'nonce-4u0eDpJEBQCp1gRFOqOOuQ' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorLoggingHttp/cspreport, require-trusted-types-for 'script';report-uri /_/ContributorLoggingHttp/cspreport
expires
Mon, 01 Jan 1990 00:00:00 GMT
AGSKWxV8PwvPdYvqc2wp5VoZ4xmjgjeEnXpAiPQ3WZVcRiqc8egi0XizmMvaZogxSfLUA8AxWrhPz2OKMU_RAkzMLjM=
fundingchoicesmessages.google.com/el/
0
28 B
XHR
General
Full URL
https://fundingchoicesmessages.google.com/el/AGSKWxV8PwvPdYvqc2wp5VoZ4xmjgjeEnXpAiPQ3WZVcRiqc8egi0XizmMvaZogxSfLUA8AxWrhPz2OKMU_RAkzMLjM=?pvid=4E79E5C0-0EB7-40F9-B765-AB958C7C89C8&anonid=46126F82-04EE-478C-A8E6-A445E15CACB0
Requested by
Host:
URL: /_/mss/boq-content-ads-contributor/_/js/k=boq-content-ads-contributor.ContributorServingResponseClientJs.de.sN44RTDkm6g.es5.O/d=1/rs=AJlcJMyO9XmU5jwt-2mjmHECLUNgoFMBkg/m=kernel_loader,loader_js_executable
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-sxxGkwfOkKZr53pNc31uGA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorLoggingHttp/cspreport;worker-src 'self', script-src 'nonce-sxxGkwfOkKZr53pNc31uGA' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorLoggingHttp/cspreport, require-trusted-types-for 'script';report-uri /_/ContributorLoggingHttp/cspreport
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
x-content-type-options
nosniff
access-control-allow-origin
https://thehackernews.com
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
pragma
no-cache
server
ESF
cross-origin-opener-policy
same-origin
x-frame-options
SAMEORIGIN
access-control-max-age
86400
access-control-allow-methods
POST, GET, OPTIONS
content-type
text/html; charset=utf-8
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
vary
Sec-Fetch-Dest, Sec-Fetch-Mode, Sec-Fetch-Site
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
permissions-policy
ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-platform=*, ch-ua-platform-version=*
content-security-policy
script-src 'report-sample' 'nonce-sxxGkwfOkKZr53pNc31uGA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorLoggingHttp/cspreport;worker-src 'self', script-src 'nonce-sxxGkwfOkKZr53pNc31uGA' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorLoggingHttp/cspreport, require-trusted-types-for 'script';report-uri /_/ContributorLoggingHttp/cspreport
expires
Mon, 01 Jan 1990 00:00:00 GMT
feedback
e3.adpushup.com/AdPushupFeedbackWebService/
70 B
131 B
Image
General
Full URL
https://e3.adpushup.com/AdPushupFeedbackWebService/feedback?data=eyJjcmVhdGVkVFMiOjE2NTIxNzE3ODg1MDUsInBhY2tldElkIjoiMDAwMDkwOUMtMTU4Y2ZiODQtYjQzNy00NTMyLWJiOWEtYzhiNzNhN2QxODc1Iiwic2l0ZUlkIjozNzAyMCwic2l0ZURvbWFpbiI6Imh0dHBzOi8vdGhlaGFja2VybmV3cy5jb20vIiwidXJsIjoiaHR0cHM6Ly90aGVoYWNrZXJuZXdzLmNvbS8yMDIyLzA1L2NoaW5lc2UtaGFja2Vycy1jYXVnaHQtZXhwbG9pdGluZy5odG1sIiwibW9kZSI6MiwiZXJyb3JDb2RlIjo3LCJyZWZlcnJlciI6IiIsInBhZ2VHcm91cCI6IlBPU1QiLCJwbGF0Zm9ybSI6IkRFU0tUT1AiLCJpc0dlbmllZSI6ZmFsc2UsInNlY3Rpb25zIjpudWxsfQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.97.225.52 Amsterdam, Netherlands, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3849fdc1eab88579b20b1b56875d6ef8299c4ad165e03921400ccae69149861

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 10 May 2022 08:36:27 GMT
access-control-allow-methods
GET, POST
content-type
image/png
access-control-allow-origin
https://thehackernews.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
x-robots-tag
noindex
content-length
70
expires
0
AGSKWxV3aZ4lhA4MvKxzlxZc78kOOAZBWpDgSno3EkThY5fvz1r3MhnZK8QVD38phK5AC9qpNM1-EmSllfjsKYHQoyk=
fundingchoicesmessages.google.com/el/
0
28 B
XHR
General
Full URL
https://fundingchoicesmessages.google.com/el/AGSKWxV3aZ4lhA4MvKxzlxZc78kOOAZBWpDgSno3EkThY5fvz1r3MhnZK8QVD38phK5AC9qpNM1-EmSllfjsKYHQoyk=?pvid=4E79E5C0-0EB7-40F9-B765-AB958C7C89C8&anonid=46126F82-04EE-478C-A8E6-A445E15CACB0
Requested by
Host:
URL: /_/mss/boq-content-ads-contributor/_/js/k=boq-content-ads-contributor.ContributorServingResponseClientJs.de.sN44RTDkm6g.es5.O/d=1/rs=AJlcJMyO9XmU5jwt-2mjmHECLUNgoFMBkg/m=kernel_loader,loader_js_executable
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy require-trusted-types-for 'script';report-uri /_/ContributorLoggingHttp/cspreport, script-src 'report-sample' 'nonce-fN1atRJKGd86tpchdGsSWw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorLoggingHttp/cspreport;worker-src 'self', script-src 'nonce-fN1atRJKGd86tpchdGsSWw' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorLoggingHttp/cspreport
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
x-content-type-options
nosniff
access-control-allow-origin
https://thehackernews.com
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
pragma
no-cache
server
ESF
cross-origin-opener-policy
same-origin
x-frame-options
SAMEORIGIN
access-control-max-age
86400
access-control-allow-methods
POST, GET, OPTIONS
content-type
text/html; charset=utf-8
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
vary
Sec-Fetch-Dest, Sec-Fetch-Mode, Sec-Fetch-Site
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
permissions-policy
ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-platform=*, ch-ua-platform-version=*
content-security-policy
require-trusted-types-for 'script';report-uri /_/ContributorLoggingHttp/cspreport, script-src 'report-sample' 'nonce-fN1atRJKGd86tpchdGsSWw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorLoggingHttp/cspreport;worker-src 'self', script-src 'nonce-fN1atRJKGd86tpchdGsSWw' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorLoggingHttp/cspreport
expires
Mon, 01 Jan 1990 00:00:00 GMT
AGSKWxXubVMyVbWebPGeWa-OGuWzQR2rG80Oenm1yjRX4z9XfttzH2PwyylD4gQdo4Eji_WVKilLqo3gEt52xJbfJHQ=
fundingchoicesmessages.google.com/f/
259 KB
53 KB
Script
General
Full URL
https://fundingchoicesmessages.google.com/f/AGSKWxXubVMyVbWebPGeWa-OGuWzQR2rG80Oenm1yjRX4z9XfttzH2PwyylD4gQdo4Eji_WVKilLqo3gEt52xJbfJHQ=?fccs=W251bGwsbnVsbCxudWxsLG51bGwsbnVsbCxudWxsLFsxNjUyMTcxNzg4LDUzMTAwMDAwMF0sIjRFNzlFNUMwLTBFQjctNDBGOS1CNzY1LUFCOTU4QzdDODlDOCIsIjQ2MTI2RjgyLTA0RUUtNDc4Qy1BOEU2LUE0NDVFMTVDQUNCMCIsbnVsbCxbbnVsbCxbN11dLCJodHRwczovL3RoZWhhY2tlcm5ld3MuY29tLzIwMjIvMDUvY2hpbmVzZS1oYWNrZXJzLWNhdWdodC1leHBsb2l0aW5nLmh0bWwiLG51bGwsW11d
Requested by
Host:
URL: /_/mss/boq-content-ads-contributor/_/js/k=boq-content-ads-contributor.ContributorServingResponseClientJs.de.sN44RTDkm6g.es5.O/d=1/rs=AJlcJMyO9XmU5jwt-2mjmHECLUNgoFMBkg/m=kernel_loader,loader_js_executable
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
f151bd76fc55325144596ed72afb89d526a50797a59e6847059d8d058583f562
Security Headers
Name Value
Content-Security-Policy require-trusted-types-for 'script';report-uri /_/ContributorGlobalRouterHttp/cspreport, script-src 'report-sample' 'nonce-4BsJ2bL2t9qK1k1gDbe69w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorGlobalRouterHttp/cspreport;worker-src 'self', script-src 'nonce-4BsJ2bL2t9qK1k1gDbe69w' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorGlobalRouterHttp/cspreport
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
pragma
no-cache
server
ESF
cross-origin-opener-policy
same-origin
x-frame-options
SAMEORIGIN
vary
Sec-Fetch-Dest, Sec-Fetch-Mode, Sec-Fetch-Site
content-type
application/javascript; charset=utf-8
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
cache-control
no-cache, no-store, max-age=0, must-revalidate
permissions-policy
ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-platform=*, ch-ua-platform-version=*
content-security-policy
require-trusted-types-for 'script';report-uri /_/ContributorGlobalRouterHttp/cspreport, script-src 'report-sample' 'nonce-4BsJ2bL2t9qK1k1gDbe69w' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorGlobalRouterHttp/cspreport;worker-src 'self', script-src 'nonce-4BsJ2bL2t9qK1k1gDbe69w' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorGlobalRouterHttp/cspreport
expires
Mon, 01 Jan 1990 00:00:00 GMT
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
eae76cb616003cb3e918dfd9f58d63cc8e832aa9d11a9eda64b1476af57e746a

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

Content-Type
image/jpeg
feedback
e3.adpushup.com/AdPushupFeedbackWebService/
70 B
131 B
Image
General
Full URL
https://e3.adpushup.com/AdPushupFeedbackWebService/feedback?data=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%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.97.225.52 Amsterdam, Netherlands, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3849fdc1eab88579b20b1b56875d6ef8299c4ad165e03921400ccae69149861

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 10 May 2022 08:36:27 GMT
access-control-allow-methods
GET, POST
content-type
image/png
access-control-allow-origin
https://thehackernews.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
x-robots-tag
noindex
content-length
70
expires
0
feedback
e3.adpushup.com/AdPushupFeedbackWebService/
70 B
131 B
Image
General
Full URL
https://e3.adpushup.com/AdPushupFeedbackWebService/feedback?data=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%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.97.225.52 Amsterdam, Netherlands, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
/
Resource Hash
e3849fdc1eab88579b20b1b56875d6ef8299c4ad165e03921400ccae69149861

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 10 May 2022 08:36:27 GMT
access-control-allow-methods
GET, POST
content-type
image/png
access-control-allow-origin
https://thehackernews.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
x-robots-tag
noindex
content-length
70
expires
0
bid
c.amazon-adsystem.com/e/dtb/
23 B
491 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=600&u=https%3A%2F%2Fthehackernews.com%2F2022%2F05%2Fchinese-hackers-caught-exploiting.html&pid=Hi2ILLtni95LX&cb=0&ws=1600x1200&v=7.75.0&t=3000&slots=%5B%7B%22sd%22%3A%22ADP_37020_responsivexresponsive_00000001-d7678797-d5bf-4763-b78c-8771a0235e46%22%2C%22s%22%3A%5B%22730x290%22%2C%22728x280%22%2C%22728x250%22%2C%22728x90%22%2C%22690x90%22%2C%22690x250%22%2C%22690x280%22%2C%22675x90%22%2C%22675x280%22%2C%22675x250%22%2C%22670x90%22%2C%22670x280%22%2C%22670x250%22%2C%22650x90%22%2C%22650x280%22%2C%22650x250%22%2C%22650x150%22%2C%22630x90%22%2C%22630x280%22%2C%22630x250%22%2C%22602x100%22%2C%22600x90%22%2C%22600x280%22%2C%22600x250%22%2C%22580x90%22%2C%22570x90%22%2C%22550x150%22%2C%22468x60%22%2C%22336x280%22%2C%22320x50%22%2C%22320x100%22%2C%22300x50%22%2C%22300x100%22%2C%22300x75%22%2C%22300x250%22%2C%22250x250%22%2C%22200x200%22%5D%2C%22sn%22%3A%22%2F103512698%2F22055424785%22%7D%2C%7B%22sd%22%3A%22ADP_37020_responsivexresponsive_00000001-0f35e037-dfd6-416d-9a0f-aaa0ecc90269%22%2C%22s%22%3A%5B%22730x290%22%2C%22728x280%22%2C%22728x250%22%2C%22728x90%22%2C%22690x90%22%2C%22690x250%22%2C%22690x280%22%2C%22675x90%22%2C%22675x280%22%2C%22675x250%22%2C%22670x90%22%2C%22670x280%22%2C%22670x250%22%2C%22650x90%22%2C%22650x280%22%2C%22650x250%22%2C%22650x150%22%2C%22630x90%22%2C%22630x280%22%2C%22630x250%22%2C%22602x100%22%2C%22600x90%22%2C%22600x280%22%2C%22600x250%22%2C%22580x90%22%2C%22570x90%22%2C%22550x150%22%2C%22468x60%22%2C%22336x280%22%2C%22320x50%22%2C%22320x100%22%2C%22300x50%22%2C%22300x100%22%2C%22300x75%22%2C%22300x250%22%2C%22250x250%22%2C%22200x200%22%5D%2C%22sn%22%3A%22%2F103512698%2F22055889203%22%7D%5D&schain=1.0%2C1!adpushup.com%2Caeb138a66c47c1d438a8907993e81712%2C1%2C%2C%2C&pubid=2e7e1587-d92f-46dd-8721-80b53eccb87e&gdpre=1&gdprl=%7B%22status%22%3A%22tcfv2-success%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
108.138.3.177 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-108-138-3-177.fra56.r.cloudfront.net
Software
Server /
Resource Hash
745a085b52b8371ec6705413fca70a28c6d8bff0db480e6b124bd08c54e95ef8
Security Headers
Name Value
Strict-Transport-Security max-age=47474747; includeSubDomains; preload

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
via
1.1 3a4987afa567e120a2fa0d82969d4c0a.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
FRA56-P6
x-amz-rid
0XVD9GRHN7EHJSCAXTS0
vary
Accept-Encoding,User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://thehackernews.com
access-control-allow-credentials
true
permissions-policy
interest-cohort=()
strict-transport-security
max-age=47474747; includeSubDomains; preload
timing-allow-origin
*
content-length
23
x-amz-cf-id
bolZa2eHr5dWQJRs3Vy9CNNAGnEcY42P_atPsHwUDtjCcCtAh0ROCg==
json
gum.criteo.com/sid/ Frame
0
0
Preflight
General
Full URL
https://gum.criteo.com/sid/json?origin=prebid&topUrl=https%3A%2F%2Fthehackernews.com%2F&domain=thehackernews.com&cw=1&lsw=1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a02:2638:1::13 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload;

Request headers

Accept
*/*
Access-Control-Request-Headers
content-type
Access-Control-Request-Method
GET
Origin
https://thehackernews.com
Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

access-control-allow-credentials
true
access-control-allow-headers
content-type
access-control-allow-methods
GET
access-control-allow-origin
https://thehackernews.com
cache-control
no-cache, no-store, must-revalidate
content-encoding
gzip
content-type
application/json; charset=utf-8
date
Tue, 10 May 2022 08:36:27 GMT
expires
0
pragma
no-cache
server-processing-duration-in-ticks
1537
strict-transport-security
max-age=31536000; preload;
vary
Accept-Encoding
latest.json
cdn.jsdelivr.net/gh/prebid/currency-file@1/
2 KB
2 KB
XHR
General
Full URL
https://cdn.jsdelivr.net/gh/prebid/currency-file@1/latest.json?date=20220510
Requested by
Host: cdn.adpushup.com
URL: https://cdn.adpushup.com/prebid/pb.37020.1631637442652.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:5614 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
394b228d6f8d9618f9635f01ed827045a43b28f1f969f2ebde80366e9806efeb
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
age
20128
x-jsd-version
1.0.1336
x-cache
HIT
cross-origin-resource-policy
cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
x-served-by
cache-fra19163-FRA
timing-allow-origin
*
x-jsd-version-type
version
server
cloudflare
etag
W/"667-uku8tNAVAz+3TLwyM9O/XVqaNwA"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Lld%2B3KMatqz1Yrmz1Lj4QBp6CDe86MKV4CpaDndtUNte%2Ba2xcKJuKesSi%2FqUzlDtDFzOrtbuQFpjzMhe0%2B%2F7NX6TcK02iwu%2B2Ljehe4Tl4CCvN0cM%2FFGaMZFPcER7Zr9E8nlIH9xwVXrCR4zKgo%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=604800, s-maxage=43200
cf-ray
709158eeeda89b9b-FRA
sid
mug.criteo.com/
Redirect Chain
  • https://gum.criteo.com/sid/json?origin=prebid&topUrl=https%3A%2F%2Fthehackernews.com%2F&domain=thehackernews.com&cw=1&lsw=1
  • https://mug.criteo.com/sid?cpp=sGw5ZHxFc2w1OVpuZmRwampzTGJ0NlpPcjVnbUdlY3dQK2xDN0ZTNjFGWjcxYkwyQ0UzQ1ROcDNGdmlWVzdha3dGNHlyZDkxdU5rbytxMkgzMW44cE1ENnBTdldaWnFlUG16NE10N0hkdWdIUE5GeitmVFRhSjk1SUxYdF...
353 B
619 B
XHR
General
Full URL
https://mug.criteo.com/sid?cpp=sGw5ZHxFc2w1OVpuZmRwampzTGJ0NlpPcjVnbUdlY3dQK2xDN0ZTNjFGWjcxYkwyQ0UzQ1ROcDNGdmlWVzdha3dGNHlyZDkxdU5rbytxMkgzMW44cE1ENnBTdldaWnFlUG16NE10N0hkdWdIUE5GeitmVFRhSjk1SUxYdFlrbzBQdDd6UCs1SnpUOVVmUktVem9naE9Gc1NYakFLTmplM2haVU9GYUtzdis0WHFuSTJsYlNiSXBEUGEwbEVuT1hDeWg3SUFta1lqY2FtZXdlUk9mSUpzRDQ1dTc3NSs0ZC80RFVCNDB2a295TWxyajF3PXw&cppv=2
Protocol
H2
Server
178.250.0.157 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
/
Resource Hash
ff8e1203f10df61545ab06eaa9afd3cc809a872458fb540b1f240b0757f81c5b
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload;

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 10 May 2022 08:36:28 GMT
content-encoding
gzip
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
application/json; charset=utf-8
access-control-allow-origin
null
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
server-processing-duration-in-ticks
3111
strict-transport-security
max-age=31536000; preload;
expires
0

Redirect headers

pragma
no-cache
date
Tue, 10 May 2022 08:36:28 GMT
location
https://mug.criteo.com/sid?cpp=sGw5ZHxFc2w1OVpuZmRwampzTGJ0NlpPcjVnbUdlY3dQK2xDN0ZTNjFGWjcxYkwyQ0UzQ1ROcDNGdmlWVzdha3dGNHlyZDkxdU5rbytxMkgzMW44cE1ENnBTdldaWnFlUG16NE10N0hkdWdIUE5GeitmVFRhSjk1SUxYdFlrbzBQdDd6UCs1SnpUOVVmUktVem9naE9Gc1NYakFLTmplM2haVU9GYUtzdis0WHFuSTJsYlNiSXBEUGEwbEVuT1hDeWg3SUFta1lqY2FtZXdlUk9mSUpzRDQ1dTc3NSs0ZC80RFVCNDB2a295TWxyajF3PXw&cppv=2
strict-transport-security
max-age=31536000; preload;
access-control-allow-methods
GET
content-type
text/html; charset=utf-8
access-control-allow-origin
https://thehackernews.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
server-processing-duration-in-ticks
1855
content-length
482
expires
0
AGSKWxXkLUTNNbfd-QhHr4R-pkrP6JwvNCuAUvxbR11OhUkoJN9Vcy_eLEjgmPL9fuHS4dm2NPXanUiqVQpiomOzAfTj8O9nViPuQoY8uZ9YzOl8hxpk9BlTcagEMaJCloIO_oKLlyK2S2l8YGTx4G62FsATzNAknU0IW84csu7UmJp04HUp4P2fex8tvvtL
fundingchoicesmessages.google.com/el/
0
28 B
XHR
General
Full URL
https://fundingchoicesmessages.google.com/el/AGSKWxXkLUTNNbfd-QhHr4R-pkrP6JwvNCuAUvxbR11OhUkoJN9Vcy_eLEjgmPL9fuHS4dm2NPXanUiqVQpiomOzAfTj8O9nViPuQoY8uZ9YzOl8hxpk9BlTcagEMaJCloIO_oKLlyK2S2l8YGTx4G62FsATzNAknU0IW84csu7UmJp04HUp4P2fex8tvvtL?dmid=970e7566fd7b1e49
Requested by
Host:
URL: /_/mss/boq-content-ads-contributor/_/js/k=boq-content-ads-contributor.ContributorIabTcfV2ClientJs.de.2fwkfWRcBN4.es5.O/d=1/rs=AJlcJMxECFc_7wthagXgW9R5gQCy0fmbJg/m=iabtcfv2wallscript
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy require-trusted-types-for 'script';report-uri /_/ContributorLoggingHttp/cspreport, script-src 'report-sample' 'nonce-rhoUJ-FkR4RF4noxppSB0A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorLoggingHttp/cspreport;worker-src 'self', script-src 'nonce-rhoUJ-FkR4RF4noxppSB0A' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorLoggingHttp/cspreport
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
x-content-type-options
nosniff
access-control-allow-origin
https://thehackernews.com
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
pragma
no-cache
server
ESF
cross-origin-opener-policy
same-origin
x-frame-options
SAMEORIGIN
access-control-max-age
86400
access-control-allow-methods
POST, GET, OPTIONS
content-type
text/html; charset=utf-8
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
vary
Sec-Fetch-Dest, Sec-Fetch-Mode, Sec-Fetch-Site
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
permissions-policy
ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-platform=*, ch-ua-platform-version=*
content-security-policy
require-trusted-types-for 'script';report-uri /_/ContributorLoggingHttp/cspreport, script-src 'report-sample' 'nonce-rhoUJ-FkR4RF4noxppSB0A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorLoggingHttp/cspreport;worker-src 'self', script-src 'nonce-rhoUJ-FkR4RF4noxppSB0A' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorLoggingHttp/cspreport
expires
Mon, 01 Jan 1990 00:00:00 GMT
AGSKWxXkLUTNNbfd-QhHr4R-pkrP6JwvNCuAUvxbR11OhUkoJN9Vcy_eLEjgmPL9fuHS4dm2NPXanUiqVQpiomOzAfTj8O9nViPuQoY8uZ9YzOl8hxpk9BlTcagEMaJCloIO_oKLlyK2S2l8YGTx4G62FsATzNAknU0IW84csu7UmJp04HUp4P2fex8tvvtL
fundingchoicesmessages.google.com/el/
0
28 B
XHR
General
Full URL
https://fundingchoicesmessages.google.com/el/AGSKWxXkLUTNNbfd-QhHr4R-pkrP6JwvNCuAUvxbR11OhUkoJN9Vcy_eLEjgmPL9fuHS4dm2NPXanUiqVQpiomOzAfTj8O9nViPuQoY8uZ9YzOl8hxpk9BlTcagEMaJCloIO_oKLlyK2S2l8YGTx4G62FsATzNAknU0IW84csu7UmJp04HUp4P2fex8tvvtL?dmid=970e7566fd7b1e49
Requested by
Host:
URL: /_/mss/boq-content-ads-contributor/_/js/k=boq-content-ads-contributor.ContributorIabTcfV2ClientJs.de.2fwkfWRcBN4.es5.O/d=1/rs=AJlcJMxECFc_7wthagXgW9R5gQCy0fmbJg/m=iabtcfv2wallscript
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-fjJ-yEQ1ypuBSClw70xYBQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorLoggingHttp/cspreport;worker-src 'self', script-src 'nonce-fjJ-yEQ1ypuBSClw70xYBQ' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorLoggingHttp/cspreport, require-trusted-types-for 'script';report-uri /_/ContributorLoggingHttp/cspreport
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
x-content-type-options
nosniff
access-control-allow-origin
https://thehackernews.com
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
pragma
no-cache
server
ESF
cross-origin-opener-policy
same-origin
x-frame-options
SAMEORIGIN
access-control-max-age
86400
access-control-allow-methods
POST, GET, OPTIONS
content-type
text/html; charset=utf-8
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
vary
Sec-Fetch-Dest, Sec-Fetch-Mode, Sec-Fetch-Site
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
permissions-policy
ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-platform=*, ch-ua-platform-version=*
content-security-policy
script-src 'report-sample' 'nonce-fjJ-yEQ1ypuBSClw70xYBQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorLoggingHttp/cspreport;worker-src 'self', script-src 'nonce-fjJ-yEQ1ypuBSClw70xYBQ' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorLoggingHttp/cspreport, require-trusted-types-for 'script';report-uri /_/ContributorLoggingHttp/cspreport
expires
Mon, 01 Jan 1990 00:00:00 GMT
css
fonts.googleapis.com/
60 KB
4 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Archivo|Arimo|Bitter|EB+Garamond|Lato|Libre+Baskerville|Libre+Franklin|Lora|Google+Sans:regular,medium|Material+Icons|Merriweather|Montserrat|Mukta|Muli|Nunito|Open+Sans:400,600,700|Open+Sans+Condensed:300,400,600,700|Oswald|Playfair+Display|Poppins|Raleway|Roboto|Roboto+Condensed|Roboto+Slab|Slabo+27px|Source+Sans+Pro|Ubuntu|Volkhov&display=swap
Requested by
Host:
URL: /_/mss/boq-content-ads-contributor/_/js/k=boq-content-ads-contributor.ContributorIabTcfV2ClientJs.de.2fwkfWRcBN4.es5.O/d=1/rs=AJlcJMxECFc_7wthagXgW9R5gQCy0fmbJg/m=iabtcfv2wallscript
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
50d12a14f7245d52135bfe7ac98df628b4aa815f03ce81c7c347d0277450197f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Tue, 10 May 2022 08:36:28 GMT
server
ESF
cross-origin-opener-policy
same-origin-allow-popups
date
Tue, 10 May 2022 08:36:28 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Tue, 10 May 2022 08:36:28 GMT
AGSKWxXkLUTNNbfd-QhHr4R-pkrP6JwvNCuAUvxbR11OhUkoJN9Vcy_eLEjgmPL9fuHS4dm2NPXanUiqVQpiomOzAfTj8O9nViPuQoY8uZ9YzOl8hxpk9BlTcagEMaJCloIO_oKLlyK2S2l8YGTx4G62FsATzNAknU0IW84csu7UmJp04HUp4P2fex8tvvtL
fundingchoicesmessages.google.com/el/
0
28 B
XHR
General
Full URL
https://fundingchoicesmessages.google.com/el/AGSKWxXkLUTNNbfd-QhHr4R-pkrP6JwvNCuAUvxbR11OhUkoJN9Vcy_eLEjgmPL9fuHS4dm2NPXanUiqVQpiomOzAfTj8O9nViPuQoY8uZ9YzOl8hxpk9BlTcagEMaJCloIO_oKLlyK2S2l8YGTx4G62FsATzNAknU0IW84csu7UmJp04HUp4P2fex8tvvtL?dmid=970e7566fd7b1e49
Requested by
Host:
URL: /_/mss/boq-content-ads-contributor/_/js/k=boq-content-ads-contributor.ContributorIabTcfV2ClientJs.de.2fwkfWRcBN4.es5.O/d=1/rs=AJlcJMxECFc_7wthagXgW9R5gQCy0fmbJg/m=iabtcfv2wallscript
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy require-trusted-types-for 'script';report-uri /_/ContributorLoggingHttp/cspreport, script-src 'report-sample' 'nonce-BVxc5D7M4F6Rmc-hjyExRQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorLoggingHttp/cspreport;worker-src 'self', script-src 'nonce-BVxc5D7M4F6Rmc-hjyExRQ' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorLoggingHttp/cspreport
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36
Content-Type
text/plain

Response headers

date
Tue, 10 May 2022 08:36:28 GMT
x-content-type-options
nosniff
access-control-allow-origin
https://thehackernews.com
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
pragma
no-cache
server
ESF
cross-origin-opener-policy
same-origin
x-frame-options
SAMEORIGIN
access-control-max-age
86400
access-control-allow-methods
POST, GET, OPTIONS
content-type
text/html; charset=utf-8
accept-ch
Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
vary
Sec-Fetch-Dest, Sec-Fetch-Mode, Sec-Fetch-Site
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
permissions-policy
ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-platform=*, ch-ua-platform-version=*
content-security-policy
require-trusted-types-for 'script';report-uri /_/ContributorLoggingHttp/cspreport, script-src 'report-sample' 'nonce-BVxc5D7M4F6Rmc-hjyExRQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/ContributorLoggingHttp/cspreport;worker-src 'self', script-src 'nonce-BVxc5D7M4F6Rmc-hjyExRQ' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/ContributorLoggingHttp/cspreport
expires
Mon, 01 Jan 1990 00:00:00 GMT
sid
mug.criteo.com/ Frame
0
0
Preflight
General
Full URL
https://mug.criteo.com/sid?cpp=sGw5ZHxFc2w1OVpuZmRwampzTGJ0NlpPcjVnbUdlY3dQK2xDN0ZTNjFGWjcxYkwyQ0UzQ1ROcDNGdmlWVzdha3dGNHlyZDkxdU5rbytxMkgzMW44cE1ENnBTdldaWnFlUG16NE10N0hkdWdIUE5GeitmVFRhSjk1SUxYdFlrbzBQdDd6UCs1SnpUOVVmUktVem9naE9Gc1NYakFLTmplM2haVU9GYUtzdis0WHFuSTJsYlNiSXBEUGEwbEVuT1hDeWg3SUFta1lqY2FtZXdlUk9mSUpzRDQ1dTc3NSs0ZC80RFVCNDB2a295TWxyajF3PXw&cppv=2
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.0.157 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload;

Request headers

Accept
*/*
Access-Control-Request-Headers
content-type
Access-Control-Request-Method
GET
Origin
null
Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

access-control-allow-credentials
true
access-control-allow-headers
content-type
access-control-allow-methods
GET
access-control-allow-origin
null
cache-control
no-cache, no-store, must-revalidate
content-encoding
gzip
content-type
application/json; charset=utf-8
date
Tue, 10 May 2022 08:36:27 GMT
expires
0
pragma
no-cache
server-processing-duration-in-ticks
1128
strict-transport-security
max-age=31536000; preload;
vary
Accept-Encoding
flUhRq6tzZclQEJ-Vdg-IuiaDsNc.woff2
fonts.gstatic.com/s/materialicons/v128/
125 KB
125 KB
Font
General
Full URL
https://fonts.gstatic.com/s/materialicons/v128/flUhRq6tzZclQEJ-Vdg-IuiaDsNc.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Archivo|Arimo|Bitter|EB+Garamond|Lato|Libre+Baskerville|Libre+Franklin|Lora|Google+Sans:regular,medium|Material+Icons|Merriweather|Montserrat|Mukta|Muli|Nunito|Open+Sans:400,600,700|Open+Sans+Condensed:300,400,600,700|Oswald|Playfair+Display|Poppins|Raleway|Roboto|Roboto+Condensed|Roboto+Slab|Slabo+27px|Source+Sans+Pro|Ubuntu|Volkhov&display=swap
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f082f7fa9332a6055b254e19c987cc6f3a37b5ece6a1920978aaaa785d3df60b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://thehackernews.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Wed, 04 May 2022 19:25:04 GMT
x-content-type-options
nosniff
age
479484
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
127508
x-xss-protection
0
last-modified
Wed, 27 Apr 2022 15:12:17 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 04 May 2023 19:25:04 GMT
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v28/
44 KB
44 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v28/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Archivo|Arimo|Bitter|EB+Garamond|Lato|Libre+Baskerville|Libre+Franklin|Lora|Google+Sans:regular,medium|Material+Icons|Merriweather|Montserrat|Mukta|Muli|Nunito|Open+Sans:400,600,700|Open+Sans+Condensed:300,400,600,700|Oswald|Playfair+Display|Poppins|Raleway|Roboto|Roboto+Condensed|Roboto+Slab|Slabo+27px|Source+Sans+Pro|Ubuntu|Volkhov&display=swap
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
88915cdc03fc5b9a20aec966fe93ee38aa3fd76bfef296e41d305271b3541c96
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://thehackernews.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 03 May 2022 22:45:30 GMT
x-content-type-options
nosniff
age
553858
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
44656
x-xss-protection
0
last-modified
Tue, 01 Mar 2022 22:03:03 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 03 May 2023 22:45:30 GMT
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v28/
44 KB
44 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v28/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Archivo|Arimo|Bitter|EB+Garamond|Lato|Libre+Baskerville|Libre+Franklin|Lora|Google+Sans:regular,medium|Material+Icons|Merriweather|Montserrat|Mukta|Muli|Nunito|Open+Sans:400,600,700|Open+Sans+Condensed:300,400,600,700|Oswald|Playfair+Display|Poppins|Raleway|Roboto|Roboto+Condensed|Roboto+Slab|Slabo+27px|Source+Sans+Pro|Ubuntu|Volkhov&display=swap
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
88915cdc03fc5b9a20aec966fe93ee38aa3fd76bfef296e41d305271b3541c96
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://thehackernews.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 03 May 2022 22:45:30 GMT
x-content-type-options
nosniff
age
553858
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
44656
x-xss-protection
0
last-modified
Tue, 01 Mar 2022 22:03:03 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 03 May 2023 22:45:30 GMT
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v28/
44 KB
44 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v28/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Archivo|Arimo|Bitter|EB+Garamond|Lato|Libre+Baskerville|Libre+Franklin|Lora|Google+Sans:regular,medium|Material+Icons|Merriweather|Montserrat|Mukta|Muli|Nunito|Open+Sans:400,600,700|Open+Sans+Condensed:300,400,600,700|Oswald|Playfair+Display|Poppins|Raleway|Roboto|Roboto+Condensed|Roboto+Slab|Slabo+27px|Source+Sans+Pro|Ubuntu|Volkhov&display=swap
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
88915cdc03fc5b9a20aec966fe93ee38aa3fd76bfef296e41d305271b3541c96
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://thehackernews.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 03 May 2022 22:45:30 GMT
x-content-type-options
nosniff
age
553858
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
44656
x-xss-protection
0
last-modified
Tue, 01 Mar 2022 22:03:03 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 03 May 2023 22:45:30 GMT
Q2-banner.png
thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEjPD7SbMH8hVmk7eqMrN-axGAlI1Q4Iahlgu1f1EXaGIxOLoeYQORPRM-T7SzigGtlrUzMi7MEpjx-lUQ-uLRNSa0OnEBXnd53Fn2F0I-aqZiq2H4uaztN2x6E_A0M8aPxpbb9UjTpef1I_eTAC0...
31 KB
32 KB
Image
General
Full URL
https://thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEjPD7SbMH8hVmk7eqMrN-axGAlI1Q4Iahlgu1f1EXaGIxOLoeYQORPRM-T7SzigGtlrUzMi7MEpjx-lUQ-uLRNSa0OnEBXnd53Fn2F0I-aqZiq2H4uaztN2x6E_A0M8aPxpbb9UjTpef1I_eTAC0hPdKxLtT5OjL5TyasVP4idyn5x0Rf_FUvYWWhLGAg/s728-e100/Q2-banner.png
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::ac43:4615 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
088064dd05ae8be6102a1ebc9c2ad4e04b65b83ff00230e38c46d466455ef072
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:29 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
360228
cf-polished
origFmt=png, origSize=48670
x-forwarded-for
2001:638:607:205::30
content-disposition
inline; filename="Q2-banner.webp"
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
31902
x-xss-protection
0
expires
Sun, 14 Aug 2022 04:32:41 GMT
cf-bgj
imgq:100,h2pri
server
cloudflare
etag
"ve35e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=iMs8T3r3SrinK7i5STOcRSJP700TrbOJw3zTcoC1WrcC87ZVX67GEOwN5yXdl3ETJjIZW5x%2BwC5bVvDFJtwU2qLaMAGbV9KvehZqRhe9wg44u2ZiBtu9zgaUp31JfBTqy7sOpxQrE3fZu2VHWMo8"}],"group":"cf-nel","max_age":604800}
content-type
image/webp
vary
Accept, Accept-Encoding
cache-control
public, max-age=8640000, immutable, s-maxage=8640000
accept-ranges
bytes
cf-ray
709158f2ee329b2d-FRA
access-control-expose-headers
Content-Length
bitcoin.jpg
thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEip-c1_FZgYXkQCLSRaw4p4ov_yvNZXfdoJdW45BtLQoeZZHW4722cWZBsh2K273-lZkcjN8ceQW1WDk9bkUr8-kCQ5pGOtWQtsVdQ54NH_GTA51c_FAb54O2h-Uic0Zrv7PJn-i21B6B7N9pBLx...
3 KB
4 KB
Image
General
Full URL
https://thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEip-c1_FZgYXkQCLSRaw4p4ov_yvNZXfdoJdW45BtLQoeZZHW4722cWZBsh2K273-lZkcjN8ceQW1WDk9bkUr8-kCQ5pGOtWQtsVdQ54NH_GTA51c_FAb54O2h-Uic0Zrv7PJn-i21B6B7N9pBLx7cxt5_FJLuagcbwsGgZNde734Wo1721o5B8rRBz/w72-h72-p-k-no-nu/bitcoin.jpg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:20::ac43:4615 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2a61e00bda005e2b7b934dd292ede74f46e57a42a0ca8acb7af794ef3adf6d5c
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36

Response headers

date
Tue, 10 May 2022 08:36:29 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
30504
cf-polished
origSize=3059, status=webp_bigger
x-forwarded-for
2003:e5:7733:7600:b630:42e:4464:640e
content-disposition
inline;filename="bitcoin.jpg"
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
3048
x-xss-protection
0
expires
Wed, 11 May 2022 00:08:05 GMT
cf-bgj
imgq:100,h2pri
server
cloudflare
etag
"v194e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000; includeSubDomains; preload
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=KP1warSeDiZ4m7FtVxzyihqMkePNCg0hiFgeNCrJivzbUWVrknU67slkeM6S0l3mTSWiM7pXDm6FGO3vCep%2F%2Bvss77eqbBK1R63LN4LqVmQ%2Bh1P5Y36da8FhU09lNbbcXvpKYwrE1WTfH86oIn2o"}],"group":"cf-nel","max_age":604800}
content-type
image/jpeg
vary
Accept-Encoding
cache-control
public, max-age=8640000, immutable, s-maxage=8640000
accept-ranges
bytes
cf-ray
709158f3af519b2d-FRA
access-control-expose-headers
Content-Length

Verdicts & Comments Add Verdict or Comment

81 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4 object| oncontextlost object| oncontextrestored function| structuredClone function| getScreenDetails object| zarazData object| zaraz object| adpushup string| share_url string| share_title object| adsbygoogle object| lazySizes function| head object| __cfQR function| setImmediate function| clearImmediate function| defer function| deferscript object| dataLayer function| $ function| jQuery boolean| __cfRLUnblockHandlers string| currentState object| googletag object| _apPbJs object| hbAnalytics object| apstag object| adpTags object| googlefc object| google_js_reporting_queue number| google_srt object| google_logging_queue number| tmod object| google_ad_modifications object| ggeac object| google_persistent_state_async boolean| google_measure_js_timing object| google_tag_data object| google_reactive_ads_global_state boolean| _gfp_a_ object| google_sa_queue function| google_process_slots boolean| google_apltlad function| google_spfd number| google_lpabyc number| google_unique_id object| google_sv_map function| _apPbJsChunk object| _pbjsGlobals string| nobidVersion object| nobid string| google_user_agent_client_hint function| __d3lUW8vwsKlB__ object| _qevents boolean| apstagLOADED function| google_sa_impl object| googleToken object| googleIMState function| quantserve function| __qc object| ezt object| _qoptions function| qtrack object| default_ContributorServingResponseClientJs object| __googlefc string| __fcInvoked string| __fcexpdef object| NmI2NmEyN2Y1NDFlYzE1ZWxvYWRlcl9qcw== string| NmI2NmEyN2Y1NDFlYzE1ZWNhY2hlZF9qcw== object| __fcInternalApiManager boolean| __fcInternalApiPostMessageReady object| __tcfapiEventListeners function| __tcfapi object| __tcfapiManager boolean| __tcfapiPostMessageReady object| default_ContributorIabTcfV2ClientJs function| __g78fHfh446__

5 Cookies

Domain/Path Name / Value
.thehackernews.com/ Name: _ga
Value: 92ff9c04-d214-401a-a990-a06c87cf32f9
thehackernews.com/ Name: _pbjs_userid_consent_data
Value: 3524755945110770
.thehackernews.com/ Name: _pubcid
Value: 6c8df1d3-9365-4ea0-ae5b-6bc3740447ab
thehackernews.com/ Name: cto_bidid
Value: GqM1H19GUGgxQkwlMkZOTmUzUlB3ek9wOXklMkZuVkM3WllwQ3hOcWF1UXdtWjd2U0M2THZKVnVSeCUyQmZFOFJpdm43RXE4NEtZdGY0eER3WWxUUmVsSnVEZFlScUJwUSUzRCUzRA
thehackernews.com/ Name: cto_bundle
Value: A5mRPV9yJTJCcXNCMVQ3biUyRnlaTXVOUTM4a01nTkZHNGVVcU1ZJTJCcUtJWW5xeUplSW9aRFcxdzVsa2NhQ0paa0VHeCUyQjA1TGdRUUU5WVNoQzRDSHViQXlWUzRGWDExNHZHRkRnUVZNbG9NTEY5UU1BT2psdHAyT0NvVXRvcE40NCUyRnNsdEt4dUk

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy upgrade-insecure-requests
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

aplogger.adpushup.com
c.amazon-adsystem.com
cdn.adpushup.com
cdn.jsdelivr.net
cdnjs.cloudflare.com
code.jquery.com
e3.adpushup.com
fonts.googleapis.com
fonts.gstatic.com
fundingchoicesmessages.google.com
googleads.g.doubleclick.net
gum.criteo.com
mug.criteo.com
pagead2.googlesyndication.com
rules.quantcount.com
secure.quantserve.com
securepubads.g.doubleclick.net
thehackernews.com
108.138.3.177
172.217.16.130
178.250.0.157
2001:4de0:ac18::1:a:2b
23.97.225.52
2600:9000:2490:8e00:6:44e3:f8c0:93a1
2606:4700:20::ac43:4615
2606:4700:4400::ac40:99f7
2606:4700::6810:5614
2606:4700::6811:180e
2620:116:800d:21:5a23:9c4e:e774:96c1
2a00:1450:4001:800::2003
2a00:1450:4001:80f::200a
2a00:1450:4001:811::2002
2a00:1450:4001:812::2002
2a00:1450:4001:830::200e
2a02:2638:1::13
51.124.210.81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