Submitted URL: https://t.co/Bi3lGmiArD
Effective URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_mediu...
Submission: On December 17 via api from US — Scanned from DE

Summary

This website contacted 47 IPs in 4 countries across 31 domains to perform 278 HTTP transactions. The main IP is 2a04:4e42:4d::666, located in United States and belongs to FASTLY, US. The main domain is www.zdnet.com.
TLS certificate: Issued by R3 on October 26th 2021. Valid for: 3 months.
This is the only time www.zdnet.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 104.244.42.197 13414 (TWITTER)
1 1 44.239.146.245 16509 (AMAZON-02)
39 2a04:4e42:4d:... 54113 (FASTLY)
5 2606:4700::68... 13335 (CLOUDFLAR...)
3 2606:4700:303... 13335 (CLOUDFLAR...)
3 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 2606:4700:10:... 13335 (CLOUDFLAR...)
3 151.101.194.154 54113 (FASTLY)
1 34.120.203.121 15169 (GOOGLE)
2 52.73.158.59 14618 (AMAZON-AES)
2 2606:4700:303... 13335 (CLOUDFLAR...)
2 151.101.129.194 54113 (FASTLY)
21 142.250.185.66 15169 (GOOGLE)
3 18.66.139.10 16509 (AMAZON-02)
22 2.18.235.40 16625 (AKAMAI-AS)
1 2a00:1450:400... 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
3 2a00:1450:400... 15169 (GOOGLE)
14 34.235.197.155 14618 (AMAZON-AES)
2 52.5.105.31 14618 (AMAZON-AES)
2 2a02:26f0:170... 20940 (AKAMAI-ASN1)
1 3.11.215.107 16509 (AMAZON-02)
2 18.132.152.138 16509 (AMAZON-02)
12 2a00:1450:400... 15169 (GOOGLE)
21 2.21.143.57 16625 (AKAMAI-AS)
1 151.101.2.137 54113 (FASTLY)
21 2a00:1450:400... 15169 (GOOGLE)
5 2.16.107.33 20940 (AKAMAI-ASN1)
1 2 99.80.242.238 16509 (AMAZON-02)
1 4 142.250.184.230 15169 (GOOGLE)
14 2a00:1450:400... 15169 (GOOGLE)
2 162.247.243.147 13335 (CLOUDFLAR...)
4 2a00:1450:400... 15169 (GOOGLE)
18 34.234.228.134 14618 (AMAZON-AES)
4 2a00:1450:400... 15169 (GOOGLE)
1 13.32.121.58 16509 (AMAZON-02)
3 2600:9000:223... 16509 (AMAZON-02)
1 3.127.116.150 16509 (AMAZON-02)
3 4 142.250.185.194 15169 (GOOGLE)
2 4 2.18.234.21 16625 (AKAMAI-AS)
2 3 37.252.172.38 29990 (ASN-APPNEX)
4 142.250.186.130 15169 (GOOGLE)
2 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
11 2a00:1450:400... 15169 (GOOGLE)
3 34.117.228.201 15169 (GOOGLE)
6 54.84.167.118 14618 (AMAZON-AES)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
278 47
Apex Domain
Subdomains
Transfer
38 googlesyndication.com
58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
pagead2.googlesyndication.com
tpc.googlesyndication.com
15bba6cb2a099075211e19961c408204.safeframe.googlesyndication.com
218 KB
35 doubleclick.net
securepubads.g.doubleclick.net
ad.doubleclick.net
googleads.g.doubleclick.net
cm.g.doubleclick.net
googleads4.g.doubleclick.net
403 KB
32 rvapps.io
ingest.make.rvapps.io
media-mtml.mt.rvapps.io
21 MB
30 moatads.com
z.moatads.com
mb.moatads.com
geo.moatads.com
px.moatads.com
650 KB
22 zdnet.com
www.zdnet.com
urs.zdnet.com
378 KB
19 clipcentric.com
tr.clipcentric.com
ad.clipcentric.com
6 KB
16 moatpixel.com
redventuresgamheader644747280705.s.moatpixel.com
redventuresgamdisplay60805146916.s.moatpixel.com
4 KB
12 googletagservices.com
www.googletagservices.com
335 KB
11 2mdn.net
s0.2mdn.net
123 KB
11 adsafeprotected.com
pixel.adsafeprotected.com
static.adsafeprotected.com
dt.adsafeprotected.com
96 KB
7 google.com
adservice.google.com
www.google.com
2 KB
5 doubleverify.com
cdn.doubleverify.com
tps.doubleverify.com
tpsc-ue1.doubleverify.com
95 KB
5 akamaihd.net
clipcentric-a.akamaihd.net
1 MB
5 cohesionapps.com
cdn.cohesionapps.com
taggy.cohesionapps.com
33 KB
5 myfinance.com
static.myfinance.com
www.myfinance.com
67 KB
5 cookielaw.org
cdn.cookielaw.org
116 KB
4 casalemedia.com
dsum-sec.casalemedia.com
4 KB
3 adnxs.com
ib.adnxs.com
3 KB
3 google.de
adservice.google.de
1 KB
3 redventures.io
at.adtech.redventures.io
179 KB
3 go-mpulse.net
c.go-mpulse.net
52 KB
2 nr-data.net
bam-cell.nr-data.net
1 KB
2 akstat.io
684dd326.akstat.io
708 B
2 fastly.net
confiant-integrations.global.ssl.fastly.net
93 KB
2 myfidevs.io
a.myfidevs.io
166 B
1 createjs.com
code.createjs.com
63 KB
1 clarium.io
protected-by.clarium.io
345 B
1 newrelic.com
js-agent.newrelic.com
17 KB
1 onetrust.com
geolocation.onetrust.com
374 B
1 dlvr.it
dlvr.it
558 B
1 t.co
t.co
678 B
278 31
Domain Requested by
21 pagead2.googlesyndication.com www.zdnet.com
58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
tpc.googlesyndication.com
ad.doubleclick.net
securepubads.g.doubleclick.net
www.googletagservices.com
21 px.moatads.com www.zdnet.com
21 securepubads.g.doubleclick.net www.zdnet.com
t.co
www.googletagservices.com
securepubads.g.doubleclick.net
21 www.zdnet.com t.co
www.zdnet.com
18 tr.clipcentric.com www.zdnet.com
ad.clipcentric.com
18 media-mtml.mt.rvapps.io www.zdnet.com
14 tpc.googlesyndication.com www.zdnet.com
58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
t.co
ad.doubleclick.net
securepubads.g.doubleclick.net
tpc.googlesyndication.com
14 ingest.make.rvapps.io www.zdnet.com
13 redventuresgamdisplay60805146916.s.moatpixel.com
12 www.googletagservices.com t.co
58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
www.googletagservices.com
www.zdnet.com
securepubads.g.doubleclick.net
s0.2mdn.net
11 s0.2mdn.net www.zdnet.com
ad.doubleclick.net
s0.2mdn.net
6 dt.adsafeprotected.com
6 z.moatads.com www.zdnet.com
t.co
securepubads.g.doubleclick.net
5 clipcentric-a.akamaihd.net t.co
www.zdnet.com
clipcentric-a.akamaihd.net
5 cdn.cookielaw.org www.zdnet.com
4 googleads4.g.doubleclick.net ad.doubleclick.net
4 dsum-sec.casalemedia.com 2 redirects googleads.g.doubleclick.net
4 cm.g.doubleclick.net 3 redirects googleads.g.doubleclick.net
4 www.google.com www.zdnet.com
58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
securepubads.g.doubleclick.net
tpc.googlesyndication.com
4 ad.doubleclick.net 1 redirects www.zdnet.com
www.googletagservices.com
t.co
3 redventuresgamheader644747280705.s.moatpixel.com
3 ib.adnxs.com 2 redirects googleads.g.doubleclick.net
3 static.adsafeprotected.com pixel.adsafeprotected.com
www.zdnet.com
3 adservice.google.com www.zdnet.com
securepubads.g.doubleclick.net
3 adservice.google.de www.zdnet.com
securepubads.g.doubleclick.net
3 cdn.cohesionapps.com www.zdnet.com
cdn.cohesionapps.com
3 at.adtech.redventures.io www.zdnet.com
3 c.go-mpulse.net www.zdnet.com
c.go-mpulse.net
3 static.myfinance.com www.zdnet.com
2 tpsc-ue1.doubleverify.com cdn.doubleverify.com
2 cdn.doubleverify.com ad.doubleclick.net
t.co
2 googleads.g.doubleclick.net 58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
t.co
2 bam-cell.nr-data.net www.zdnet.com
2 pixel.adsafeprotected.com 1 redirects t.co
2 geo.moatads.com z.moatads.com
2 684dd326.akstat.io www.zdnet.com
c.go-mpulse.net
2 taggy.cohesionapps.com www.zdnet.com
2 58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com www.zdnet.com
2 confiant-integrations.global.ssl.fastly.net www.zdnet.com
2 www.myfinance.com www.zdnet.com
2 a.myfidevs.io www.zdnet.com
1 code.createjs.com s0.2mdn.net
1 tps.doubleverify.com cdn.doubleverify.com
1 15bba6cb2a099075211e19961c408204.safeframe.googlesyndication.com securepubads.g.doubleclick.net
1 protected-by.clarium.io 58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
1 ad.clipcentric.com clipcentric-a.akamaihd.net
1 js-agent.newrelic.com www.zdnet.com
1 mb.moatads.com z.moatads.com
1 urs.zdnet.com www.zdnet.com
1 geolocation.onetrust.com www.zdnet.com
1 dlvr.it 1 redirects
1 t.co
278 52
Subject Issuer Validity Valid
t.co
DigiCert TLS RSA SHA256 2020 CA1
2021-02-05 -
2022-02-04
a year crt.sh
*.zdnet.com
R3
2021-10-26 -
2022-01-24
3 months crt.sh
cookielaw.org
Cloudflare Inc ECC CA-3
2021-06-01 -
2022-05-31
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-06-18 -
2022-06-17
a year crt.sh
akstat.io
DigiCert SHA2 Secure Server CA
2021-06-08 -
2022-06-13
a year crt.sh
onetrust.com
Cloudflare Inc ECC CA-3
2021-02-12 -
2022-02-11
a year crt.sh
at.adtech.redventures.io
R3
2021-12-04 -
2022-03-04
3 months crt.sh
*.myfidevs.io
Amazon
2021-12-07 -
2023-01-04
a year crt.sh
*.freetls.fastly.net
GlobalSign Atlas R3 DV TLS CA 2020
2021-04-27 -
2022-05-29
a year crt.sh
*.g.doubleclick.net
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
cdn.cohesionapps.com
Amazon
2021-12-17 -
2023-01-14
a year crt.sh
moatads.com
DigiCert SHA2 Secure Server CA
2021-01-21 -
2022-01-25
a year crt.sh
*.google.de
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
*.google.com
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
ingest.make.rvapps.io
Amazon
2021-09-26 -
2022-10-24
a year crt.sh
*.taggy.cohesionapps.com
Amazon
2021-02-27 -
2022-03-28
a year crt.sh
*.moatads.com
DigiCert TLS RSA SHA256 2020 CA1
2021-05-25 -
2022-06-25
a year crt.sh
js-agent.newrelic.com
GlobalSign Atlas R3 DV TLS CA H2 2021
2021-10-06 -
2022-11-07
a year crt.sh
*.mt.rvapps.io
R3
2021-11-14 -
2022-02-12
3 months crt.sh
aka.clipcentric.com
R3
2021-11-20 -
2022-02-18
3 months crt.sh
fw.adsafeprotected.com
Amazon
2021-08-11 -
2022-09-09
a year crt.sh
tpc.googlesyndication.com
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
*.nr-data.net
DigiCert SHA2 Secure Server CA
2020-02-05 -
2022-02-08
2 years crt.sh
clipcentric.com
Amazon
2021-02-05 -
2022-03-06
a year crt.sh
www.google.com
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
static.adsafeprotected.com
Amazon
2021-09-05 -
2022-10-04
a year crt.sh
protected-by.clarium.io
Gandi Standard SSL CA 2
2020-04-03 -
2022-04-26
2 years crt.sh
*.doubleclick.net
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
*.doubleverify.com
DigiCert SHA2 Secure Server CA
2021-01-10 -
2022-01-17
a year crt.sh
dt.adsafeprotected.com
Amazon
2021-04-22 -
2022-05-21
a year crt.sh
tls.adobe.com
DigiCert SHA2 Secure Server CA
2020-06-01 -
2022-06-06
2 years crt.sh

This page contains 27 frames:

Primary Page: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Frame ID: 5552FC3C41BDC2538DC4BD1A6312BDD8
Requests: 136 HTTP requests in this frame

Frame: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Frame ID: 70514D96AF8C2D98ACE05557521D99B8
Requests: 2 HTTP requests in this frame

Frame: https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Frame ID: 7453BFDCED3257A1D74BB8567B72EE65
Requests: 1 HTTP requests in this frame

Frame: https://cdn.cohesionapps.com/cohesion/xs2.html
Frame ID: 35215F73744CA3EE66A9B78F5AE7936B
Requests: 2 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstufgQNDJYefI-FfwsegvWeAMJppbQmuV9uyizgdQi2eAKT4RzEmoYWgiXb4zSrEaBp-nIxuLawCuljQQhmDZ90ylXANZYEHwJmNXzvqg-sBazaXSgAU7AHQGl6VSZ_KkAC2K1-qA_75q8F-H_uOGIdWFmahhJpJQwwoCPt3aPXX4Kk57En8INGJjakcETRda4aCaHyEud-1cv5_LULJRsJhnKqTGPYw1dP9wubAY8b9Jr8lgKIohcFHaW43POZaJhKMbjJKXHkhGI6eClHVL1Ym7cGLgKuXDzy0vTv8UB9JQhdj23KjZPcgdaz19oh5mo0dW8RVa_g-1PcLfs&sai=AMfl-YT_oEAYDuneqXpUP3R77yi_cjZsikD1RQfAMBibsjLnuDHasDy4o2iWv6zNRHlC90EUmMZ_ixgBh3ZOwPqndZkDGe_VBzh-QnL1eDxpa4Wuor1rZhQEMgpTNZdN-8Q&sig=Cg0ArKJSzB0LufT2_sSjEAE&uach_m=[UACH]&urlfix=1&adurl=
Frame ID: 21068A477B7C3BAF8D05907DEC9247A4
Requests: 4 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv95YpK2y8-Q0vp0BWX69EQ-xYpm5eop6FQZocKHPsyWaI5LLtfBm2fcqOgbO5OhzYsD2ryG2VEnuXUtRuBCVRWRN-PR65W-3Yj96hA1tMXkG89U6ugpTeRCsyo0pnk-k9sJCfrONt72oWNwSlK7RCEHn_Ahc_tUjvMCmE9xaKqmiOJ0vQATc_CkKNKTP21gnh7fRBIF04iT39G2NmE4cASJMFnvk1dJTWAMY6Rur3MIAs2tpSlAqjeLUGKCaptP2D-tL-cs1b6YwjuBVc8AQr1VX3UlRLnEtq-B-LhRCPR1OynSl5dkIPkQMZmIMLVYXE8Azl41sdMx7_jRjG5tEfB&sai=AMfl-YRSEmO0YHj8g6GE75m_54r7tw6Ih9wJygaLrojQs1oK0Th9_pOlGifX3JfiTjKLKg0_bhlddLHfUFihLlwxAXJEtJfCTqyw4tMQqYwBGkCwC1joC4ziVazvkrvumdQ&sig=Cg0ArKJSzEtY-SNkGS7qEAE&uach_m=[UACH]&urlfix=1&adurl=
Frame ID: 6CF1B8FD89913893B91BD31AA54549F6
Requests: 30 HTTP requests in this frame

Frame: https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Frame ID: 31505D92FC49FA02A02D8433CA36100F
Requests: 12 HTTP requests in this frame

Frame: data://truncated
Frame ID: 32419EA1E5DE97EE7A4920F55B5B991B
Requests: 2 HTTP requests in this frame

Frame: data://truncated
Frame ID: 8D9788F9208F50A98AA72DEDD1354E89
Requests: 4 HTTP requests in this frame

Frame: https://clipcentric-a.akamaihd.net/user-9/resources/ad.html
Frame ID: FFC0C8EADFC59482C5461214D8F1D2BF
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstasoNMSL498CZihV5JtapLTxq6RdbuLdB9Gq_GuyDWRtmYiU7B_VPNBY5vx1elYlnPipA0omcVP85I_dI2SdVTmkd07ktlvXGgxGwoK9zKssRLsShGOFIRkcaKXE6jdVWW-7vZ-P0XDyBx_6fg1LNBBQjgEO6H12ED7giCPC7cjsznmx37AsNc4Wy0vyWaw7b9iTPG3HyQbT-5_ZkT_UpBtzph0T-4NuCVaSbU1koD8Z7DIqyAMXpY5cavTPuUmCmbNwCkv9xUp4aai0ajAtUp5rnrYT7GZ-8DQIHSzisi9CVjDcdQznqmGtdsGX-UqOjEXPhr6DB5A8o&sig=Cg0ArKJSzBDFUYAR18-GEAE&uach_m=[UACH]&urlfix=1&adurl=
Frame ID: BF7F9A08E52A479B3D6F9A7229F72FB4
Requests: 14 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvGemPXTtMvHj59X-SkqTHT2n4SCVYGGsZpVkrExxt1aS6yS-4XaPynko-idRy7n9Kdy-uCr_r6jfpCiOeoJcCnbnkuGbn_d2ACZAkid7Z8coY6CLTlDL9rNMOsZd3Pnw5QGU_dSxSNpW6ua87dFFGuZTSNqnQSmc8gMFHlP_CwBrylzndSn0zQKXu4PFUMNXAwTPOfRUxTkOvc52llZC73MgE3e7bpdajMoytH8DxbYYAJVQRCV6VokcuauUNspey1XyRuWTZjk16SADZZqVru-rWPUMnJQjWhnJTvy9gXwZhNffyZukAe12ygh8K2H7npgud6B0wRYW0l8RU3&sai=AMfl-YRvWH7969faJnl3Y_UrqXrTI0xC2YxbsYgNgAg8LmKQAD2DF3xWJaVe_487Mp59TSMj6tH1hVrfWUlIhW_747A31bLKNPFWvpx15oxBdpDWzFdJ_kvN1XCqeRnkkb8A&sig=Cg0ArKJSzIVUc5VKa0k1EAE&uach_m=[UACH]&urlfix=1&adurl=
Frame ID: A81A78280BE90E0C494ECF6EBE15B8D9
Requests: 17 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Frame ID: 1CC172CA8179C130B53698A95666894A
Requests: 2 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/aframe
Frame ID: BAF3A35B36A8E0FAEEB680143857EB5B
Requests: 2 HTTP requests in this frame

Frame: https://ad.clipcentric.com/user-9/resources/store.phtml?v200530
Frame ID: 30BFB88AD0BC3EB2405DA0901D4ABFFC
Requests: 3 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/xbbe/pixel?d=CPv1SRDa1sb8AhjB0aC6ATAB&v=APEucNUi_OX0z4afvOV-4GTOhVmiXXZDy8MvxreoaOMnlll3rISnvyodrKP-uCbikqjrz2Vl9oO5Vl6gqVJs1N5H4emDSuEzmv_SPaEqFeMv3utO2Zi7vMNqQdJ-gY99nBj9J_DkYIDUKpK4SzVyOiTn7r7j1Bf1Dg
Frame ID: B72FC2D02B263E2B2B4A54F5BEF45398
Requests: 5 HTTP requests in this frame

Frame: https://15bba6cb2a099075211e19961c408204.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html?n=1
Frame ID: D14011029D35313ADCF76346B252AE0F
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuex0mE2Rp2uZ1b1swGmm5NvzcUNijejEwmDcE0utJEcrDe3Gk9FvSYfKtTcH1g29_g1OHy5RxK4w1VTPXf6P3M01vkjO9Hm2M0ptHojj4HaZ5r_FG4uOji9r3G2A6cUSxY2zhNe4xpzvMPyyudkkQRLqawgtC4BUYzfaCvqwZcngqrHdfz3-ICTHCvEzWUIuGNHPPBna0WC_eKpp3QdoltZG6izeNNsEBcp6-5RX_RtWoIpoeIgTUpu5E-n7Lz20VX67j2prqGpD1oXT7f9CS-GDo_McBjVmLoi5trzVAzzciDibCX4g&sig=Cg0ArKJSzAuVAriCIcFvEAE&uach_m=[UACH]&adurl=
Frame ID: 0AAB6E9274BCE6D71457268156549963
Requests: 8 HTTP requests in this frame

Frame: https://ad.doubleclick.net/ddm/adi/N7171.3054164TW_ORGANIC/B26731448.319366990;dc_ver=81.236;sz=300x250;u_sd=1;dc_adk=2228999113;ord=e15s65;click=https%3A%2F%2Fgoogleads.g.doubleclick.net%2Fdbm%2Fclk%3Fsa%3DL%26ai%3DCjbiBC3C8YaWXJNzD7_UPs8mTyAK7i_WaZ-CWgcqWD7_O8_0IEAEg97vHgwFglQLIAQmoAwGqBJICT9DlcQg8r501u4B9hx7Bmnq-DK0Jak7lk669RcCwtDh1NblV2l1Y8fpqkMkgygEZtXksznMENyRSB58_azXe8H5gC-SGx9kWQiQiESzwkN6zK9fjtJ8XW375I6594qhF6hzcJU4I1mrKLSz0GkS4HGWsUedd0u-LVOVDHMvXxPQksSP3ElGr1dcu2oR10dLSzrZEh6BDmylOFoS8x1YYIzuwq7UQU_IN6PSevTODt0Nju5QXOAqcrE4zfVHxWGAia64Z0Xenv1fEQ6OQ2t4PWmWX6sGSdhj74ejbv2QtB_FdztOM_rh0KG4GzM62coud46PhPZaTQJ3XNZPb2sEHKQdCQDPAxskdWapPwOwljgCIjcAEoJDP1fYD4AQDkAYBoAZNgAegzvb6AqgHjs4bqAeT2BuoB-6WsQKoB_6esQKoB9XJG6gHpr4bqAfz0RuoB5bYG6gHqpuxAqgH35-xAtgHANIICQiI4YAQEAEYHYAKA5gLAcgLAYAMAbATrb3UDdATANgTA9gUAdAVAfgWAYAXAQ%26ae%3D1%26num%3D1%26cid%3DCAASFeRojv-AmDjftYpCJQy3V_q7_jBCcw%26sig%3DAOD64_1iQgxtn8cOuH8KEcUE8Kk-gxuxBw%26client%3Dca-pub-8820362605711196%26dbm_c%3DAKAmf-A8fSI75fEvh909rFjOUV7URVdDDnksfplYAcJFNUc8EHXWXV59dnM8zZU222C24ROh-661gVQkpW--fSnXzD71Lc0m87xKwyebohEp5BEP5t2hybsQc_d0uWxGLpGTioTTQXvXg2_3p3cCSCirJbWF6OjjiQ%26cry%3D1%26dbm_d%3DAKAmf-C20cWwuzoID2yJytfQg7xPPIsJm42NKSbBSMpawVeQNNezpF3VXbCPg20nD-mYd8YYtAa4miZKci5dKRH37S164-jX0KT_9Cjh4F_LRxNbboX94rcBjNIowPy-hjt0gSMs_YlvwrQIlNDLmsC76cElYYW0b_Kep5kwUymFvjvPwOY5oaYD1Ycfs0iu8ZDo1EbFH8lC3TMt88ptFOIqIM6eT-V__jqW-2b5hac1DRLB21Mkw11Br326XXxZuZTFIbsFQaGWmQLCxVX-KUJjej-zRdBpeSh7z49Ipc7vHr7dgDy53VkSLogxJQizcFv5dAZK7KfuNElkWBc8CQ1llgIqZcCi-3NqB7v3J0-3pAH2OGKnKuFYSDVjKignYsPAW3XlJkY2GFvKnKkYWJ6-6FySylZKNc5tUq7Z4eqC59FUAkZFsTFAEKJoYyHPKM4P_BPaWK13z7DOKe83vWbyk_K3kZHs1WyKNbmUIBs3rQj8z-h--ZjtyradDVKRPhvnWKy56pa-nT04oQUiCr6oMC6cebPl1wnPLuA5vI_RluM786HV3Apq1ov9DcirgwN-Hc2ff-IMQq2YmOeTaygTRRQms31AtWl0T988Phjb7m6lcpIzZ2A%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter$0;xdt=1;crlt=3x1dtabP_p;sttr=121;prcl=s
Frame ID: 69CDF500E39D4C7D6C644557837A4F25
Requests: 7 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Frame ID: 5EB9CDDC45D0ED50B0D9167B58AFDCA0
Requests: 3 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Frame ID: 85BD5199CD53D4FBE46BE1AA9A66D7E1
Requests: 3 HTTP requests in this frame

Frame: https://cdn.doubleverify.com/dv-measurements1950.js
Frame ID: 97902D03FB890D88C03B5CC8F869DF23
Requests: 4 HTTP requests in this frame

Frame: https://static.adsafeprotected.com/sca.17.5.12.js
Frame ID: 04AD5D7A8A9A1893998FA87A8D0B82CF
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Frame ID: 11C547D963F1F9B1D46480FCAF4600FE
Requests: 3 HTTP requests in this frame

Frame: https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/index.html
Frame ID: E1DA71B925D2D187F3B10A9C0716EDFB
Requests: 10 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Frame ID: EEAAA101D394A26F2AB09EC93FD21803
Requests: 2 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/aframe
Frame ID: 3E0EFF22089667E47F7F8AB4A4F62E60
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

Suspected Iranian hackers target airline with new backdoor | ZDNet

Page URL History Show full URLs

  1. https://t.co/Bi3lGmiArD Page URL
  2. http://dlvr.it/SFTlqR HTTP 301
    https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_sour... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • require.*\.js

Overall confidence: 100%
Detected patterns
  • adnxs\.(?:net|com)

Overall confidence: 100%
Detected patterns
  • 2mdn\.net

Overall confidence: 100%
Detected patterns
  • googlesyndication\.com/
  • 2mdn\.net

Overall confidence: 100%
Detected patterns
  • moatads\.com

Overall confidence: 100%
Detected patterns
  • cdn\.cookielaw\.org
  • otSDKStub\.js

Page Statistics

278
Requests

98 %
HTTPS

40 %
IPv6

31
Domains

52
Subdomains

47
IPs

4
Countries

25854 kB
Transfer

32081 kB
Size

36
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://t.co/Bi3lGmiArD Page URL
  2. http://dlvr.it/SFTlqR HTTP 301
    https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 99
  • https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=435792243;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd= HTTP 302
  • https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_pre=CJ2zyaXZ6vQCFcqF_QcdONoGBg;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=435792243;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=
Request Chain 169
  • https://cm.g.doubleclick.net/pixel?google_nid=casale_media2_dsp_secure&google_cm&google_dbm HTTP 302
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=45&external_user_id=CAESEByZq5FghuOsMUYUlYpelz4&google_cver=1
Request Chain 170
  • https://dsum-sec.casalemedia.com/rrum?ixi=0&cm_dsp_id=85&cb=https%3A%2F%2Fcm.g.doubleclick.net%2Fpixel%3Fgoogle_nid%3Dcasale_media2_dsp_secure%26google_cm%26google_hm%3D HTTP 302
  • https://dsum-sec.casalemedia.com/rrum?cb=https%3A%2F%2Fcm.g.doubleclick.net%2Fpixel%3Fgoogle_nid%3Dcasale_media2_dsp_secure%26google_cm%26google_hm%3D&cm_dsp_id=85&ixi=0&C=1 HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=casale_media2_dsp_secure&google_cm&google_hm=YbxwDE-W-9XYIIFVE2pejAAA HTTP 302
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=45&external_user_id=CAESEByZq5FghuOsMUYUlYpelz4&google_cver=1
Request Chain 171
  • https://cm.g.doubleclick.net/pixel?google_nid=appnexus&google_cm&google_dbm HTTP 302
  • https://ib.adnxs.com/setuid?entity=101&code=CAESENX44gTlwqukBNvKEPVqRq8&google_cver=1
Request Chain 172
  • https://ib.adnxs.com/getuid?https://cm.g.doubleclick.net/pixel?google_nid=appnexus&google_hm=${BASE64_UID_ENC} HTTP 307
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fcm.g.doubleclick.net%2Fpixel%3Fgoogle_nid%3Dappnexus%26google_hm%3D%24%7BBASE64_UID_ENC%7D HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=appnexus&google_hm=MzIyNjgxNjkxMTg3NTM0NzAwMA%3D%3D
Request Chain 219
  • https://pixel.adsafeprotected.com/rfw/st/903347/59128494/skeleton.js?ias_dspID=64&adsafe_url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&adsafe_type=abq&adsafe_url=https%3A%2F%2Ft.co%2FBi3lGmiArD&adsafe_type=c&adsafe_url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter&adsafe_type=df&adsafe_jsinfo=,id:129f2999-bf80-c966-27b9-3f48e3d968ae,c:x3eEwY,sl:inView,em:true,fr:true,thd:1,mn:app11ie,rg:ie,pt:1-5-15,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,br:u,abv:na,an:n,oam:0,nbld:0,mtim:636,fm:sRQDqVh+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C161%7C162%7C163%7C171%7C172%7C181%7C182%7C191%7C1a,idMap:15*,pl:,rmeas:1,rend:1,renddet:IMG.qs,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,tt:rjss,et:653,oid:e28027ba-5f29-11ec-be95-024bf4a6d028,v:19.8.273,sp:1,st:0,fwm:1,wr:1600.1200,sr:1600.1200,ov:0 HTTP 302
  • https://static.adsafeprotected.com/skeleton.js

278 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Bi3lGmiArD
t.co/
257 B
678 B
Document
General
Full URL
https://t.co/Bi3lGmiArD
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.244.42.197 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
Security Headers
Name Value
Content-Security-Policy referrer always;
Strict-Transport-Security max-age=0
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

date
Fri, 17 Dec 2021 11:10:01 GMT
vary
Origin
server
tsa_o
expires
Fri, 17 Dec 2021 11:15:01 GMT
content-type
text/html; charset=utf-8
cache-control
private,max-age=300
content-length
191
referrer-policy
unsafe-url
content-encoding
gzip
x-xss-protection
0
content-security-policy
referrer always;
strict-transport-security
max-age=0
x-response-time
121
x-connection-hash
6366b06c9522beae880ae67b30e01ffcf911c267e0da009f8ba2b653fb03d114
Primary Request /
www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Redirect Chain
  • http://dlvr.it/SFTlqR
  • https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
227 KB
92 KB
Document
General
Full URL
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
d8048358606d137164293c51302c5a1c3d151bd148c2ab0413555debc2289617
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://t.co/Bi3lGmiArD

Response headers

content-encoding
gzip
content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-type
text/html; charset=UTF-8
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
last-modified
Fri, 17 Dec 2021 11:10:02 GMT
link
<https://www.zdnet.com/a/fly/css/core/main-61ec7c25fb-rev.css>; rel="preload"; as="style"; nopush
referrer-policy
no-referrer-when-downgrade
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-tx-id
b7a3fe99-7265-4f37-8465-59354a21e162
x-xss-protection
1; mode=block
date
Fri, 17 Dec 2021 11:10:02 GMT
via
1.1 varnish
cache-control
max-age=5400, private
expires
Fri, 17 Dec 2021 12:40:02 GMT
strict-transport-security
max-age=63072000; includeSubDomains; preload
accept-ranges
bytes
vary
Accept-Encoding, User-Agent
content-length
92942

Redirect headers

Date
Fri, 17 Dec 2021 11:10:01 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
Server
nginx
Location
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter#ftag=RSSbaffb68
Cache-Control
private; max-age=90
X-Backend-Server
web02.web
main-61ec7c25fb-rev.css
www.zdnet.com/a/fly/css/core/
304 KB
53 KB
Stylesheet
General
Full URL
https://www.zdnet.com/a/fly/css/core/main-61ec7c25fb-rev.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
83575e34525331ea577205e94ffcb89cb9bb5cbb6e9f1c852dacaf941276de5b
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
53705
x-xss-protection
1; mode=block
last-modified
Thu, 16 Dec 2021 20:56:56 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
content-type
text/css
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 23 Dec 2021 20:58:43 GMT
otSDKStub.js
cdn.cookielaw.org/scripttemplates/
19 KB
7 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9440 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4d2a74d8b25e1ccd4b1294b0b937804bc24aeea7f46edad3f3c1f91604d2708c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:10:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
BXRr8anumVFsMvgN5QlueA==
age
4
vary
Accept-Encoding
content-length
6508
x-ms-lease-status
unlocked
last-modified
Thu, 16 Dec 2021 21:12:11 GMT
server
cloudflare
etag
0x8D9C0D8BA367D8A
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
ac48080f-c01e-0069-13c1-f2874a000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb3e08a576939-FRA
expires
Fri, 17 Dec 2021 15:10:02 GMT
optanon-v1.1.0.js
www.zdnet.com/a/privacy/optanon/
36 KB
10 KB
Script
General
Full URL
https://www.zdnet.com/a/privacy/optanon/optanon-v1.1.0.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
a0a97a5a7dc2b30e9a76ff211332f36d435293c19ed91ca1ad6a66adc1dc50cd
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
10444
x-xss-protection
1; mode=block
last-modified
Thu, 04 Mar 2021 19:22:21 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"46e2aa30cbebb708b5fc468d57d56d8b"
strict-transport-security
max-age=31536000
content-language
en
via
1.1 varnish
cache-control
public, max-age=86400
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
content-type
application/javascript
expires
Thu, 18 Nov 2021 07:05:01 GMT
controls-ce6ece0b43-rev.css
www.zdnet.com/a/fly/css/video/htmlPlayerControls/
25 KB
4 KB
Stylesheet
General
Full URL
https://www.zdnet.com/a/fly/css/video/htmlPlayerControls/controls-ce6ece0b43-rev.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
d32763388ba6d9bba0619b8912021d30345002aa0d5dcba3ce01a05da23f72db
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
4330
x-xss-protection
1; mode=block
last-modified
Thu, 16 Dec 2021 20:56:57 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
content-type
text/css
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 23 Dec 2021 20:58:43 GMT
charlie-osborne.jpg
www.zdnet.com/a/img/resize/c8ef739a72ea5f7507a32fca52940befe437ac45/2014/07/22/36b8334d-1175-11e4-9732-00505685119a/
924 B
1 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/c8ef739a72ea5f7507a32fca52940befe437ac45/2014/07/22/36b8334d-1175-11e4-9732-00505685119a/charlie-osborne.jpg?width=50&height=50&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
f6a1d1301a41d925a220c3cac7f9d927356bff1c809259b16601325663de156d
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
via
1.1 varnish
fastly-io-info
ifsz=11429 idim=350x250 ifmt=jpeg ofsz=924 odim=50x50 ofmt=webp
x-goog-meta-x-goog-reserved-source-generation
1588631330699120
fastly-stats
io=1
content-length
924
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"+syrtNFOJHcaa/T8DZP/qt2kgH1Jbet5hqlMrCh94N4"
vary
Accept-Encoding, Accept
strict-transport-security
max-age=31536000
content-language
en
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
content-type
image/webp
expires
Mon, 06 Dec 2021 09:31:39 GMT
charlie-osborne.jpg
www.zdnet.com/a/img/resize/ae8b429306581e2c4e0430de956e3cf4ec97dd0d/2014/07/22/36b8334d-1175-11e4-9732-00505685119a/
1 KB
2 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/ae8b429306581e2c4e0430de956e3cf4ec97dd0d/2014/07/22/36b8334d-1175-11e4-9732-00505685119a/charlie-osborne.jpg?width=70&height=70&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
c98713a27c661e04f9aecf37a7794088451f73bab4b9bb615ed29ff5a5fd75e1
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
via
1.1 varnish
fastly-io-info
ifsz=11429 idim=350x250 ifmt=jpeg ofsz=1362 odim=70x70 ofmt=webp
x-goog-meta-x-goog-reserved-source-generation
1588631330699120
fastly-stats
io=1
content-length
1362
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"WJx6jKkdQae/xT/2CLMZ+wj9F2L05l7GfidXOzIiG/Q"
vary
Accept-Encoding, Accept
strict-transport-security
max-age=31536000
content-language
en
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
content-type
image/webp
expires
Mon, 06 Dec 2021 09:31:39 GMT
require-2.1.2.js
www.zdnet.com/a/fly/js/libs/
16 KB
6 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/libs/require-2.1.2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
a70d5b9ad136255942779acf94da5cc72316fde5c10c5e7707d6f1888f43dcb8
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
6169
x-xss-protection
1; mode=block
last-modified
Tue, 14 Dec 2021 16:01:53 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"ef4ea9601b2a10c6fa6a76408a1d97b4"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 21 Dec 2021 18:20:59 GMT
inlineMedia_core.js
static.myfinance.com/widget/
184 KB
63 KB
Script
General
Full URL
https://static.myfinance.com/widget/inlineMedia_core.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6815:2b8a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c2898711aa44688968b5769b7ca3a50be196c4897657ab6ce34f215b07f455d
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
426
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
x-amz-request-id
HHSJP7534EDWQCG3
x-amz-id-2
Ko19KzwjZiLsOj2lCJFOTqS9WvYxwFid2E6CS14yXQmbV0jEqPWA5XNNGBZenh2WKw8BnJJ41h4=
last-modified
Thu, 09 Dec 2021 19:58:40 GMT
server
cloudflare
etag
W/"874805badaa992bae7fba35738ee6edc"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=obwRh4Xvjg%2FNQcLT1iaKzxeet5ZAzwSZI8GApgkocWjaPiErHDJf205Xz2mczTn6xxr7VDn69esYchGMwRdgxmCwNN0Lrz2IHDuCAcy0RP6Iw90x%2BKfIcc%2BAo1oQdFH%2Blo9M4Ojm1Jc%2Fn3eOopewxbJo1Q%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
vary
Accept-Encoding
cache-control
max-age=14400
cf-ray
6befb3e3885e4ac3-FRA
YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
c.go-mpulse.net/boomerang/ Frame 7051
205 KB
50 KB
Script
General
Full URL
https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00:1bb::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Akamai Resource Optimizer /
Resource Hash
09ebd7f407439990aac227e70da23e1a819e8e30282928e324370805f480bec4

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:10:02 GMT
Content-Encoding
br
Last-Modified
Thu, 14 Oct 2021 03:09:47 GMT
Server
Akamai Resource Optimizer
Vary
Accept-Encoding
Content-Type
application/javascript;charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800, s-maxage=604800
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
50393
truncated
/
31 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f3e2e0f12c5badfe408d69bf6c0fa9ce6247f9a45c849851a53b8647637cfcd0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
dfd272053c730cd470302af475eb401d9be41c81f0081c20d7910f6c12732c9d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
95783bf43b78701a92daf5ec7268db97c7144599c774821126b8cc5396724bfa

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
logo.png
www.zdnet.com/a/fly/1639688064-asset/bundles/zdnetcss/images/core/
4 KB
4 KB
Image
General
Full URL
https://www.zdnet.com/a/fly/1639688064-asset/bundles/zdnetcss/images/core/logo.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/a/fly/css/core/main-61ec7c25fb-rev.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
ff2ae991ac0efdb5ae8b4428ba8555a0aeb0fd94b8014ce290c484242c524097
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/a/fly/css/core/main-61ec7c25fb-rev.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

content-security-policy
default-src https://*.zdnet.com:*
via
1.1 varnish
last-modified
Thu, 16 Dec 2021 19:54:03 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
date
Fri, 17 Dec 2021 11:10:02 GMT
vary
Accept-Encoding, Accept
content-type
image/png
cache-control
max-age=31536000
strict-transport-security
max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
content-length
4105
x-xss-protection
1; mode=block
expires
Thu, 23 Dec 2021 20:08:24 GMT
Semibold.woff2
www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/
20 KB
20 KB
Font
General
Full URL
https://www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/Semibold.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
21c9c7889404394d4e4c780022b56b5fa39e83b19c34eb0508561a115a1dcc6a
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Origin
https://www.zdnet.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
content-length
20344
x-xss-protection
1; mode=block
last-modified
Fri, 12 Nov 2021 15:35:29 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"a96ff4477074c6395b7305d2d98fde8e"
strict-transport-security
max-age=31536000
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 16 Nov 2022 18:20:56 GMT
Regular.woff2
www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/
20 KB
20 KB
Font
General
Full URL
https://www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/Regular.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
7fa1c7b1686f9f116183456c39f7b3ed9cce063cfb428e575fe4a29ae05c4fa6
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Origin
https://www.zdnet.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
content-length
20256
x-xss-protection
1; mode=block
last-modified
Fri, 12 Nov 2021 15:35:30 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"2d636d9395b2da27ce67040250333ca4"
strict-transport-security
max-age=31536000
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 16 Nov 2022 18:20:56 GMT
inlineMedia.css
static.myfinance.com/widget/
3 KB
2 KB
Stylesheet
General
Full URL
https://static.myfinance.com/widget/inlineMedia.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6815:2b8a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c50d5d10df377bd960648973b53891bfcaf48f457503eed023ad2c29f28e49b2
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
414
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
x-amz-request-id
RM9EMK8GHMB7NW7G
x-amz-id-2
rO4/tb/v63P6c/qJxa0JBYiRUj2pmFCIHFUoYyKlU+xVn/UKNLDsHpQEB0iQ2jT47cP+krHxRTQ=
last-modified
Mon, 12 Jul 2021 14:22:18 GMT
server
cloudflare
etag
W/"528a38ce39fc58a866c1226253bbb189"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=hoAgH%2Ba2%2Fx%2Fu973VAJEposx%2FZm%2FgJUCKIHJY7zz3AnHXLmOT4Jr5rsMejxRFZQJfzWuzJ9cs8okljU2wVcPcq3TmupI9%2FHglNFFNBQIeRxkARjQhpaY3e%2FoDxvesxy73kbAU49iy6BJ1CUvOXncIsnK0qw%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
text/css
vary
Accept-Encoding
cache-control
max-age=14400
cf-ray
6befb3e398624ac3-FRA
e70f246a-fd9b-4805-9fd4-fcd89020aca5.json
cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/
3 KB
2 KB
XHR
General
Full URL
https://cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/e70f246a-fd9b-4805-9fd4-fcd89020aca5.json
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9440 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
eaf765d314b24473895a9ece61135d31023528c3b65129051b2c5a471d780604
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:10:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
xkIaWO5Hr0+rNu9IdoYHdw==
age
13953
vary
Accept-Encoding
content-length
1425
x-ms-lease-status
unlocked
last-modified
Thu, 08 Jul 2021 15:15:53 GMT
server
cloudflare
etag
0x8D94223473B0939
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
6b7a330a-601e-004d-2d15-b61e04000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb3e3acf043b8-FRA
expires
Fri, 17 Dec 2021 15:10:02 GMT
main.default.js
www.zdnet.com/a/fly/046431-fly/js/
223 KB
70 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/046431-fly/js/main.default.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
022185811a029208da14948f296e29ce3ebb9aa90dfaf6a14570245e89a80165
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
71889
x-xss-protection
1; mode=block
last-modified
Thu, 16 Dec 2021 20:56:48 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 23 Dec 2021 20:58:44 GMT
config.json
c.go-mpulse.net/api/ Frame 7051
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&d=www.zdnet.com&t=5465798&v=1.720.0&if=&sl=0&si=ef919254-2123-4cc5-bdfb-819603af5dbe-r49b0p&plugins=ConfigOverride,Continuity,PageParams,IFrameDelay,AutoXHR,SPA,History,Angular,Backbone,Ember,RT,CrossDomain,BW,PaintTiming,NavigationTiming,ResourceTiming,Memory,CACHE_RELOAD,Errors,TPAnalytics,UserTiming,Akamai,Early,EventTiming,LOGN&acao=
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00:1bb::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
60bc99139a579feb8ec8acfbe45440534ad61c69eceb4d2d67ce9176ffd92984

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:10:02 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json
Access-Control-Allow-Origin
*
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
804
location
geolocation.onetrust.com/cookieconsentpub/v1/geo/
165 B
374 B
Script
General
Full URL
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:b844 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
77ae4fb56d2da594993ef6f0203c0cef103af28f7e4c5e0ac045909137422cf9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
content-encoding
gzip
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
strict-transport-security
max-age=31536000; includeSubDomains; preload
cf-ray
6befb3e3fdf342d5-FRA
bidbarrel-zdnet-rv.min.js
at.adtech.redventures.io/lib/dist/prod/
607 KB
177 KB
Script
General
Full URL
https://at.adtech.redventures.io/lib/dist/prod/bidbarrel-zdnet-rv.min.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.194.154 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6c0cd7b80611259d4ccce9165e8b5dd062aad43e3e3e19a404fe967c49795d03

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
via
1.1 9e62923882d737ac8cd27f0d1b1c24cf.cloudfront.net (CloudFront), 1.1 varnish
age
130
x-cache
Hit from cloudfront, HIT
content-encoding
gzip
content-length
180330
x-served-by
cache-fra19154-FRA
last-modified
Thu, 28 Oct 2021 17:15:17 GMT
server
AmazonS3
x-timer
S1639739403.871010,VS0,VE1
etag
"873be44731952ce6844f825d0be702dd"
vary
Accept-Encoding, Origin
content-type
application/javascript
cache-control
max-age=900, public, must-revalidate
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
x-amz-cf-id
gR2fiLfvKwteblQ23sPNxcBywweGcbdlJTs6Uu-Jbu3uCBy_Gv-87Q==
x-cache-hits
1
urs.js
urs.zdnet.com/sdk/
50 KB
50 KB
Script
General
Full URL
https://urs.zdnet.com/sdk/urs.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.120.203.121 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
121.203.120.34.bc.googleusercontent.com
Software
/
Resource Hash
fb7a86f12d2f0ac2f4111c147415ab30f9c7d84c5e15faba3875fce7ce590127
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
via
1.1 google
last-modified
Tue, 12 Jan 2021 17:00:48 GMT
etag
"5ffdd5c0-c803"
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript
accept-ranges
bytes
alt-svc
clear
content-length
51203
inlineMedia.css
static.myfinance.com/widget/
3 KB
1 KB
Stylesheet
General
Full URL
https://static.myfinance.com/widget/inlineMedia.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter#ftag=RSSbaffb68
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6815:2b8a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c50d5d10df377bd960648973b53891bfcaf48f457503eed023ad2c29f28e49b2
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
414
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
x-amz-request-id
RM9EMK8GHMB7NW7G
x-amz-id-2
rO4/tb/v63P6c/qJxa0JBYiRUj2pmFCIHFUoYyKlU+xVn/UKNLDsHpQEB0iQ2jT47cP+krHxRTQ=
last-modified
Mon, 12 Jul 2021 14:22:18 GMT
server
cloudflare
etag
W/"528a38ce39fc58a866c1226253bbb189"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=gJKhuMzOE5l4OXLEwRqC7QG6xAu4c2oBJhDqilvlw06NHlQHG5pxgLR05IVTMfvzwLGUW4TNoRWhB8n0mVKY7IC%2FRQBCYtECgKa5ZjVRN9r4fv0Cdrsmrzo3DjwEp9SNEwYKeUotEXG4wwh2M7LTsHloQg%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
text/css
vary
Accept-Encoding
cache-control
max-age=14400
cf-ray
6befb3e3d9084ac3-FRA
mpulse-1.0.2.js
www.zdnet.com/a/fly/js/libs/
61 KB
12 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/libs/mpulse-1.0.2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
ea7373d7059ab32d4304249b48a91311f91d2dce5e1ebf10450f33f9a8c5f5ec
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:02 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
12449
x-xss-protection
1; mode=block
last-modified
Mon, 13 Dec 2021 22:34:51 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"148d7e6acc80b32c08a3cbf8e3164307"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 21 Dec 2021 05:39:11 GMT
config.json
c.go-mpulse.net/api/v2/
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/v2/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&t=1639739402885&s=e1a31266512ead6a66c8ee62dbec9295b50e25cda90444ae708c3c00bfa28a5b
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00:1bb::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
890f08c7fb2bdf7313006348e535e1ca71505cdfd5612a40fcda176bc196c7db

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:10:03 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
814
record
a.myfidevs.io/ Frame
0
0
Preflight
General
Full URL
https://a.myfidevs.io/record
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.73.158.59 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-73-158-59.compute-1.amazonaws.com
Software
Python/3.7 aiohttp/3.7.4.post0 /
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
content-type,x-api-key
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
access-control-allow-origin
*
access-control-allow-credentials
true
access-control-allow-methods
POST
access-control-allow-headers
*
server
Python/3.7 aiohttp/3.7.4.post0
v1.5
www.myfinance.com/api/au/ Frame
0
0
Preflight
General
Full URL
https://www.myfinance.com/api/au/v1.5?imre=aHR0cHM6Ly93d3cuemRuZXQuY29tL2FydGljbGUvc3VzcGVjdGVkLWlyYW5pYW4taGFja2Vycy10YXJnZXQtYWlybGluZS13aXRoLW5ldy1iYWNrZG9vci8=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3030::ac43:b431 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-type
text/html; charset=utf-8
vary
Origin
access-control-allow-credentials
true
access-control-allow-origin
https://www.zdnet.com
access-control-allow-headers
x-requested-with, content-type, accept, origin, authorization, x-csrftoken, x-api-key, Access-Control-Allow-Origin
access-control-allow-methods
DELETE, GET, OPTIONS, PATCH, POST, PUT
access-control-max-age
86400
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=FQnnxU5oEeN%2F12c4jxkj0HJzt941OdrC0%2FTYiU6h4CYI2e3NXFteLhFbpC4uVH3hwrHTI%2FxPsB23rtgTW9ITmziHSNc6G067%2FwYllUAtted5N9iXYskm9Aonp1zpHl8jyEG132o2DF5wfLvuEQMteg%3D%3D"}],"group":"cf-nel","max_age":604800}
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
strict-transport-security
max-age=15552000
x-content-type-options
nosniff
server
cloudflare
cf-ray
6befb3e46a1b4a80-FRA
content-encoding
br
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
record
a.myfidevs.io/
0
166 B
XHR
General
Full URL
https://a.myfidevs.io/record
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.73.158.59 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-73-158-59.compute-1.amazonaws.com
Software
Python/3.7 aiohttp/3.7.4.post0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept
application/json
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
x-api-key
yuH27H1QId6afXAojow6Tafi7Vw9v1spaLD5Yznw
Content-Type
application/json

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
access-control-allow-credentials
true
server
Python/3.7 aiohttp/3.7.4.post0
access-control-allow-headers
*
access-control-allow-methods
POST
v1.5
www.myfinance.com/api/au/
1 KB
1 KB
XHR
General
Full URL
https://www.myfinance.com/api/au/v1.5?imre=aHR0cHM6Ly93d3cuemRuZXQuY29tL2FydGljbGUvc3VzcGVjdGVkLWlyYW5pYW4taGFja2Vycy10YXJnZXQtYWlybGluZS13aXRoLW5ldy1iYWNrZG9vci8=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3030::ac43:b431 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7e91278e50f67b763fdba4fee2eb51877a8579675b8614de95b103bf970a1e11
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

Accept
application/json
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
application/json

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
content-type
application/json
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
allow
POST, GET
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=zn5Nx0bM%2Bwl70Jo4JFT5vEPdrAPr8ic4TFImPUf1spGaOYvyzoBwnE1oURXt4D6UvumTCkjY9RaGByCMR5C3DPOom7X1CRVZzBQaBGyur3wu%2FFh7Qw%2Bw32Lzw%2Fcrqqkvd8E6JaYMtm%2F9XSdKWTCLsg%3D%3D"}],"group":"cf-nel","max_age":604800}
content-language
en-us
access-control-allow-origin
https://www.zdnet.com
vary
Accept, Accept-Language, Origin, Cookie
cache-control
max-age=0, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cf-ray
6befb3e57ebe5c08-FRA
expires
Fri, 17 Dec 2021 11:10:03 GMT
otBannerSdk.js
cdn.cookielaw.org/scripttemplates/6.20.0/
376 KB
84 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/6.20.0/otBannerSdk.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9440 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
295c66c14524b77dd1271317457dec037b5ef0943da346b9b73681e54da826e0
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:10:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
jOOTzA5W9ewbfwCUPpt/mw==
age
5137351
vary
Accept-Encoding
content-length
86053
x-ms-lease-status
unlocked
last-modified
Wed, 07 Jul 2021 06:41:48 GMT
server
cloudflare
etag
0x8D941124BEC2620
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
b5562596-701e-0174-096c-c418f5000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb3e43a8a6939-FRA
diff
at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/ Frame
0
0
Preflight
General
Full URL
https://at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/diff?variant=core
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.194.154 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
Google Frontend /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
*/*
Access-Control-Request-Method
GET
Access-Control-Request-Headers
cat,content-type,variant,version
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

content-type
text/html; charset=utf-8
x-dns-prefetch-control
off
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=15552000; includeSubDomains
x-download-options
noopen
x-content-type-options
nosniff
x-xss-protection
1; mode=block
access-control-allow-origin
https://www.zdnet.com
access-control-allow-headers
*
allow
GET,HEAD
etag
W/"8-ZRAf8oNBS3Bjb/SU2GYZCmbtmXg"
x-cloud-trace-context
9db752f0b43e24177d4211f4029b4c10
server
Google Frontend
accept-ranges
bytes
date
Fri, 17 Dec 2021 11:10:03 GMT
via
1.1 varnish
x-served-by
cache-fra19149-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1639739403.007329,VS0,VE112
vary
Accept-Encoding, Origin
content-length
8
config.js
confiant-integrations.global.ssl.fastly.net/J3UXFee1xclY-bfFlWh1mIZ_phU/gpt_and_prebid/
163 KB
32 KB
Script
General
Full URL
https://confiant-integrations.global.ssl.fastly.net/J3UXFee1xclY-bfFlWh1mIZ_phU/gpt_and_prebid/config.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.129.194 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
40a3d46590200a193c0556b55b04e888bc2399faa60ffc3aa95e83cda8981601

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:10:02 GMT
Content-Encoding
gzip
Age
1059
X-Cache
HIT
Connection
keep-alive
Content-Length
32255
x-amz-id-2
kVDHvB6ykPPTAEDAabCm3ccFM2DDxb53Rg9M1jY4izZQIlKbR33qen8jCcCieZdsM/+rFXJ7AOY=
X-Served-By
cache-fra19166-FRA
Last-Modified
Fri, 17 Dec 2021 10:42:57 GMT
Server
AmazonS3
X-Timer
S1639739403.987086,VS0,VE0
ETag
"4ad6984a8f154c16b986a4ba17b2cc66"
x-amz-request-id
6TJN4Q6TBVDSFYKZ
Via
1.1 varnish
Cache-Control
public, max-age=900, stale-while-revalidate=3600
Accept-Ranges
bytes
Content-Type
text/javascript
X-Cache-Hits
10
diff
at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/
26 KB
3 KB
Fetch
General
Full URL
https://at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/diff?variant=core
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.194.154 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
Google Frontend /
Resource Hash
3e279129e0b32c21501807eddb0c582841a0536e6dac62169361c51d5a9baed1
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

cat
5zTciER5s
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
application/json
Accept
application/json
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
variant
core
version
rv2.25.6

Response headers

strict-transport-security
max-age=15552000; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
age
672
x-dns-prefetch-control
off
x-cache
HIT
ttl
900s
content-length
2720
x-xss-protection
1; mode=block
x-served-by
cache-fra19149-FRA
access-control-allow-origin
*
server
Google Frontend
x-timer
S1639739403.127488,VS0,VE0
x-frame-options
SAMEORIGIN
date
Fri, 17 Dec 2021 11:10:03 GMT
x-download-options
noopen
vary
Accept-Encoding, Origin
content-type
application/json; charset=utf-8
via
1.1 varnish
x-cloud-trace-context
ba88bbff27fa65d1c7d69ed7cf7226c8
cache-control
max-age=900
etag
W/a2d3576aa9cd593699dde9d75b9183cf051d0dcf
accept-ranges
bytes
access-control-allow-headers
*
x-cache-hits
2
gpt.js
securepubads.g.doubleclick.net/tag/js/
78 KB
27 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
sffe /
Resource Hash
1907478e8fa62801a1db26be87cab0755288131c9c8e80320582e560825df3cc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1073 / 739 of 1000 / last-modified: 1639397097"
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
26912
x-xss-protection
0
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Fri, 17 Dec 2021 11:10:03 GMT
en.json
cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/069e0a06-a1be-44f5-9a8f-926f2985d489/
93 KB
20 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/069e0a06-a1be-44f5-9a8f-926f2985d489/en.json
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9440 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c83de3876b70820a0a835648010dc49a5600d6c3dd65f1a1e19ff44d33663083
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
AlmWtxV11YCExQkuyz0PJA==
age
13954
vary
Accept-Encoding
content-length
20136
x-ms-lease-status
unlocked
last-modified
Thu, 08 Jul 2021 15:15:59 GMT
server
cloudflare
etag
0x8D942234AE979B3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
04e26c27-701e-00bc-7615-b6cf97000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb3e4bfe743b8-FRA
expires
Fri, 17 Dec 2021 15:10:03 GMT
wrap.js
confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/
189 KB
61 KB
Script
General
Full URL
https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/wrap.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.129.194 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
80da370ad41bee2716b42d1583e139eac39f5c7c243c5fe6439b9754013116c6

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:10:03 GMT
Content-Encoding
gzip
Age
759
X-Cache
HIT
Connection
keep-alive
Content-Length
61460
x-amz-id-2
mhjLBwq4ofP4Ht18aFXJwavbMA7sAA+j53tdu5a+bQynUB9jggNi8MPZBXPh5JJbJapjzT+KHSM=
X-Served-By
cache-fra19166-FRA
Last-Modified
Thu, 02 Dec 2021 17:00:39 GMT
Server
AmazonS3
X-Timer
S1639739403.033584,VS0,VE0
ETag
"0bad6e8b774e2623401e436c2a44f48e"
x-amz-request-id
K526S02KR1DXHTEX
Via
1.1 varnish
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
Content-Type
application/javascript; charset=utf-8
X-Cache-Hits
408
article-6ebc50982c-rev.js
www.zdnet.com/a/fly/js/pages/
102 KB
26 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/pages/article-6ebc50982c-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
5b6e97cf069d0d1a67390ad12ef50237963c77addfd1c8f15399b916993dd143
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
26736
x-xss-protection
1; mode=block
last-modified
Tue, 14 Dec 2021 15:00:39 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"077e6dbcc2328e1aabe9b3b472aa6e18"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 21 Dec 2021 15:23:17 GMT
otFlat.json
cdn.cookielaw.org/scripttemplates/6.20.0/assets/
13 KB
3 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/scripttemplates/6.20.0/assets/otFlat.json
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9440 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
72562f00bd821b6edc0368065bf009468955ba01f8ead742d8bbc2470c4358c4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
/OL7qnwFOarng5AW29V9Pw==
age
5137327
vary
Accept-Encoding
content-length
2950
x-ms-lease-status
unlocked
last-modified
Wed, 07 Jul 2021 06:41:42 GMT
server
cloudflare
etag
0x8D94112485FC2D3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/json
access-control-allow-origin
*
x-ms-request-id
84c52ef2-f01e-0048-626c-c4ea7b000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb3e518e343b8-FRA
pubads_impl_2021120601.js
securepubads.g.doubleclick.net/gpt/
348 KB
117 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
sffe /
Resource Hash
2d5ae5a515a688823dc98d032242c2ed6f490a74c4281bdd599567898f9fa675
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
119476
x-xss-protection
0
last-modified
Mon, 06 Dec 2021 09:34:20 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Fri, 17 Dec 2021 11:10:03 GMT
ppub_config
securepubads.g.doubleclick.net/pagead/
217 B
153 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/pagead/ppub_config?ippd=www.zdnet.com
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
12717f96c61a500136a8564d666db9b960869a71dd3176a438b53fb08be5c7bb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private, max-age=3600, stale-while-revalidate=3600
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
128
x-xss-protection
0
expires
Fri, 17 Dec 2021 11:10:03 GMT
cohesion-latest.min.js
cdn.cohesionapps.com/cohesion/
77 KB
22 KB
Script
General
Full URL
https://cdn.cohesionapps.com/cohesion/cohesion-latest.min.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.66.139.10 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-66-139-10.fra60.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6d5246d5f81b078b8d850b3fbe4ac7c44d05c0755ea14786c6fee453e6805fff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-amz-version-id
null
content-encoding
gzip
etag
W/"9f7be06169d1d8c9558378c9b8f53586"
last-modified
Tue, 14 Dec 2021 17:07:13 GMT
server
AmazonS3
age
64964
x-amz-server-side-encryption
AES256
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript
via
1.1 7efdfc8e9ebc26758933b0151e22707e.cloudfront.net (CloudFront)
date
Thu, 16 Dec 2021 17:07:19 GMT
x-amz-cf-pop
FRA60-P4
x-amz-cf-id
KG6sULSoL4vcyRVCJOsdgZRDqThxn3w7u90tIRzMHeoSbRH-K_wYuA==
moatheader.js
z.moatads.com/redventuresgamheader644747280705/
240 KB
82 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ba5c9b5823ef1377da70e73357b85ef2dca7ade9afe70c93d0aa163c61c9bf03

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
last-modified
Thu, 02 Dec 2021 16:10:34 GMT
server
AmazonS3
x-amz-request-id
DG2H92XYZRQZ4RSV
etag
"33d2b31f29685690d6e2e3d016555f04"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=15195
accept-ranges
bytes
content-length
83699
x-amz-id-2
TnGeV4HtYB4NVPsPbHr+b5g34xbNmb7VjpQ7zI9/ywXjEabCjusxmRc+mMFbdi/bypbtdhI7jN0=
integrator.js
adservice.google.de/adsid/
107 B
792 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:802::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
cache-control
private, no-cache, no-store
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3="googleads.g.doubleclick.net:443"; ma=2592000,h3=":443"; ma=2592000,h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
100
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
107 B
549 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
cache-control
private, no-cache, no-store
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
100
x-xss-protection
0
ads
securepubads.g.doubleclick.net/gampad/
26 KB
11 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3797515782955650&correlator=553824950314126&output=ldjh&impl=fifs&eid=31061814%2C31063378%2C31063915%2C44756716%2C31063247&vrg=2021120601&ptt=17&sc=1&sfv=1-0-38&ecs=20211217&iu_parts=22309610186%2Caw-zdnet%2Ctechnology%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3&prev_iu_szs=728x90%7C970x66%7C5x5&prev_scp=pos%3Dnav%26sl%3Dnav-ad-plus-leader%253FT-1000%26iid%3Dunit%253Dnav-ad-plus-leader%257Cvguid%253Dd5ebeff1-aaff-4a87-ba0f-c0c9612e3738%257Cpv%253D1&eri=1&cust_params=buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dslack%252Cibm%26tag%3Dcyber-security%252Ctarget%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dsuspected-iranian-hackers-target-airline-with-new-backdoor%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%252Csocial_user%26type%3Dgpt%26region%3Daw%26subses%3D3%26session%3Da%26pv%3D1%26vguid%3Dd5ebeff1-aaff-4a87-ba0f-c0c9612e3738&cookie_enabled=1&bc=31&abxe=1&lmt=1639739402&dt=1639739403457&dlt=1639739402294&idt=1100&frm=20&biw=1600&bih=1200&oid=2&adxs=436&adys=50&adks=3529097836&ucis=1&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&ref=https%3A%2F%2Ft.co%2FBi3lGmiArD&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1600x100&msz=1600x100&ga_vid=300051814.1639739403&ga_sid=1639739403&ga_hid=1651433687&ga_fc=false&fws=4&ohw=1600&btvi=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
c67f9f18d55a9862d0d6bc9fb3ae63fb13c17f5f029f69ec990bf650f355b681
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
10958
x-xss-protection
0
google-lineitem-id
5840893800
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138375198164
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/safeframe/1-0-38/html/ Frame 7453
6 KB
4 KB
Document
General
Full URL
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a73730123a43c3040d889aaee11ec35094277ce5f778076b262c23a293870adb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
timing-allow-origin
*
content-length
3108
date
Fri, 17 Dec 2021 11:10:03 GMT
expires
Sat, 17 Dec 2022 11:10:03 GMT
cache-control
public, immutable, max-age=31536000
last-modified
Tue, 02 Mar 2021 20:17:03 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.197.155 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-197-155.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.197.155 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-197-155.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.197.155 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-197-155.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.197.155 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-197-155.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.197.155 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-197-155.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/
137 B
270 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.197.155 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-197-155.compute-1.amazonaws.com
Software
/
Resource Hash
e2918ede5b380c3deff606bc827bae6f0bf64df9fa9f2f7bd2bca9b46d2668e7

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
access-control-allow-credentials
true
content-length
137
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
137 B
270 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.197.155 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-197-155.compute-1.amazonaws.com
Software
/
Resource Hash
a2b31acfa8e6b747a119f4a889f0c3b3c3f45742ba67e28d0cf0281fcc35dd9e

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
access-control-allow-credentials
true
content-length
137
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
138 B
271 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.197.155 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-197-155.compute-1.amazonaws.com
Software
/
Resource Hash
0d605596faa2f9c96ea1053817b14aa5b097e4a7ee2e2537019754c994017a37

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
access-control-allow-credentials
true
content-length
138
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
138 B
271 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.197.155 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-197-155.compute-1.amazonaws.com
Software
/
Resource Hash
e0a0ab9fc9f8d2fdcfdec77155a9bc7ff870a11e1ad21d85fd46d1c83cc38999

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
access-control-allow-credentials
true
content-length
138
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
138 B
271 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.197.155 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-197-155.compute-1.amazonaws.com
Software
/
Resource Hash
2f8d5a40b228973439f2e02af5f839670d3aee396db8e6df1d22b97af4335620

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
access-control-allow-credentials
true
content-length
138
vary
Origin
content-type
application/json
xs1.html
cdn.cohesionapps.com/cohesion/ Frame 3521
2 KB
1 KB
Document
General
Full URL
https://cdn.cohesionapps.com/cohesion/xs1.html
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.66.139.10 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-66-139-10.fra60.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
afac3a301d848688d0748228296ec7ae26369f67c2df29f3f480ef3ab0bc6ef9

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter

Response headers

content-type
text/html
last-modified
Tue, 14 Dec 2021 17:07:14 GMT
x-amz-server-side-encryption
AES256
x-amz-version-id
null
server
AmazonS3
content-encoding
gzip
date
Thu, 16 Dec 2021 17:07:28 GMT
etag
W/"10b2c1751c2247b1aeccc91060f971cf"
vary
Accept-Encoding
x-cache
Hit from cloudfront
via
1.1 7efdfc8e9ebc26758933b0151e22707e.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA60-P4
x-amz-cf-id
8wHKjY2rVuG7i_NJPMTsSkIxdM39nAraZFY2Lfbpq4LsQuoPVXspyQ==
age
64956
public
taggy.cohesionapps.com/implementations/
9 KB
9 KB
XHR
General
Full URL
https://taggy.cohesionapps.com/implementations/public
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.105.31 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-5-105-31.compute-1.amazonaws.com
Software
/ Express
Resource Hash
13631760fe58e5e9c2cf16890b9869a78629cb3769f552fb3b0eaf3fba8e934e

Request headers

Source-Key
src_1kYsAcdpfzbZ8UlNLYht1RPg3m2
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
Page-URL
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter#ftag=RSSbaffb68
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
x-powered-by
Express
etag
W/"23f1-I/Ne1r04eidCtHXfz5YfX2yJL70"
content-length
9201
content-type
application/json; charset=utf-8
public
taggy.cohesionapps.com/implementations/ Frame
0
0
Preflight
General
Full URL
https://taggy.cohesionapps.com/implementations/public
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.105.31 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-5-105-31.compute-1.amazonaws.com
Software
/ Express
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
GET
Access-Control-Request-Headers
content-type,page-url,source-key
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
x-powered-by
Express
access-control-allow-origin
*
access-control-allow-methods
GET,HEAD,PUT,PATCH,POST,DELETE
vary
Access-Control-Request-Headers
access-control-allow-headers
content-type,page-url,source-key
ads
securepubads.g.doubleclick.net/gampad/
20 KB
9 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3797515782955650&correlator=4098082878902483&output=ldjh&impl=fifs&eid=31061814%2C31063378%2C31063915%2C44756716%2C31063247&vrg=2021120601&ptt=17&sc=1&sfv=1-0-38&ecs=20211217&iu_parts=22309610186%2Caw-zdnet%2Ctechnology%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3&prev_iu_szs=300x250%7C300x600&prev_scp=pos%3Dtop%26sl%3Dmpu-plus-top%253FLL%257CT-1000%26iid%3Dunit%253Dmpu-plus-top%257Cvguid%253Dd5ebeff1-aaff-4a87-ba0f-c0c9612e3738%257Cpv%253D1&eri=1&cust_params=buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dslack%252Cibm%26tag%3Dcyber-security%252Ctarget%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dsuspected-iranian-hackers-target-airline-with-new-backdoor%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%252Csocial_user%26type%3Dgpt%26region%3Daw%26subses%3D3%26session%3Da%26pv%3D1%26vguid%3Dd5ebeff1-aaff-4a87-ba0f-c0c9612e3738&cookie_enabled=1&bc=31&abxe=1&lmt=1639739402&dt=1639739403540&dlt=1639739402294&idt=1100&frm=20&biw=1600&bih=1200&oid=2&adxs=1050&adys=450&adks=1139850431&ucis=2&ifi=2&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&ref=https%3A%2F%2Ft.co%2FBi3lGmiArD&vis=1&dmc=8&scr_x=0&scr_y=0&psz=370x280&msz=370x30&ga_vid=300051814.1639739403&ga_sid=1639739403&ga_hid=1651433687&ga_fc=false&fws=4&ohw=370&btvi=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
8911a2e75db161efd1611248359ad27685612cad10ad82f8dd16bd1dc7753d85
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9414
x-xss-protection
0
google-lineitem-id
5821501893
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138370174589
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
17 KB
9 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3797515782955650&correlator=2186421944112251&output=ldjh&impl=fifs&eid=31061814%2C31063378%2C31063915%2C44756716%2C31063247&vrg=2021120601&ptt=17&sc=1&sfv=1-0-38&ecs=20211217&iu_parts=22309610186%2Caw-zdnet%2Ctechnology%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3&prev_iu_szs=300x250&prev_scp=pos%3Dmiddle%26sl%3Dmpu-middle%253FLL%257CT-1000%26iid%3Dunit%253Dmpu-middle%257Cvguid%253Dd5ebeff1-aaff-4a87-ba0f-c0c9612e3738%257Cpv%253D1&eri=1&cust_params=buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dslack%252Cibm%26tag%3Dcyber-security%252Ctarget%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dsuspected-iranian-hackers-target-airline-with-new-backdoor%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%252Csocial_user%26type%3Dgpt%26region%3Daw%26subses%3D3%26session%3Da%26pv%3D1%26vguid%3Dd5ebeff1-aaff-4a87-ba0f-c0c9612e3738&cookie_enabled=1&bc=31&abxe=1&lmt=1639739402&dt=1639739403543&dlt=1639739402294&idt=1100&frm=20&biw=1600&bih=1200&oid=2&adxs=1050&adys=1333&adks=3640736402&ucis=3&ifi=3&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&ref=https%3A%2F%2Ft.co%2FBi3lGmiArD&vis=1&dmc=8&scr_x=0&scr_y=0&psz=370x30&msz=370x30&ga_vid=300051814.1639739403&ga_sid=1639739403&ga_hid=1651433687&ga_fc=false&fws=4&ohw=370&btvi=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
5551bae5746560835d4cf0a136e56a13a95937625db287072a1f52c714a1215a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
8968
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
23 KB
10 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3797515782955650&correlator=1227964338332862&output=ldjh&impl=fifs&eid=31061814%2C31063378%2C31063915%2C44756716%2C31063247&vrg=2021120601&ptt=17&sc=1&sfv=1-0-38&ecs=20211217&iu_parts=22309610186%2Caw-zdnet%2Ctechnology%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3&prev_iu_szs=320x50%7C11x11&fluid=height&prev_scp=pos%3Dtop%26strnativekey%3D8ec3a4f3%26sl%3Dsharethrough-top%253FLL%257CT-1000%26iid%3Dunit%253Dsharethrough-top%257Cvguid%253Dd5ebeff1-aaff-4a87-ba0f-c0c9612e3738%257Cpv%253D1&eri=1&cust_params=buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dslack%252Cibm%26tag%3Dcyber-security%252Ctarget%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dsuspected-iranian-hackers-target-airline-with-new-backdoor%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%252Csocial_user%26type%3Dgpt%26region%3Daw%26subses%3D3%26session%3Da%26pv%3D1%26vguid%3Dd5ebeff1-aaff-4a87-ba0f-c0c9612e3738&cookie_enabled=1&bc=31&abxe=1&lmt=1639739402&dt=1639739403545&dlt=1639739402294&idt=1100&frm=20&biw=1600&bih=1200&oid=2&adxs=215&adys=1434&adks=2408233683&ucis=4&ifi=4&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&ref=https%3A%2F%2Ft.co%2FBi3lGmiArD&vis=1&dmc=8&scr_x=0&scr_y=0&psz=770x150&msz=770x0&ga_vid=300051814.1639739403&ga_sid=1639739403&ga_hid=1651433687&ga_fc=false&fws=4&ohw=770&btvi=2&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
7536ae2fcc6dd435b0d8c795b34d7979bc2f127c2aef97edaf28a4945240ea6e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
10048
x-xss-protection
0
google-lineitem-id
5667186874
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138346534050
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
684dd326.akstat.io/
0
354 B
XHR
General
Full URL
https://684dd326.akstat.io/?h.pg=article&when=1639739403474&cdim.Site_View=desktop&t_other=custom4%7C1034&d=zdnet.com&h.key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&h.d=zdnet.com&h.cr=969256537ce222b4e3b977e741019d62885a46f2-a7787067-2192eff8&h.t=1639739402979&http.initiator=api&rt.start=api&rt.si=e83708d7-1590-408b-90ce-68edbf78397e&rt.ss=1639739404508&rt.sl=0&api=1&api.v=2&api.l=js&api.lv=0.0.1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:1700:391::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:10:03 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Fri, 17 Dec 2021 11:10:03 GMT
v2
mb.moatads.com/yi/
356 B
531 B
Script
General
Full URL
https://mb.moatads.com/yi/v2?ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&callback=MoatNadoAllJsonpRequest_37709686
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.11.215.107 London, United Kingdom, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-11-215-107.eu-west-2.compute.amazonaws.com
Software
TornadoServer/5.1.1 /
Resource Hash
5bcedd4ee91cda4029d58009462c1105b95491ba5f53e2aa0043a78145372365

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
cache-control
max-age=900
server
TornadoServer/5.1.1
timing-allow-origin
*
etag
"f9f20ab58ce38fbff4a64d97e0cc7d919c707ec2"
content-length
356
content-type
text/html; charset=UTF-8
n.js
geo.moatads.com/
84 B
257 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&i=REDVENTURES_GAM_HEADER1&hp=1&wf=1&pxm=&sgs=3&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=https%3A%2F%2Ft.co&t=1639739403574&de=724811122420&m=0&ar=8ab009d7785-clean&iw=04a0275&q=1&cb=0&cu=1639739403574&ll=2&lm=0&ln=0&em=0&en=0&d=undefined%3Aundefined%3Aundefined%3Aundefined&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&bo=undefined&bd=undefined&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&pe=1%3A1121%3A1121%3A0%3A1112&jk=-1&jm=-1&fs=195979&na=758355938&cs=0&ord=1639739403574&jv=1692392965&callback=DOMlessLLDcallback_37709686
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.132.152.138 London, United Kingdom, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-132-152-138.eu-west-2.compute.amazonaws.com
Software
TornadoServer/5.1.1 /
Resource Hash
a92da95282ec9d1fe5d322707011b4846ea65ee1d96a009ac09aea75b1a2a16a

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
cache-control
max-age=900
server
TornadoServer/5.1.1
timing-allow-origin
*
etag
"e3b3c9562c567fa9fb282eb9655145a3cd23e460"
content-length
84
content-type
text/html; charset=UTF-8
n.js
geo.moatads.com/
86 B
260 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&i=REDVENTURES_GAM_HEADER1&hp=1&wf=1&pxm=&sgs=3&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=https%3A%2F%2Ft.co&t=1639739403574&de=724811122420&m=0&ar=8ab009d7785-clean&iw=04a0275&q=2&cb=0&cu=1639739403574&ll=2&lm=0&ln=0&em=0&en=0&d=undefined%3Aundefined%3Aundefined%3Aundefined&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&bo=undefined&bd=undefined&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&pe=1%3A1121%3A1121%3A0%3A1112&jk=-1&jm=-1&fs=195979&na=630103005&cs=0&callback=MoatDataJsonpRequest_37709686
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.132.152.138 London, United Kingdom, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-132-152-138.eu-west-2.compute.amazonaws.com
Software
TornadoServer/5.1.1 /
Resource Hash
7886696b64bd697f15eaa783ff674fc2c5132fd94be0912a67d373a9442e3b40

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
cache-control
max-age=900
server
TornadoServer/5.1.1
timing-allow-origin
*
etag
"33855e6a403f97f88926ada10da26d37e12c5114"
content-length
86
content-type
text/html; charset=UTF-8
xs2.html
cdn.cohesionapps.com/cohesion/ Frame 3521
473 B
836 B
Document
General
Full URL
https://cdn.cohesionapps.com/cohesion/xs2.html
Requested by
Host: cdn.cohesionapps.com
URL: https://cdn.cohesionapps.com/cohesion/xs1.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.66.139.10 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-66-139-10.fra60.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
88b8a3cb9df436d6910440c58428516accee080be4fa556d3cf10ec6905cf1b9

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://cdn.cohesionapps.com/cohesion/xs1.html

Response headers

content-type
text/html
content-length
473
last-modified
Tue, 14 Dec 2021 17:07:14 GMT
x-amz-server-side-encryption
AES256
x-amz-version-id
null
accept-ranges
bytes
server
AmazonS3
date
Thu, 16 Dec 2021 17:07:20 GMT
etag
"ffa03bed298484a7755ca23c5431cb28"
x-cache
Hit from cloudfront
via
1.1 7efdfc8e9ebc26758933b0151e22707e.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA60-P4
x-amz-cf-id
Mh0CtdzyRB69HHdC8Wv1LS_gHDvf_kqRGp6nRZXY7dSD5JcYQJ3AEg==
age
64964
view
securepubads.g.doubleclick.net/pcs/ Frame 2106
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstufgQNDJYefI-FfwsegvWeAMJppbQmuV9uyizgdQi2eAKT4RzEmoYWgiXb4zSrEaBp-nIxuLawCuljQQhmDZ90ylXANZYEHwJmNXzvqg-sBazaXSgAU7AHQGl6VSZ_KkAC2K1-qA_75q8F-H_uOGIdWFmahhJpJQwwoCPt3aPXX4Kk57En8INGJjakcETRda4aCaHyEud-1cv5_LULJRsJhnKqTGPYw1dP9wubAY8b9Jr8lgKIohcFHaW43POZaJhKMbjJKXHkhGI6eClHVL1Ym7cGLgKuXDzy0vTv8UB9JQhdj23KjZPcgdaz19oh5mo0dW8RVa_g-1PcLfs&sai=AMfl-YT_oEAYDuneqXpUP3R77yi_cjZsikD1RQfAMBibsjLnuDHasDy4o2iWv6zNRHlC90EUmMZ_ixgBh3ZOwPqndZkDGe_VBzh-QnL1eDxpa4Wuor1rZhQEMgpTNZdN-8Q&sig=Cg0ArKJSzB0LufT2_sSjEAE&uach_m=[UACH]&urlfix=1&adurl=
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Fri, 17 Dec 2021 11:10:03 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 2106
119 KB
37 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37305
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1638461285297402"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:10:03 GMT
moatad.js
z.moatads.com/redventuresgamdisplay60805146916/ Frame 2106
335 KB
112 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamdisplay60805146916/moatad.js
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ec3300dff5a35315ea608c5dc57e965957897133eb6a543533566d6e2c35ed07

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
last-modified
Thu, 09 Dec 2021 16:36:30 GMT
server
AmazonS3
x-amz-request-id
SXBZ8ADYT77KW7MP
etag
"9c75e5b0c5bc0a53e0cdef53eae89c77"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=15082
accept-ranges
bytes
content-length
114446
x-amz-id-2
Js3u1th+lEwEMVGKInxoBehDmEsPJoYn2GSrvSApeaA9h/kdmOzjLJkUhJKG3pI/I9LMlptFND8=
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.197.155 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-197-155.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.197.155 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-197-155.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/
138 B
271 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.197.155 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-197-155.compute-1.amazonaws.com
Software
/
Resource Hash
740cdf48b7375cba97778fc319fdddf68e78fe108dbc80e360cc3329d85dfad3

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
access-control-allow-credentials
true
content-length
138
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
138 B
271 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.197.155 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-197-155.compute-1.amazonaws.com
Software
/
Resource Hash
202822bb1b836f7d52831b8a2b4c83cf559afe4348de72f977bb85cfe650eb63

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
access-control-allow-credentials
true
content-length
138
vary
Origin
content-type
application/json
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_DISPLAY1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=11x11&zMoatPS=top&zMoatSZPS=11x11%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=https%3A%2F%2Ft.co&t=1639739403765&de=643299909330&m=0&ar=cc97a930ec1-clean&iw=101177c&q=6&cb=0&ym=0&cu=1639739403765&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=5009920773%3A2843412950%3A5667186874%3A138346534050&zMoatW=11&zMoatH=11&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=sharethrough-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&gw=redventuresgamdisplay60805146916&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1121%3A1121%3A0%3A1112&iq=na&tt=na&tu=&tp=&jk=-1&jm=-1&fs=195926&na=34234570&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:03 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:03 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 2106
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsttZaO8KhrmO1BnVJHAg0bslf1XBBaLmst53lRQ-zkJMArMVpaw6tVnThQ3aJ2BTlsTHtU8pSuTDGA2vU8kHvQWYAprvDUJhOLrpF1SLl61MO_-tZ6t5GDUGXRrsoL9lYqm7uPXwAeOh9YC9_T60NCYex3ZS22xunCRVGWgOBryQhN-rH5PzQVWxPdl-PQRu8mfxhpbC5a4msZscOZEZCfmiZGMbWQwDM_cyOBskYHtkbm8Imwiq6KfPW-wv5naTPMpOwQ5KPtimn0HfZJJkgJxdErhsDqD5SwmvVct_rv-PS0m3Di1gUB37iLM9W36qFYRJ1n74ftODGey7hBPzQ&sai=AMfl-YTtHMxXnEFsFDeNA-M1EiblrdHu81O3FMiTWCwixrKDDiFstQtQt4mX0S4I5xPumj0P3-BWNyHthobzZijf8doWQpy5l3WJlSD_uOPJUok1KljTzuFYGHKI773lrw8&sig=Cg0ArKJSzGuNVR8V8777EAE&uach_m=[UACH]&urlfix=1&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Fri, 17 Dec 2021 11:10:03 GMT
nr-spa-1212.min.js
js-agent.newrelic.com/
44 KB
17 KB
Script
General
Full URL
https://js-agent.newrelic.com/nr-spa-1212.min.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.2.137 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ebfe453394ff1be6ef75d380ab7c5535aea0b51832d045f0d5d0ef7e6535969c

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-amz-version-id
wY72Ah.NJX5KzzqRFK3uhSo3Jh07tDe4
content-encoding
gzip
etag
"8bd93bf0ecb2f4e971a2055a41402bb6"
x-amz-request-id
VG6YBKXNYMJ05RRS
x-cache
HIT
cross-origin-resource-policy
cross-origin
content-length
16636
x-amz-id-2
CN/OtP3A9z0ShcwSC84Dp2716OPSVqHtXjTa3tL4kDFfrY9FTweTMDz1ynWsKHz8NETzizCEpEw=
x-served-by
cache-fra19149-FRA
last-modified
Thu, 04 Nov 2021 21:16:16 GMT
server
AmazonS3
x-timer
S1639739404.830171,VS0,VE0
date
Fri, 17 Dec 2021 11:10:03 GMT
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish
cache-control
public, max-age=7200, stale-if-error=604800
accept-ranges
bytes
x-cache-hits
283
sodar
pagead2.googlesyndication.com/getconfig/
11 KB
9 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2021120601&st=env
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
fe5b900ebeaea000e2230794b76b7a1e9d3a0665276a55af46701e3972c42384
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
8607
x-xss-protection
0
/
www.zdnet.com/components/breaking-news/xhr/
1 KB
1 KB
XHR
General
Full URL
https://www.zdnet.com/components/breaking-news/xhr/?slug=breaking-news-banner
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
309c7f77b36ad8f0ecb6278afb0cf7bf91f525b2053ab757246a07e2879fe32d
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

X-NewRelic-ID
VgEBVlJWCRAGXVRVDwMDUlc=
tracestate
78034@nr=0-1-2767451-695782612-9f0a906849979a5b----1639739403833
traceparent
00-94bf1fc4152f9e5f6a4964ba6c191450-9f0a906849979a5b-01
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
newrelic
eyJ2IjpbMCwxXSwiZCI6eyJ0eSI6IkJyb3dzZXIiLCJhYyI6IjI3Njc0NTEiLCJhcCI6IjY5NTc4MjYxMiIsImlkIjoiOWYwYTkwNjg0OTk3OWE1YiIsInRyIjoiOTRiZjFmYzQxNTJmOWU1ZjZhNDk2NGJhNmMxOTE0NTAiLCJ0aSI6MTYzOTczOTQwMzgzMywidGsiOiI3ODAzNCJ9fQ==
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
X-Requested-With
XMLHttpRequest

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 17 Dec 2021 10:39:14 GMT
vary
Accept-Encoding, User-Agent
x-xss-protection
1; mode=block
referrer-policy
no-referrer-when-downgrade
x-newrelic-app-data
PxQFVlBUDAYBR1dbAgYPVFAFBRFORDQHUjZKA1ZLVVFHDFYPbU5yARBfWA86TFtcXRQODFJfQzkGQ1NSCQ8NBW8MXRVLGhgCHVUJUQFRH1JKBgNUUVsUHgFIQ1AGUA8HUVMHBVVRUVEAWllAFF5VXkAAZA==
x-frame-options
SAMEORIGIN
date
Fri, 17 Dec 2021 11:10:03 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
b68be6b7-157e-4358-bb0f-d4b596ff4e12
content-type
application/json
via
1.1 varnish
cache-control
max-age=5400, private
accept-ranges
bytes
expires
Fri, 17 Dec 2021 12:09:14 GMT
track-cwv-72dfb3ae38-rev.js
www.zdnet.com/a/fly/js/components/
239 B
313 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/track-cwv-72dfb3ae38-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
9b7909cb9edd007095b41a13617b66208e4210fff9c5e411a7db116efefc8e71
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
199
x-xss-protection
1; mode=block
last-modified
Wed, 15 Dec 2021 17:45:18 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"a5d265f628012577e91fdf890dd49e32"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 22 Dec 2021 22:42:12 GMT
author-modal-d55d4e857c-rev.js
www.zdnet.com/a/fly/js/components/
573 B
445 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/author-modal-d55d4e857c-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
06c00948dd5d4c3109c9e00bb6c44938e1251feae65e2b7c2591f333ab230d9b
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
311
x-xss-protection
1; mode=block
last-modified
Thu, 09 Dec 2021 14:54:39 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"4da97158326b0293b09b6a931c98a1e3"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Mon, 20 Dec 2021 15:22:57 GMT
disqus-loader-17293b5282-rev.js
www.zdnet.com/a/fly/js/components/
1 KB
798 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/disqus-loader-17293b5282-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
0aee86f10613d80ea0542d89047ea3467747db993379daeb592178ebf943b534
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
684
x-xss-protection
1; mode=block
last-modified
Thu, 16 Dec 2021 16:41:54 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"0e5249bb6266844bc758597168d6931a"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 23 Dec 2021 17:11:52 GMT
front-door-carousel-dcdcc78ebc-rev.js
www.zdnet.com/a/fly/js/components/
5 KB
2 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/front-door-carousel-dcdcc78ebc-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
0f23aaa9d0fec5942a9907b88ad801ff3eff3abede69bf286d869061201c67fe
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
1651
x-xss-protection
1; mode=block
last-modified
Tue, 14 Dec 2021 16:02:01 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"aa0b07f3033f1a844f55155bbf0b9f8c"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 21 Dec 2021 18:20:58 GMT
zdnet+9824ea10-5e49-4e4e-9202-a97915bb5fa4.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
315 KB
316 KB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+9824ea10-5e49-4e4e-9202-a97915bb5fa4.png
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
6ea15d348d14879f357a86ee77c702c1f5c99db9bf8cd545b82b6e34f674b0a9

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
via
1.1 varnish, 1.1 varnish
age
51937
x-guploader-uploadid
ADPycdtAE2QrniskKvdpNzd5o6OYd5_SjZwfgiR9HbECJfK6TEjMi1uJhabaXViQdlbU44dp9JEDgo5Oz4Egx9OTzKfktyhK9Q
x-cache
HIT, HIT
x-goog-storage-class
REGIONAL
x-cache-hits
1, 1
content-length
322717
x-served-by
cache-chi21169-CHI, cache-fra19177-FRA
last-modified
Wed, 24 Feb 2021 17:44:06 GMT
server
UploadServer
x-timer
S1639739404.903169,VS0,VE1
etag
"00c554986f4ebaecd6b208182f2ab2c3"
x-goog-hash
crc32c=7ctnyQ==, md5=AMVUmG9OuuzWsggYLyqyww==
content-type
text/plain
cache-control
max-age=0, s-maxage=86400
accept-ranges
bytes
expires
Fri, 17 Dec 2021 20:25:52 GMT
zdnet+880e080a-7301-4a4b-a4e7-def615879cd5.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
1 MB
1 MB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+880e080a-7301-4a4b-a4e7-def615879cd5.png
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
a6d814cd452c142099d23b1952b1f8f30a2f6c26b5c544a6d4c941ad387087bf

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
via
1.1 varnish, 1.1 varnish
age
571
x-guploader-uploadid
ADPycductNKyjzM5snz0RAqtEWMvqJSDBpZKSaZaAWMIHoKcLZVRj8WogMiEQSmvRCWAbbotNYv_MfQnJj7Dmr03GtI_sP_cVA
x-cache
HIT, MISS
x-goog-storage-class
REGIONAL
x-cache-hits
1, 0
content-length
1333834
x-served-by
cache-chi21175-CHI, cache-fra19177-FRA
last-modified
Thu, 12 Aug 2021 15:40:10 GMT
server
UploadServer
x-timer
S1639739404.903464,VS0,VE454
etag
"55fe6fa99fded7919ef98197501793e3"
x-goog-hash
crc32c=IPIV8Q==, md5=Vf5vqZ/e15Ge+YGXUBeT4w==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:00:33 GMT
zdnet+65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
1 MB
1 MB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195.png
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
7a4c34b8b214e347836a070bad5395040344e037e289f77b11e9e49394ba0558

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
via
1.1 varnish, 1.1 varnish
age
117
x-guploader-uploadid
ADPycdsi4XT0OFfFGuCHjx7eZLtiBfonP2e2MBvaZ8izou62xowJhWrpuxH0vuGE11N7PSGv6zy9y1M-FNdonX2ZOSs
x-cache
HIT, MISS
x-goog-storage-class
REGIONAL
x-cache-hits
1, 0
content-length
1098648
x-served-by
cache-chi21126-CHI, cache-fra19177-FRA
last-modified
Mon, 06 Dec 2021 15:33:22 GMT
server
UploadServer
x-timer
S1639739404.903490,VS0,VE147
etag
"6c5e7bec419989b25bd78586518ca3d4"
x-goog-hash
crc32c=PmX9Ug==, md5=bF577EGZibJb14WGUYyj1A==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:08:06 GMT
zdnet+9ace91bb-15e2-4b5f-90dc-a721785f2af9.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
3 MB
3 MB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+9ace91bb-15e2-4b5f-90dc-a721785f2af9.png
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
ee4fc478db1bf8c0b0746a3a07cef506a0b51d5db65d5b0aab3a1dbe1610dedd

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
via
1.1 varnish, 1.1 varnish
age
389
x-guploader-uploadid
ADPycdsHufSY-Pg_5Vo-IVA_jiuZ25qFK0LYO2Plv9GkE-HFAvU6t4cUuKRBf4okCI_FaOlhCnmWtd8JgFUTVqL0k5s5yWlSpA
x-cache
HIT, HIT
x-goog-storage-class
REGIONAL
x-cache-hits
4, 1
content-length
3334969
x-served-by
cache-chi21146-CHI, cache-fra19177-FRA
last-modified
Tue, 21 Sep 2021 12:15:16 GMT
server
UploadServer
x-timer
S1639739404.903542,VS0,VE4
etag
"8cb626914b1b2008f701245e62b97271"
x-goog-hash
crc32c=AF6arw==, md5=jLYmkUsbIAj3ASReYrlycQ==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:03:34 GMT
zdnet+67d31788-4872-43ce-a4f9-31e95154f3fb.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
171 KB
171 KB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+67d31788-4872-43ce-a4f9-31e95154f3fb.png
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
29996f1588a8aa881f5ed1a207b098a9a8cfead8a41f785d528ca3417ea52fc3

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
via
1.1 varnish, 1.1 varnish
age
152
x-guploader-uploadid
ADPycdsKFjWqb0OqIxnDN3qTpnz6g9TG5gAFhYsjx6wv47jH2E1q1RXJjQioa4kAI6iuCGKmytmBGPC_-0QgeUNndVVQGtDzUQ
x-cache
HIT, MISS
x-goog-storage-class
REGIONAL
x-cache-hits
1, 0
content-length
174929
x-served-by
cache-chi21127-CHI, cache-fra19177-FRA
last-modified
Fri, 10 Dec 2021 14:03:19 GMT
server
UploadServer
x-timer
S1639739404.903589,VS0,VE108
etag
"c23bec11b723d1377e231e18cdfe53d3"
x-goog-hash
crc32c=qAvwoQ==, md5=wjvsEbcj0Td+Ix4Yzf5T0w==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:07:31 GMT
zdnet+40984316-75d4-4890-a717-84a4ec3a088a.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
1 MB
1 MB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+40984316-75d4-4890-a717-84a4ec3a088a.png
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
753c21d87b2659d7ba709cf0b4b8824aeabe2405359821565daca11041b484bb

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
via
1.1 varnish, 1.1 varnish
age
0
x-guploader-uploadid
ADPycdsXJ7BYrdsqi2NWTHxViMAVJiIkATQG27zdm0VTDTHVN-OVH00YNUYmWM0H-GNWS0s8fJDA6R5Tp8zhhuUL2zSPnCitXA
x-cache
MISS, MISS
x-goog-storage-class
REGIONAL
x-cache-hits
0, 0
content-length
1164965
x-served-by
cache-chi21183-CHI, cache-fra19177-FRA
last-modified
Mon, 06 Dec 2021 19:58:18 GMT
server
UploadServer
x-timer
S1639739404.903632,VS0,VE426
etag
"09b9e61e214d49899600a60821de1fd6"
x-goog-hash
crc32c=FMrjMQ==, md5=CbnmHiFNSYmWAKYIId4f1g==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:10:04 GMT
zdnet+480b69f4-89a3-4338-85c7-a898aef5bd51.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
957 KB
958 KB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+480b69f4-89a3-4338-85c7-a898aef5bd51.png
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
7a4107595add66138757d4890ca96318b0636ef631914bc992c3489e905479c9

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
via
1.1 varnish, 1.1 varnish
age
1540
x-guploader-uploadid
ADPycdsYjBIKXUMzvBuKKP9xC6iHM_0xmU311WtUO5-sp_7oP0mCTa27pu_EuZiiEMaePPhMNoLey5y9HpNQnud7Cgn-LSOrEg
x-cache
HIT, HIT
x-goog-storage-class
REGIONAL
x-cache-hits
1, 1
content-length
979820
x-served-by
cache-chi21176-CHI, cache-fra19177-FRA
last-modified
Sat, 04 Sep 2021 11:00:18 GMT
server
UploadServer
x-timer
S1639739404.942303,VS0,VE2
etag
"8246313e0558adfc79e2fb0953fa6691"
x-goog-hash
crc32c=EfNJ8g==, md5=gkYxPgVYrfx54vsJU/pmkQ==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 10:44:24 GMT
zdnet+4c59176c-e92f-43bb-b3d8-cc361201fcb0.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
793 KB
794 KB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+4c59176c-e92f-43bb-b3d8-cc361201fcb0.png
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
c54ead22625ab058445b4b9c02536227625f0de2e435fd143b1092e7f5c72a13

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
via
1.1 varnish, 1.1 varnish
age
814
x-guploader-uploadid
ADPycdskXUrkldSITDZklGmE21x-CsaRObLe-CfZwVceQ4vkOzVNHrfg9-ksague79o8RhHzPbqGrWCa0cRDYxGMxlDE0O5CiA
x-cache
HIT, HIT
x-goog-storage-class
REGIONAL
x-cache-hits
1, 1
content-length
811981
x-served-by
cache-chi21153-CHI, cache-fra19177-FRA
last-modified
Thu, 09 Dec 2021 14:53:15 GMT
server
UploadServer
x-timer
S1639739404.942419,VS0,VE2
etag
"4c7a4650a0587e94f5278441a1589d2a"
x-goog-hash
crc32c=IZxjqw==, md5=THpGUKBYfpT1J4RBoVidKg==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 10:56:29 GMT
zdnet+21454e45-531c-4224-902a-fd96a695fa5a.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
2 MB
2 MB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+21454e45-531c-4224-902a-fd96a695fa5a.png
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
baac2823513825af0f6a94984c6f77811a95c0728f7d240a201b55ef78985c41

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
via
1.1 varnish, 1.1 varnish
age
688
x-guploader-uploadid
ADPycdtqFafPYqaG3o7tiICvBpPFHgQTBGPC-MUqS4H9UpFeCQQsSp1D3oq_hb9otNuqoMFt9NxOCv4yv9XHJ6RLJq3efyD7Hw
x-cache
HIT, HIT
x-goog-storage-class
REGIONAL
x-cache-hits
2, 1
content-length
1869081
x-served-by
cache-chi21158-CHI, cache-fra19177-FRA
last-modified
Thu, 09 Dec 2021 15:58:14 GMT
server
UploadServer
x-timer
S1639739404.942585,VS0,VE3
etag
"ad6148f3c408948c3d9c305fb974c8c2"
x-goog-hash
crc32c=RFtBeQ==, md5=rWFI88QIlIw9nDBfuXTIwg==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 10:58:35 GMT
/
www.zdnet.com/newsletter/xhr/widget-login/
2 KB
1 KB
XHR
General
Full URL
https://www.zdnet.com/newsletter/xhr/widget-login/?topic=security
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
5fe4165306cb4ed4d5ed0527bb6d2e9c42e5b6fc79c528a1c2f8cf36c89b0a58
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

X-NewRelic-ID
VgEBVlJWCRAGXVRVDwMDUlc=
tracestate
78034@nr=0-1-2767451-695782612-1ed1f851e585b780----1639739403844
traceparent
00-b2a8715aab7b5e115e7f1eabe62e38d0-1ed1f851e585b780-01
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
newrelic
eyJ2IjpbMCwxXSwiZCI6eyJ0eSI6IkJyb3dzZXIiLCJhYyI6IjI3Njc0NTEiLCJhcCI6IjY5NTc4MjYxMiIsImlkIjoiMWVkMWY4NTFlNTg1Yjc4MCIsInRyIjoiYjJhODcxNWFhYjdiNWUxMTVlN2YxZWFiZTYyZTM4ZDAiLCJ0aSI6MTYzOTczOTQwMzg0NCwidGsiOiI3ODAzNCJ9fQ==
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
X-Requested-With
XMLHttpRequest

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
vary
Accept-Encoding, User-Agent
x-xss-protection
1; mode=block
referrer-policy
no-referrer-when-downgrade
x-newrelic-app-data
PxQFVlBUDAYBR1dbAgYPVFAFBRFORDQHUjZKA1ZLVVFHDFYPbU5yARBfWA86TFZWRxcNB0NFUhQ7Rl9XBQMXPUMKVxVnVFtVWgsbTQFPA1JUBgdNVk0IBwVQU04aABtEXQNSC1NTAFpTVA1WWwlVURFJXwBdElY/
x-frame-options
SAMEORIGIN
date
Fri, 17 Dec 2021 11:10:04 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
24471282-d33b-4e2d-8cc7-7f4e1e4b3887
content-type
application/json
via
1.1 varnish
cache-control
max-age=0, must-revalidate, private
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:10:03 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 6CF1
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv95YpK2y8-Q0vp0BWX69EQ-xYpm5eop6FQZocKHPsyWaI5LLtfBm2fcqOgbO5OhzYsD2ryG2VEnuXUtRuBCVRWRN-PR65W-3Yj96hA1tMXkG89U6ugpTeRCsyo0pnk-k9sJCfrONt72oWNwSlK7RCEHn_Ahc_tUjvMCmE9xaKqmiOJ0vQATc_CkKNKTP21gnh7fRBIF04iT39G2NmE4cASJMFnvk1dJTWAMY6Rur3MIAs2tpSlAqjeLUGKCaptP2D-tL-cs1b6YwjuBVc8AQr1VX3UlRLnEtq-B-LhRCPR1OynSl5dkIPkQMZmIMLVYXE8Azl41sdMx7_jRjG5tEfB&sai=AMfl-YRSEmO0YHj8g6GE75m_54r7tw6Ih9wJygaLrojQs1oK0Th9_pOlGifX3JfiTjKLKg0_bhlddLHfUFihLlwxAXJEtJfCTqyw4tMQqYwBGkCwC1joC4ziVazvkrvumdQ&sig=Cg0ArKJSzEtY-SNkGS7qEAE&uach_m=[UACH]&urlfix=1&adurl=
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
ad.js
clipcentric-a.akamaihd.net/ad/B=608/F=1317278/C=603283/P=22/L=21/V=23/ST=1638969311/S=SzkmXuC3/ Frame 6CF1
162 KB
44 KB
Script
General
Full URL
https://clipcentric-a.akamaihd.net/ad/B=608/F=1317278/C=603283/P=22/L=21/V=23/ST=1638969311/S=SzkmXuC3/ad.js
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.33 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-33.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
a65474aec3d05036fdc95a4459d85f1543f464934698df8e4a9d1bca61a0500c
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
br
last-modified
Thu Jan 1 00:00:00 1970
server
Apache/2.2.34
x-frame-options
SAMEORIGIN
content-type
text/javascript
cache-control
max-age=3600
content-length
44769
skeleton.js
pixel.adsafeprotected.com/rjss/st/903347/59128494/ Frame 6CF1
46 KB
13 KB
Script
General
Full URL
https://pixel.adsafeprotected.com/rjss/st/903347/59128494/skeleton.js?ias_dspID=64
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.80.242.238 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-99-80-242-238.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
36d881735ea38b01d1ced79cd93dba9b68aba19146aeaf8dadff4d68d69a04f2

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
x-server-name
app11.ie.303net.net
content-type
application/javascript;charset=utf-8
access-control-allow-origin
pixel.adsafeprotected.com
cache-control
no-cache
access-control-allow-credentials
true
server
nginx
expires
Wed, 31 Dec 1969 23:59:59 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 6CF1
119 KB
36 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37305
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1638461285297402"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:10:03 GMT
moatad.js
z.moatads.com/redventuresgamdisplay60805146916/ Frame 6CF1
335 KB
112 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamdisplay60805146916/moatad.js
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ec3300dff5a35315ea608c5dc57e965957897133eb6a543533566d6e2c35ed07

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
last-modified
Thu, 09 Dec 2021 16:36:30 GMT
server
AmazonS3
x-amz-request-id
SXBZ8ADYT77KW7MP
etag
"9c75e5b0c5bc0a53e0cdef53eae89c77"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=15082
accept-ranges
bytes
content-length
114446
x-amz-id-2
Js3u1th+lEwEMVGKInxoBehDmEsPJoYn2GSrvSApeaA9h/kdmOzjLJkUhJKG3pI/I9LMlptFND8=
B26977839.323096029;dc_pre=CJ2zyaXZ6vQCFcqF_QcdONoGBg;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=435792243;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=
ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/ Frame 6CF1
Redirect Chain
  • https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=435792243;dc_lat=;dc_rdid=;tag_for_child_directed_treatmen...
  • https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_pre=CJ2zyaXZ6vQCFcqF_QcdONoGBg;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=435792243;dc_lat=;dc_rdi...
42 B
63 B
Image
General
Full URL
https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_pre=CJ2zyaXZ6vQCFcqF_QcdONoGBg;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=435792243;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=?
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Server
142.250.184.230 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f6.1e100.net
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:03 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
content-type
text/html; charset=UTF-8
location
https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_pre=CJ2zyaXZ6vQCFcqF_QcdONoGBg;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=435792243;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=?
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
follow-only-when-prerender-shown
1
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
sodar2.js
tpc.googlesyndication.com/sodar/
17 KB
7 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
61c32059a5e94075a7ecff678b33907966fc9cfa384daa01aa057f872da14dbb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
etag
"1637097310169751"
vary
Accept-Encoding
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
6386
x-xss-protection
0
expires
Fri, 17 Dec 2021 11:10:03 GMT
NRBR-a22c617a7b2aab2da1c
bam-cell.nr-data.net/1/
49 B
720 B
Script
General
Full URL
https://bam-cell.nr-data.net/1/NRBR-a22c617a7b2aab2da1c?a=695782443&v=1212.e95d35c&to=NgYBNkBYWEEEAURQWg9MIgFGUFlcSgNCTVwCDwY9QVBYVQkH&rst=2665&ck=1&ref=https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/&ap=427&be=1049&fe=2550&dc=1112&af=err,xhr,stn,ins,spa&perf=%7B%22timing%22:%7B%22of%22:1639739401262,%22n%22:0,%22f%22:333,%22dn%22:334,%22dne%22:343,%22c%22:343,%22s%22:349,%22ce%22:361,%22rq%22:361,%22rp%22:1029,%22rpe%22:1044,%22dl%22:1032,%22di%22:1112,%22ds%22:1112,%22de%22:1112,%22dc%22:2550,%22l%22:2550,%22le%22:2560%7D,%22navigation%22:%7B%7D%7D&fp=1120&fcp=1120&at=GkEWQAhCSx5HAxIDThwe&jsonp=NREUM.setToken
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.147 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dac715f087720dd7ff7067f5d2ec1988851fa93140ae8a9cbfaa15659dd7fd82

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:10:04 GMT
Content-Encoding
gzip
CF-Cache-Status
DYNAMIC
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, HEAD, OPTIONS
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Transfer-Encoding
chunked
Cross-Origin-Resource-Policy
cross-origin
Connection
keep-alive
access-control-allow-credentials
true
CF-Ray
6befb3eb4d225364-FRA
core-web-vitals-16efe3ae21-rev.js
www.zdnet.com/a/fly/js/managers/
545 B
523 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/managers/core-web-vitals-16efe3ae21-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
82f947d14a0a198dfe3cec2fde7896f6e332eb798cc193dad8da9ed2225277cd
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
366
x-xss-protection
1; mode=block
last-modified
Tue, 14 Dec 2021 16:02:01 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"456e04f37a1b5aa7af3e4f05d7a26227"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 21 Dec 2021 18:20:57 GMT
show-hide-1.0-2b8cfc35ab-rev.js
www.zdnet.com/a/fly/js/components/
2 KB
903 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/show-hide-1.0-2b8cfc35ab-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
1a703d617fb31d56238372d5bf78e9861b3a09b7447a0184bd5f1c178461ed12
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
710
x-xss-protection
1; mode=block
last-modified
Thu, 09 Dec 2021 14:54:39 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"dd7ef257baebb2315958ebdd4603472f"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Mon, 20 Dec 2021 15:22:57 GMT
integrator.js
adservice.google.de/adsid/
107 B
122 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
cache-control
private, no-cache, no-store
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3="googleads.g.doubleclick.net:443"; ma=2592000,h3=":443"; ma=2592000,h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
100
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
107 B
122 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
cache-control
private, no-cache, no-store
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
100
x-xss-protection
0
ads
securepubads.g.doubleclick.net/gampad/
20 KB
9 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3797515782955650&correlator=2303628068110826&output=ldjh&impl=fifs&eid=31061814%2C31063378%2C31063915%2C44756716%2C31063247&vrg=2021120601&ptt=17&sc=1&sfv=1-0-38&ecs=20211217&iu_parts=22309610186%2Caw-zdnet%2Ctechnology%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3&prev_iu_szs=300x250&prev_scp=pos%3Dbottom%26sl%3Dmpu-bottom%253FLL%257CT-1000%26iid%3Dunit%253Dmpu-bottom%257Cvguid%253Dd5ebeff1-aaff-4a87-ba0f-c0c9612e3738%257Cpv%253D1&eri=1&cust_params=buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dslack%252Cibm%26tag%3Dcyber-security%252Ctarget%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dsuspected-iranian-hackers-target-airline-with-new-backdoor%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%252Csocial_user%26type%3Dgpt%26region%3Daw%26subses%3D3%26session%3Da%26pv%3D1%26vguid%3Dd5ebeff1-aaff-4a87-ba0f-c0c9612e3738%26m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dgb_spam_edu%252Cgs_tech%252Cgs_science_misc%252Cmoat_safe%252Cgb_measurable%252Cgs_entertain%252Cgb_measurable_2%252Cgs_tech_computing%252Cgs_science%26m_mv%3DnoHistData%26m_gv%3DnoHistData&cookie=ID%3D19ae66ce97a7bb2a-223ff0190acd0011%3AT%3D1639739403%3AS%3DALNI_MaMttvcF36eiYMq714OxxtI3shOeA&bc=31&abxe=1&lmt=1639739402&dt=1639739403953&dlt=1639739402294&idt=1100&frm=20&biw=1600&bih=1200&oid=2&adxs=1050&adys=1460&adks=606318677&ucis=5&ifi=5&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&ref=https%3A%2F%2Ft.co%2FBi3lGmiArD&vis=1&dmc=8&scr_x=0&scr_y=0&psz=370x250&msz=370x30&psts=AGkb-H_L1wfqmiKTedXoJhZJjALlXdlDtzrwrQHti9dFlQxOCFH9gLVTWu2CdSlw7EGleeMzVm1GDJhqsepIMQg6sUpa7I_JLNEVHMY%2CAGkb-H_3r2JRrYqMjsYzyicjp7Ukfs4fCdiXlyFsl6JkNVELA9tQQD9dyCEAmzjelJyOSsmI8-146ep3cbD7ut5Hcl80WtvdQb3cPt11bg&ga_vid=300051814.1639739403&ga_sid=1639739403&ga_hid=1651433687&ga_fc=false&fws=4&ohw=370&btvi=3&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
39e93347c2d007b4807350ce30a12c4e83c0fa6a1411b1988bc9521877fa9c5f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9124
x-xss-protection
0
google-lineitem-id
5688542871
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138349983439
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/safeframe/1-0-38/html/ Frame 3150
6 KB
3 KB
Document
General
Full URL
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a73730123a43c3040d889aaee11ec35094277ce5f778076b262c23a293870adb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
timing-allow-origin
*
content-length
3108
date
Fri, 17 Dec 2021 11:10:03 GMT
expires
Sat, 17 Dec 2022 11:10:03 GMT
last-modified
Tue, 02 Mar 2021 20:17:03 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
1
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_HEADER1&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=technology&zMoatAdUnit3=security&wf=1&ra=3&pxm=&sgs=3&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=https%3A%2F%2Ft.co&t=1639739403574&de=341503257798&rx=102643891211&m=0&ar=8ab009d7785-clean&iw=04a0275&q=7&cb=0&cu=1639739403574&ll=2&lm=0&ln=0&em=0&en=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&zMoatAType=content_article&zMoatTest=zdnet&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&bo=aw-zdnet&bd=security&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&zMoatpos=middle&zMoatvguid=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatptype=article&zMoatsl=mpu-middle%3FLL%7CT-1000&pe=1%3A1121%3A1121%3A2560%3A1112&jk=-1&jm=-1&fs=195979&na=199688454&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:03 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:03 GMT
truncated
/ Frame 6CF1
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7b05c7a6673936b716ff2ee68106111986eeb0581e0f2cad7df415dfa1f57b88

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 3241
750 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e9cac3eeba1fc86e06fdc013a4c52742e9b4bd14b7be6517321127d4515095ce

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
E=in,im,fi
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=33/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame 6CF1
35 B
160 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=33/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=in,im,fi
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
tavAo53F
clipcentric-a.akamaihd.net/file/1317301/ad_q60/1638969188/ Frame 6CF1
9 KB
9 KB
Image
General
Full URL
https://clipcentric-a.akamaihd.net/file/1317301/ad_q60/1638969188/tavAo53F?f=auto
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.33 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-33.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
80564ff963220266c89e284ae65634312da063d0ea5ee747527fd38e8c398d96
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Wed, 08 Dec 2021 13:14:16 GMT
server
Apache/2.2.34
x-frame-options
SAMEORIGIN
content-type
image/avif
access-control-allow-origin
*
cache-control
private, max-age=31536000
content-length
9282
h1xcxKOE
clipcentric-a.akamaihd.net/file/1317303/ad_q60/1638969190/ Frame 6CF1
8 KB
8 KB
Image
General
Full URL
https://clipcentric-a.akamaihd.net/file/1317303/ad_q60/1638969190/h1xcxKOE?f=auto
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.33 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-33.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
43fdf898c76171d1b5af752978ebeb6ed248bc677d0b1dfb204b7ae95658cd99
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Wed, 08 Dec 2021 13:14:14 GMT
server
Apache/2.2.34
x-frame-options
SAMEORIGIN
content-type
image/avif
access-control-allow-origin
*
cache-control
private, max-age=31536000
content-length
7924
E=ls:Clipcentric%20Site%20Fixes.0,li
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=36/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=36/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:Clipcentric%20Site%20Fixes.0,li
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
truncated
/ Frame 8D97
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/gif
E=ls:video%20auto.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=43/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=43/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:video%20auto.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=ls:Super%20Billboard.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=45/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=45/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:Super%20Billboard.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=ls:hotspots%20collapsed.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=54/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=54/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:hotspots%20collapsed.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=ls:on%20scroll%20full%20collapse.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=54/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=54/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:on%20scroll%20full%20collapse.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=ls:custom%20ad%20controls.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=55/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=55/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:custom%20ad%20controls.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
ad.html
clipcentric-a.akamaihd.net/user-9/resources/ Frame FFC0
93 B
290 B
Document
General
Full URL
https://clipcentric-a.akamaihd.net/user-9/resources/ad.html
Requested by
Host: clipcentric-a.akamaihd.net
URL: https://clipcentric-a.akamaihd.net/ad/B=608/F=1317278/C=603283/P=22/L=21/V=23/ST=1638969311/S=SzkmXuC3/ad.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.33 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-33.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
e571945dec453fbc4c8177ad3af3f176dc562cf51fe40a10529b69e0b2b1e577

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter

Response headers

expires
Thu, 13 Jan 2022 13:55:46 GMT
last-modified
Tue, 04 May 2021 03:22:49 GMT
etag
"5d-5c17897b4d440"
cache-control
max-age=2592000
server
Apache/2.2.34
content-type
text/html; charset=UTF-8
accept-ranges
bytes
content-encoding
gzip
content-length
86
date
Fri, 17 Dec 2021 11:10:04 GMT
vary
Accept-Encoding
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_DISPLAY1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=https%3A%2F%2Ft.co&t=1639739404013&de=110680706678&m=0&ar=cc97a930ec1-clean&iw=101177c&q=11&cb=0&ym=0&cu=1639739404013&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&zMoatW=5&zMoatH=5&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&gw=redventuresgamdisplay60805146916&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1121%3A1121%3A2560%3A1112&iq=na&tt=na&tu=&tp=&jk=-1&jm=-1&fs=195926&na=250112198&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame BF7F
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstasoNMSL498CZihV5JtapLTxq6RdbuLdB9Gq_GuyDWRtmYiU7B_VPNBY5vx1elYlnPipA0omcVP85I_dI2SdVTmkd07ktlvXGgxGwoK9zKssRLsShGOFIRkcaKXE6jdVWW-7vZ-P0XDyBx_6fg1LNBBQjgEO6H12ED7giCPC7cjsznmx37AsNc4Wy0vyWaw7b9iTPG3HyQbT-5_ZkT_UpBtzph0T-4NuCVaSbU1koD8Z7DIqyAMXpY5cavTPuUmCmbNwCkv9xUp4aai0ajAtUp5rnrYT7GZ-8DQIHSzisi9CVjDcdQznqmGtdsGX-UqOjEXPhr6DB5A8o&sig=Cg0ArKJSzBDFUYAR18-GEAE&uach_m=[UACH]&urlfix=1&adurl=
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:04 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
gpt.js
securepubads.g.doubleclick.net/tag/js/ Frame BF7F
78 KB
26 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
sffe /
Resource Hash
1907478e8fa62801a1db26be87cab0755288131c9c8e80320582e560825df3cc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1073 / 69 of 1000 / last-modified: 1639397097"
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
26912
x-xss-protection
0
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Fri, 17 Dec 2021 11:10:04 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame BF7F
119 KB
36 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37305
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1638461285297402"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:10:04 GMT
moatad.js
z.moatads.com/redventuresgamdisplay60805146916/ Frame BF7F
335 KB
112 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamdisplay60805146916/moatad.js
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ec3300dff5a35315ea608c5dc57e965957897133eb6a543533566d6e2c35ed07

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
last-modified
Thu, 09 Dec 2021 16:36:30 GMT
server
AmazonS3
x-amz-request-id
SXBZ8ADYT77KW7MP
etag
"9c75e5b0c5bc0a53e0cdef53eae89c77"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=15081
accept-ranges
bytes
content-length
114446
x-amz-id-2
Js3u1th+lEwEMVGKInxoBehDmEsPJoYn2GSrvSApeaA9h/kdmOzjLJkUhJKG3pI/I9LMlptFND8=
zdnet+9824ea10-5e49-4e4e-9202-a97915bb5fa4.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
315 KB
316 KB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+9824ea10-5e49-4e4e-9202-a97915bb5fa4.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/a/fly/046431-fly/js/main.default.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
6ea15d348d14879f357a86ee77c702c1f5c99db9bf8cd545b82b6e34f674b0a9

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
via
1.1 varnish, 1.1 varnish
age
51937
x-guploader-uploadid
ADPycdtAE2QrniskKvdpNzd5o6OYd5_SjZwfgiR9HbECJfK6TEjMi1uJhabaXViQdlbU44dp9JEDgo5Oz4Egx9OTzKfktyhK9Q
x-cache
HIT, HIT
x-goog-storage-class
REGIONAL
x-cache-hits
1, 2
content-length
322717
x-served-by
cache-chi21169-CHI, cache-fra19177-FRA
last-modified
Wed, 24 Feb 2021 17:44:06 GMT
server
UploadServer
x-timer
S1639739404.130314,VS0,VE0
etag
"00c554986f4ebaecd6b208182f2ab2c3"
x-goog-hash
crc32c=7ctnyQ==, md5=AMVUmG9OuuzWsggYLyqyww==
content-type
text/plain
cache-control
max-age=0, s-maxage=86400
accept-ranges
bytes
expires
Fri, 17 Dec 2021 20:25:52 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame A81A
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvGemPXTtMvHj59X-SkqTHT2n4SCVYGGsZpVkrExxt1aS6yS-4XaPynko-idRy7n9Kdy-uCr_r6jfpCiOeoJcCnbnkuGbn_d2ACZAkid7Z8coY6CLTlDL9rNMOsZd3Pnw5QGU_dSxSNpW6ua87dFFGuZTSNqnQSmc8gMFHlP_CwBrylzndSn0zQKXu4PFUMNXAwTPOfRUxTkOvc52llZC73MgE3e7bpdajMoytH8DxbYYAJVQRCV6VokcuauUNspey1XyRuWTZjk16SADZZqVru-rWPUMnJQjWhnJTvy9gXwZhNffyZukAe12ygh8K2H7npgud6B0wRYW0l8RU3&sai=AMfl-YRvWH7969faJnl3Y_UrqXrTI0xC2YxbsYgNgAg8LmKQAD2DF3xWJaVe_487Mp59TSMj6tH1hVrfWUlIhW_747A31bLKNPFWvpx15oxBdpDWzFdJ_kvN1XCqeRnkkb8A&sig=Cg0ArKJSzIVUc5VKa0k1EAE&uach_m=[UACH]&urlfix=1&adurl=
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:04 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
dcmads.js
www.googletagservices.com/dcm/ Frame A81A
9 KB
4 KB
Script
General
Full URL
https://www.googletagservices.com/dcm/dcmads.js
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c45a7b49c14477cd160a83d4ee1fb8c311e12314e042d0647c68bec62f16fe29
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:17:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
3169
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/ads-dcm-tag
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4486
x-xss-protection
0
last-modified
Mon, 29 Nov 2021 19:29:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="ads-dcm-tag"
vary
Accept-Encoding
report-to
{"group":"ads-dcm-tag","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-dcm-tag"}]}
content-type
text/javascript
cache-control
public, max-age=3600
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:17:15 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame A81A
119 KB
36 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37305
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1638461285297402"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:10:04 GMT
moatad.js
z.moatads.com/redventuresgamdisplay60805146916/ Frame A81A
335 KB
112 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamdisplay60805146916/moatad.js
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ec3300dff5a35315ea608c5dc57e965957897133eb6a543533566d6e2c35ed07

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
last-modified
Thu, 09 Dec 2021 16:36:30 GMT
server
AmazonS3
x-amz-request-id
SXBZ8ADYT77KW7MP
etag
"9c75e5b0c5bc0a53e0cdef53eae89c77"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=15081
accept-ranges
bytes
content-length
114446
x-amz-id-2
Js3u1th+lEwEMVGKInxoBehDmEsPJoYn2GSrvSApeaA9h/kdmOzjLJkUhJKG3pI/I9LMlptFND8=
runner.html
tpc.googlesyndication.com/sodar/sodar2/225/ Frame 1CC1
13 KB
5 KB
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
55a119c0394f901a8a297e109c17b5e5402689708b999ab10691c16179f32a4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-length
5046
date
Fri, 17 Dec 2021 10:54:44 GMT
expires
Sat, 17 Dec 2022 10:54:44 GMT
last-modified
Mon, 21 Jun 2021 20:47:05 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
920
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
aframe
www.google.com/recaptcha/api2/ Frame BAF3
783 B
1003 B
Document
General
Full URL
https://www.google.com/recaptcha/api2/aframe
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82f::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
64f2df6631db5cbf8c3b57a9b3d9ea1bf654c5317ffca3a5c1702a5752b3731c
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-j+85sE4s7S2XyzD3wj/zyw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter

Response headers

cross-origin-resource-policy
cross-origin
cross-origin-embedder-policy
require-corp
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
expires
Fri, 17 Dec 2021 11:10:04 GMT
date
Fri, 17 Dec 2021 11:10:04 GMT
cache-control
private, max-age=300
content-type
text/html; charset=utf-8
content-security-policy
script-src 'report-sample' 'nonce-j+85sE4s7S2XyzD3wj/zyw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
514
server
GSE
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
truncated
/ Frame 8D97
299 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
95698b6af45a720fa13415398e77c20504c6ae8bf75e3a462e5aa1f67bc42b11

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
video.high.mp4
clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/ Frame 6CF1
1 MB
1 MB
Media
General
Full URL
https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.33 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-33.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
2ea6cb8d44b18ddc26d8d83cbb898b780beeebe9d7529fceb1ac1824a397cff4
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Encoding
identity;q=1, *;q=0
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Range
bytes=0-

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Wed, 08 Dec 2021 12:33:46 GMT
server
Apache/2.2.34
access-control-allow-origin
*
x-frame-options
SAMEORIGIN
content-type
video/mp4
Content-Range
bytes 0-1199289/1199290
cache-control
max-age=2592000
Content-Length
1199290
view
securepubads.g.doubleclick.net/pcs/ Frame 6CF1
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstzCHq4PRpquvD_tNCshUtPeYDRrIrEUNGruX50q4_3qpahMXqmS7pr-UWUqmPBksyLG3VDdmfB_csEidst0vE7HK2ZQX8KevxEhzndJpXWVVOpLAtNmfRTanYZU6x1dqIqgiOSJ36c6zQSZFZkLtmAErxD2UQn6lTRviQf3pnXQhCXPdh4ph02RboPQKnl8krFkkJwirIdtO83Kx7_gYKUaVQB-8Jk54OhxwBEYwLLXfti3xGlOa5nDw0mQMWGiOkcHQdyYfV9sSjYXnRDElSrWpFMZjog4L4WcFQ7KUvdHHNLpuVGViv62RZSz-xjPnnMdXPEz-3DhEYPdPvBKTgU_DU&sai=AMfl-YQFLg8cX1Y6x-hpNHgc_WQzNiHqL9b0e9ho0Nhb9Ks6RGziWaxdWZ-g1uzm0x8U_AVjRmYJXByE7hFuy3bYabi99XOzj_bMHd3DKgav3QCVMdgozjp4gYFKs_P2HdM&sig=Cg0ArKJSzJTfVybcnZwjEAE&uach_m=[UACH]&urlfix=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:04 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Fri, 17 Dec 2021 11:10:04 GMT
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=165/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vimpressi... Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=165/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vimpression:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=vi
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=165/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=165/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vi
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
truncated
/ Frame 8D97
500 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7b4f05cfd0cd8e216e445b5aec5e9f06573c18cb7adbc0cd785f3a4af3df7cf2

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/ Frame 8D97
807 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ccd7a7e0ecd791d87287f7ebb4f4c3e6fcb0ca72996ee874fc2755b15fb187ef

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
store.phtml
ad.clipcentric.com/user-9/resources/ Frame 30BF
3 KB
3 KB
Document
General
Full URL
https://ad.clipcentric.com/user-9/resources/store.phtml?v200530
Requested by
Host: clipcentric-a.akamaihd.net
URL: https://clipcentric-a.akamaihd.net/ad/B=608/F=1317278/C=603283/P=22/L=21/V=23/ST=1638969311/S=SzkmXuC3/ad.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.32.121.58 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-32-121-58.fra60.r.cloudfront.net
Software
Apache/2.2.34 /
Resource Hash
81bcd7a6372e5ca7f7d12382fe1787bd4635eede42b3a79da6937c6d2354ed8b

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter

Response headers

content-type
text/html; charset=UTF-8
content-length
2965
date
Mon, 26 Jul 2021 00:31:36 GMT
server
Apache/2.2.34
access-control-allow-origin
*
cache-control
max-age=31536000
x-cache
Hit from cloudfront
via
1.1 1877c1d3c1c0435e896415d580d52c53.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA60-P1
x-amz-cf-id
dsvSnFQLQBtJDUBVUqyCkY_vygOzqBLFpyR0F42P00mt3md9w_RUIQ==
age
12479908
main.gr.19.8.273.js
static.adsafeprotected.com/ Frame 6CF1
187 KB
60 KB
Script
General
Full URL
https://static.adsafeprotected.com/main.gr.19.8.273.js
Requested by
Host: pixel.adsafeprotected.com
URL: https://pixel.adsafeprotected.com/rjss/st/903347/59128494/skeleton.js?ias_dspID=64
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:223f:200:8:48e:53c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
00b3b0b438a1a3e7f01112f487ffb01e64db47935eb0e1e2927bdb4811ee935f

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 10 Dec 2021 17:46:22 GMT
content-encoding
gzip
age
581023
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
x-amz-replication-status
COMPLETED
last-modified
Fri, 10 Dec 2021 17:31:00 GMT
server
AmazonS3
etag
W/"dbbed9b42f871ade260381ef78b0cd71"
vary
Accept-Encoding
x-amz-version-id
RbTKyuj_rScIKJ79M7NB4z2hCQfzt2bN
via
1.1 fb49d852ca52c03c834ce98098b51517.cloudfront.net (CloudFront)
cache-control
max-age=315360000
x-amz-cf-pop
FRA56-P5
content-type
application/javascript
x-amz-cf-id
3ZXPSl4Y-3BaKo45QsFoz1kqWBTs3113K9hZgPmcDx5ztYFccqRqSA==
pixel
googleads.g.doubleclick.net/xbbe/ Frame B72F
624 B
838 B
Document
General
Full URL
https://googleads.g.doubleclick.net/xbbe/pixel?d=CPv1SRDa1sb8AhjB0aC6ATAB&v=APEucNUi_OX0z4afvOV-4GTOhVmiXXZDy8MvxreoaOMnlll3rISnvyodrKP-uCbikqjrz2Vl9oO5Vl6gqVJs1N5H4emDSuEzmv_SPaEqFeMv3utO2Zi7vMNqQdJ-gY99nBj9J_DkYIDUKpK4SzVyOiTn7r7j1Bf1Dg
Requested by
Host: 58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
URL: https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
9ff367082be1d94abc86ad1e75ff921cc5d53846e860267372fade66305f9120
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/

Response headers

p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
gzip
date
Fri, 17 Dec 2021 11:10:04 GMT
server
cafe
cache-control
private
content-length
276
x-xss-protection
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
expires
Fri, 17 Dec 2021 11:10:04 GMT
ad
googleads.g.doubleclick.net/dbm/ Frame 3150
11 KB
9 KB
Script
General
Full URL
https://googleads.g.doubleclick.net/dbm/ad?dbm_c=AKAmf-BNAWRACdViAMgKRJsYbvoRZZ2lhhRBTeRm4hNOu9TLerM05eSAKU5jLYW-STHNhzgAHCD74jmnP_OVwTfwcEI4oFvm_g2cN4YwfLcFaT9DBZ4v5mWS9KXD07Op86amCtyC7hXNoTta7QUI5nK1zGjzn0P3fA&cry=1&dbm_d=AKAmf-BhmrfivU0yfRChWrYPhXiKymPtsihEVU6x2thYkwPODISMoSnR2oe2ElGmNUgsObO_v5KT8n7HWOkShKKP-svTPQM5qqXBPMF1XzjP2zrGCsKp4eUENZxuBP_GZ2mweIB86kAo6jMLe4VfleZGXKmJ1QXIPeUyKCYC9q7eCjbhAgPSdyLp_3ox35VZGNAC1TeTRFfgxN6vfBCPjW27K9bH4-2a6KIY72S1x92Tm-lfDmT6610zVMIG7Mc7NFn9eo7fjcZSoFAHcsqWidpUAcMW9DZpcTPAG_iOvdbMCIna-9zxg1bW1VCAglRUMBjF-4TZ-2wAWjkoRDiS3-bLQn6hYtpjRRYJqyu7xhvt7xxb0kjI4EQ6CnZ72lc_0jQ-BDytBBtIKLO6Q8_bL-Eux-gz0fIIeYL2IwL2l2XKaG5ormkGBisu9Hwo3pV6BbFf2bjo6iLPV8gPJhisrDQe_IN9YzGCIehkmb0knkTGXJiFvsiAUMphpVGfdouZkVmkAWxLICPS-0HuiYZw6Wh6CbVs30DnYknqEq-zn1uwuUpBWNLBujpMrl8zfOOMAyW-1C7bjfnsmKDMUBTUr5AIyyDgZexFcJQi0W2Vm2y7cl6JOuAOOE6h2VfwwqHAYaFf4EsByp2t7OtnEGNKzXo-QJXkShbKPtad3jyX2OShqY55u5hQjQ1llYl-DKlmQPOWJ6arN_ihDAKnFx3Zc3Of0BCCVEB8dyPMIOmSTVtL4ToJi1q-5WAdBs73JIZ6kzI52eueblmCGvsAcdl0DNXcrbmpfM7cAtqnJ2k3N1T3ZwROmSl2-s0jbE5WLQvF6Cmhpl9WbbBShheGDyEeoKdeqfkZZ4J3j530PvZXIgJfgWGrHZ0cVDFRq2kOWsC2eqV3b494fWwV_2gF20kglVIhmTxIxeRoetY32PDVd6BVS5pU_7AK9gHL3ch8V8brG-BVYhsWnbcA_2-5tjfNejlt1xf8z8IJV1_Fi_4UAg5Zr3E-8277gKK7oiW1vijAgtJ_XbkqLfyPkl09ATzJyhjqwbghFaSqhMLlrup9cv9G7CpnVmjpBu19CMVNfHs__gTZRZ7t0p6tfJHfgrwHkQxI5N_yh4jSsVrNrSQ5XQnqpa9HaDzFyV71zxVoKFoxnk8NbcvR3w2d13ky-lDX_Ss_ealoiK5A2Sqc-SbUHItjeviNtKcRnpjGCUlnJDelB6_lzAJvf9w_zubYwoKomg2_jFsueXKq17kWhZlAywNgI9n4isErS1joHDq7Mti1xpBY6MjAYEpYHARJ4NtQTwTLYgHO1wiYoJtYC5XpbmnUoy5G2XF44t2FdS1UF223ZPz71XyaxARqUT6iH7hB2Plr7Ff24PbCtjBiqDRCvoxIudMacWsmZ1_IguBQevR3uz5hw7jDo29vnya-BV7nY-jtk6frLY9iz5qdNAtVpWBRsbQJ659hqASfKq2Sd0M3OG712NpkZY61Owb3L1LGPPeWnMAjyc7zibtmJj9bChGkp3gfZzeMIUpRfj8KsB8cCf5talr2IQjZK3ayV_1_7QkEefVH365BDh_yLG4ttndYiSaKzgbLD4IlDcrRM9-llcqhjSrq2gS7guboNgK8sSPOduuV2_9qPyjmo2w10i2il58TZ6j6bXA6banVRTf7zkprMsfnypz2LbZyQNtdCoRdGFOxVdS-VJo6S00AQOJyFYsSgtkEMiz_lvztsh_Dbm2-4YST1sASfbteG5GzeVBFwcXev6SPITjp8mepeTy2nPRKkn_71SpqkPSVL8QY1CzT16ankAuyT6u2S7iK1QEQspAwgSuAxiimBd25JIxjZkdzZVqC31ko2WMYZriROO1U3BtvKbTJi-r27VcJ6Kl6y8TULpmiCCklPYGhEdgpha1t2bMAgVnlVpTyKE3UodzG9E6GcdqOKq_AWSHIRWBUPqUkbuJstaE7Hl2HnqBXPSddJz_2-TukK_J0m1VrmkMYgkffS7AfQY6KZKZ42Pj9gsIOLLxBTcySqlX_hpDVu-OFmNBThXHH7QcizhFY5FmzmHbmnSapyY1913g8TkzCFbxv1GGvb5-vdXOPwb5C2SSLbO67s5r5ev_ksRiKBj3akzZN6pUgtoVJH60GOwzTPz7cjIVlv_stgAa-QVYXKUniZunSkUyYlnjynXCk6tsvaaFMDeOYMNFmGylfPqqX2OllVTMKwUyahNMW4qflcysWlgFe3rcsh7YHw13WYKXLHFPpa1_HwqMBHlC8tocO2cF8iHL0iBRhZAvT7-vsaJqmbxNXOzXirLoFR-V1NPu9c9iTMizhEdZ3IBzUa57pkIwp6CCDrhFpCOVgsynBoy3-jxWdGNl3H__3TQ88Mt_skQgcOE3CpoaJzVe61Vkawv3LJmyy7Y3SF9lLewVxa_m5upYXKyOD9OALAGHkCRoZxPZLZaeZVpbXwOedT1vXtSa732SVIjFvZOC-BFp5sKEr7fuYslkx6aml5fDyAWzQAbWri3WilnndrVXHmu2zyMgjCag7zfbkyylsy88A4DiC36MLrbEAey726Idg2MK0AfMGnC6br_o_WxL1MX4228RtplRXlBrn4aEoNb6POHidKNblwgCdBW0nPbtbK5KugE36hAie_gAmxbHzS3C3ptISDlECxWmnocIG5iPnvsVHXlgCFhts9D7U0RkvSUNMJCS8JeTfVNmZr8GiKkr8HtfyDQwBwoJR2M7i9TBCAreuJEj98sDTOJ2aEcbrL-2V5fj2M0G-j-2mMWhkYGoFLSX60sYsXUrcojS6YQlRNqAugy-LGZKTbdPISPGP1_H2MjL-siXoUDVSI7iwb5aw0ecis_KRMJc3HakJ5j9bZEM-qtT3r1AHcv1VQTGNKfnZFKk-bM5UuAXb5gUz2XvmFaHEdvbqa6yenHx-XtXtxlleU-EQHpZj5bH4Gxdig9K_eMDgh3VCPfonzfVFW3rDV3UC_e3t28f0ySQOwDE_OPG_JVIkW8BP5ikYFGTMHZ1ybxPtRGMyJLb2r-T1Ptx1GjOEbzNMHCGSNHI2of3PVJ6tZm-zlf43KN5f1w6JHf-HMrmiZInPfUIfKXYjGT7YLhf8IyCCM6gC3-ZJhwYL38buyk-Fu175zHYBtca6Wnt05i3Eooui_oNQ9wyyXojuDuaLxZarCwb6Dz7yvxGC22-dz0wSyP4ugrFTYV-jgyhi_cPXNQQuyDJqpGRH_ZedgOsD_1JLK2jfGOg5PgoLcKZdJB4t2A9y83YgrVLhYH0qpMcyQe90LyoELe1278SPtzrJHrvKgFx2Qvqnrc4Vkph0thB48sGVXEjeknEIq54xR_VL9U-tH7QsSTRh-l66OwsjW8L4YTkgsMKyzbCy4j118Ji_yDrGdGwS6gX97pGDHlvQeBBeocIqqp2eTpmepbXxFZ2yi3b8UfIW7BcrJJHdMH0Bg8s&cid=CAASFeRojv-AmDjftYpCJQy3V_q7_jBCcw&rfl=1%2Chttps%253A%252F%252Fwww.zdnet.com%252Farticle%252Fsuspected-iranian-hackers-target-airline-with-new-backdoor%252F%253Futm_source%253Ddlvr.it%2526utm_medium%253Dtwitter%240
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
d424a9b0c2a26c708aa79d0648faa49bd8920687dddacc1e8bef3098b006dec8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
br
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
8732
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
gen_204
pagead2.googlesyndication.com/pagead/ Frame 3150
42 B
63 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=xbid&dbm_b=AKAmf-CGESS-JTNYagWjF0NkBE3P-tPrgiMdF5auo3Tu1S7nrV1aiuBgGaECmlBWSbB-1wDFuilJ9hbxrprc2zJWfm-REamj_IQ_3iQjSJgWVtQfTCBUycg
Requested by
Host: 58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
URL: https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
dcmads.js
www.googletagservices.com/dcm/ Frame 3150
9 KB
4 KB
Script
General
Full URL
https://www.googletagservices.com/dcm/dcmads.js
Requested by
Host: 58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
URL: https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c45a7b49c14477cd160a83d4ee1fb8c311e12314e042d0647c68bec62f16fe29
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:17:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
3169
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/ads-dcm-tag
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4486
x-xss-protection
0
last-modified
Mon, 29 Nov 2021 19:29:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="ads-dcm-tag"
vary
Accept-Encoding
report-to
{"group":"ads-dcm-tag","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-dcm-tag"}]}
content-type
text/javascript
cache-control
public, max-age=3600
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:17:15 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20211207/r20110914/client/ Frame 3150
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20211207/r20110914/client/window_focus_fy2019.js
Requested by
Host: 58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
URL: https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36eb26e781bd5df368210633ce1197df38df32820e93c18e48afb04ad1cea627
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:01:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
533
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1332
x-xss-protection
0
server
cafe
etag
3351516697335751560
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Fri, 31 Dec 2021 11:01:11 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 3150
119 KB
36 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: 58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
URL: https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37305
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1638461285297402"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:10:04 GMT
qs_click_protection_fy2019.js
tpc.googlesyndication.com/pagead/js/r20211207/r20110914/client/ Frame 3150
15 KB
6 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20211207/r20110914/client/qs_click_protection_fy2019.js
Requested by
Host: 58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
URL: https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ffb89f1f1fa54e822805cddf1f6ec0492cd8b806b36a921eda855241d1eee914
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:08:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
76
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
6464
x-xss-protection
0
server
cafe
etag
15715955993838318253
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Fri, 31 Dec 2021 11:08:48 GMT
l
www.google.com/ads/measurement/ Frame 3150
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaSLK0FdOwcGl1IYFOa3-TwvSQ02LV65GKExMuJ48YPp25E1THXg72NwdGcRiW1hKsLbh8XEY8sjK7Vj1kW252xli5mmxg
Requested by
Host: 58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
URL: https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82f::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pixel
protected-by.clarium.io/ Frame 3150
68 B
345 B
Image
General
Full URL
https://protected-by.clarium.io/pixel?tag=wt_SjNVWEZlZTF4Y2xZLWJmRmxXaDFtSVpfcGhVLzI4NzA3ODYwNzU6MzAweDI1MA==&v=5&s=v31fn41bbuh&id=eyJkZnAiOnsiYWQiOjUwMjQ0OTY5MTEsImMiOm51bGwsImwiOjAsIm8iOjI4NzA3ODYwNzUsIkEiOiIvMjIzMDk2MTAxODYvYXctemRuZXQvdGVjaG5vbG9neS9zZWN1cml0eSIsInkiOjI4OTA3MiwiY28iOjAsInMiOiJtcHUtbWlkZGxlIn19&sb=undefined&cb=4888275&h=www.zdnet.com&d=eyJ3aCI6IlNqTlZXRVpsWlRGNFkyeFpMV0ptUm14WGFERnRTVnBmY0doVkx6STROekEzT0RZd056VTZNekF3ZURJMU1BPT0iLCJ3ZCI6eyJvIjoyODcwNzg2MDc1LCJ3IjoiMzAwIiwiaCI6IjI1MCJ9LCJ3ciI6Mn0=
Requested by
Host: 58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
URL: https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.127.116.150 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-127-116-150.eu-central-1.compute.amazonaws.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
69539b5b3777cffda28a66d7f2aa9b17c91ee1ec8fd50c00c442af91753a60f7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:10:04 GMT
Server
nginx/1.14.0 (Ubuntu)
Content-Type
image/png
Cache-Control
no-store, no-cache, must-revalidate, max-age=0
Connection
keep-alive
Content-Length
68
Expires
Sat, 26 Jul 1997 05:00:00 GMT
impl_v81.js
www.googletagservices.com/dcm/ Frame A81A
41 KB
17 KB
Script
General
Full URL
https://www.googletagservices.com/dcm/impl_v81.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/dcm/dcmads.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f3be6ad457ba5d4425f4d105688e9cf5a32595ff156bd290c8ccbe0e6ca3a68a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 10 Dec 2021 15:45:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
588256
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/ads-dcm-tag
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
17189
x-xss-protection
0
last-modified
Mon, 29 Nov 2021 19:28:15 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="ads-dcm-tag"
vary
Accept-Encoding
report-to
{"group":"ads-dcm-tag","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-dcm-tag"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Sat, 10 Dec 2022 15:45:48 GMT
pubads_impl_2021120601.js
securepubads.g.doubleclick.net/gpt/ Frame BF7F
348 KB
117 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
sffe /
Resource Hash
2d5ae5a515a688823dc98d032242c2ed6f490a74c4281bdd599567898f9fa675
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
119476
x-xss-protection
0
last-modified
Mon, 06 Dec 2021 09:34:20 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Fri, 17 Dec 2021 11:10:04 GMT
truncated
/ Frame BF7F
210 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a07ed52a7cc58eeb40899d8c34df6935d17b30e7e6c8f358ab0752031d5d9818

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_DISPLAY1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatPS=bottom&zMoatSZPS=300x250%20%7C%20bottom&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=https%3A%2F%2Ft.co&t=1639739404278&de=352117507178&m=0&ar=cc97a930ec1-clean&iw=101177c&q=15&cb=0&ym=0&cu=1639739404278&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=5009920773%3A2848205265%3A5688542871%3A138349983439&zMoatW=300&zMoatH=250&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=mpu-bottom%3FLL%7CT-1000&zMoatMMV=noHistData&zMoatMMV_MAX=noHistData&zMoatMGV=noHistData&zMoatMSafety=safe&zMoatMData=1&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&gw=redventuresgamdisplay60805146916&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1121%3A1121%3A2560%3A1112&iq=noHistData&tt=noHistData&tu=1&tp=safe&jk=-1&jm=-1&fs=195926&na=662575839&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
B26699368.318185658;dc_ver=81.236;sz=300x600;u_sd=1;nel=1;dc_adk=2584428108;ord=j5kocd;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsu7dhw51K2q1q7xGc1KTZZO6EpFxhQVlgxfuU...
ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/ Frame A81A
45 KB
22 KB
Script
General
Full URL
https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318185658;dc_ver=81.236;sz=300x600;u_sd=1;nel=1;dc_adk=2584428108;ord=j5kocd;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsu7dhw51K2q1q7xGc1KTZZO6EpFxhQVlgxfuU87Btkrr74nS3p4_cAoIUP6Q0VZeyhOOLz_29Az4yKQW8q_MqRP1cK2iDm7z0mNapxn63_3YpxQkG0z0kjvjtzVIa8dWhYcGplSMwDPemPOy8U8gj6JjS9HcoRhYFwwf7i0CGX2OBWQ1CanKaJuqIvp2W56bHsKC8uof0NYqukdAQCCCjiHmXVwvpeBz-Dz7PBffW_MOLv_FVGwHCinDAw9LPPruXJ0W1hHxWSUbMwKruZeanC-vO8iBMKjKlb0MKJj-WBQF0DV7lVS3Fnh0hAtDMIppgemCdSavyvareFD%26sai%3DAMfl-YT-IHZVgZeIAU2vSxK5Pi14LTRNNcfqqI8TS0uOVY0Il5vhbXau6q0jJZDTf3EcSLftFGnyHsZEbj8wHkA_YLXrzpPUkKMpGS3WLn7o_E-R73qGzrVl0lVMlOn528Z8%26sig%3DCg0ArKJSzDPjBnyizA1aEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68$0;xdt=0;crlt=wzsNZ16Vva;sttr=80;prcl=s
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/dcm/impl_v81.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.230 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f6.1e100.net
Software
cafe /
Resource Hash
2240ddffa02d94f67604342f4e74c17b835f4086094a7d4708a9721d9de79b30
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
br
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
22120
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
NRBR-a22c617a7b2aab2da1c
bam-cell.nr-data.net/events/1/
24 B
501 B
XHR
General
Full URL
https://bam-cell.nr-data.net/events/1/NRBR-a22c617a7b2aab2da1c?a=695782443&v=1212.e95d35c&to=NgYBNkBYWEEEAURQWg9MIgFGUFlcSgNCTVwCDwY9QVBYVQkH&rst=3104&ck=1&ref=https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.147 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c9cf152a0ad00d4f102c93c613c104914be5517ac8f8e0831727f8bfbe8b300

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
content-type
text/plain

Response headers

Date
Fri, 17 Dec 2021 11:10:04 GMT
CF-Cache-Status
DYNAMIC
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, HEAD, OPTIONS
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
access-control-allow-credentials
true
Connection
keep-alive
CF-Ray
6befb3ed49735364-FRA
Content-Length
24
E=fq
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=0/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/Q=f.1_c.1_p.1_l.1_v.1_f... Frame 30BF
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=0/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/Q=f.1_c.1_p.1_l.1_v.1_fc.1_fp.1_fl.1_cp.1_cl.1_pl.1_pv.1_lv.1/G=17dc815b05939588d14199e/E=fq
Requested by
Host: ad.clipcentric.com
URL: https://ad.clipcentric.com/user-9/resources/store.phtml?v200530
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://ad.clipcentric.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
integrator.js
adservice.google.de/adsid/ Frame BF7F
107 B
122 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
cache-control
private, no-cache, no-store
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3="googleads.g.doubleclick.net:443"; ma=2592000,h3=":443"; ma=2592000,h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
100
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame BF7F
107 B
122 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
cache-control
private, no-cache, no-store
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
100
x-xss-protection
0
gen_204
pagead2.googlesyndication.com/pagead/ Frame BF7F
0
20 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=gpt_sra_setclickurl&pvsid=1496279916739184&lenfreqs=449%3A1&vrg=2021120601&nw_id=22309610186&nslots=1&eid=31063257%2C44752585&pub_url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/ Frame BF7F
30 KB
12 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1496279916739184&correlator=1067649780408950&output=ldjh&impl=fif&eid=31063257%2C44752585&vrg=2021120601&ptt=17&sc=1&sfv=1-0-38&ecs=20211217&iu_parts=22309610186%2Caw-rv%2Civt&enc_prev_ius=%2F0%2F1%2F2&prev_iu_szs=300x250&click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsum-xKxhqX2N3a7xcG2N4YEzl1OHY_FRvlBke1_R9HSexR1HyEQaLnIhsa4cTOcyyPAk3XP3xUI5kiwhn1WBXS_inRsYQZxtPCDHdfyuOnNqGy_h1OTYp8vtIplvjdevXvYuqBgEDzJT2P1CpSneFF9KOwgF_s2oZekN8PZg5yThdfLE5qCY4qhV6cCd2xaUNMKZ9TwyAC9xS3KAeE4-VCHOIF7hZW06h8mCKDGwNARsZGECPdOX7mL3SO3ggb9piv2OSrj66agkhI6NekbsmrLoZkwoaLKXPKKUTmeB6NZi9GgtWH9HB00ReIBqxfVsoRQaMJWpaE%26sig%3DCg0ArKJSzMqNJBXa-XHzEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D&prev_scp=campaign%3D5677026463&cookie=ID%3D8cf3836d55010fc1-22d5df1b0acd005b%3AT%3D1639739403%3AS%3DALNI_MZQmI_OaoQ_91lu5J4PFynQirgsgg&cdm=www.zdnet.com&bc=31&abxe=1&lmt=1639739404&dt=1639739404394&dlt=1639739404105&idt=280&ea=0&frm=23&biw=1600&bih=1200&isw=300&ish=250&oid=2&adxs=1050&adys=1829&adks=1319207525&ucis=768gajegi25l&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=1&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter&top=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x0&msz=300x0&ga_vid=1582899990.1639739404&ga_sid=1639739404&ga_hid=2117729089&ga_fc=false&fws=256&ohw=0&btvi=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&nvt=1
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
1cecaea57ebd7a19ce3ccf49478aa9037f43e91c30c07191664a47967ad2da37
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
12475
x-xss-protection
0
google-lineitem-id
5677026463
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138355023537
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
15bba6cb2a099075211e19961c408204.safeframe.googlesyndication.com/safeframe/1-0-38/html/ Frame D140
6 KB
3 KB
Document
General
Full URL
https://15bba6cb2a099075211e19961c408204.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html?n=1
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a73730123a43c3040d889aaee11ec35094277ce5f778076b262c23a293870adb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
timing-allow-origin
*
content-length
3108
date
Fri, 17 Dec 2021 11:10:04 GMT
expires
Sat, 17 Dec 2022 11:10:04 GMT
cache-control
public, immutable, max-age=31536000
last-modified
Tue, 02 Mar 2021 20:17:03 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
sodar
pagead2.googlesyndication.com/pagead/ Frame BAF3
0
0
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/sodar?id=sodar2&v=225&li=gpt_2021120601&jk=3797515782955650&rc=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.google.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

EnZy1JEvhtfL3qsMHM2VNqoz8zWnsWCdOjk5wdd4Ig4.js
pagead2.googlesyndication.com/bg/ Frame 1CC1
35 KB
13 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/bg/EnZy1JEvhtfL3qsMHM2VNqoz8zWnsWCdOjk5wdd4Ig4.js
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
127672d4912f86d7cbdeab0c1ccd9536aa33f335a7b1609d3a3939c1d778220e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Thu, 16 Dec 2021 15:05:28 GMT
content-encoding
br
x-content-type-options
nosniff
age
72276
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/botguard-scs
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13555
x-xss-protection
0
last-modified
Mon, 06 Dec 2021 19:18:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="botguard-scs"
vary
Accept-Encoding
report-to
{"group":"botguard-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/botguard-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Fri, 16 Dec 2022 15:05:28 GMT
E=ls:on%20scroll%20full%20collapse.1
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=382/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=382/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:on%20scroll%20full%20collapse.1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
truncated
/ Frame 3241
801 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2b526196d510bc11f40effba13f1b9e1792120b1f40b453695e8d7dcc05cf38d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
UFYwWwmt.js
tpc.googlesyndication.com/sodar/ Frame 3150
41 KB
15 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/UFYwWwmt.js
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5056305b09ad6474ea540f796c79be51d6b8e96043cb3d7bc4ef774e56765f4f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:51:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1108
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15207
x-xss-protection
0
last-modified
Tue, 03 Mar 2020 20:15:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
vary
Accept-Encoding
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 17 Dec 2022 10:51:36 GMT
rum
dsum-sec.casalemedia.com/ Frame B72F
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=casale_media2_dsp_secure&google_cm&google_dbm
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=45&external_user_id=CAESEByZq5FghuOsMUYUlYpelz4&google_cver=1
43 B
1014 B
Image
General
Full URL
https://dsum-sec.casalemedia.com/rum?cm_dsp_id=45&external_user_id=CAESEByZq5FghuOsMUYUlYpelz4&google_cver=1
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/xbbe/pixel?d=CPv1SRDa1sb8AhjB0aC6ATAB&v=APEucNUi_OX0z4afvOV-4GTOhVmiXXZDy8MvxreoaOMnlll3rISnvyodrKP-uCbikqjrz2Vl9oO5Vl6gqVJs1N5H4emDSuEzmv_SPaEqFeMv3utO2Zi7vMNqQdJ-gY99nBj9J_DkYIDUKpK4SzVyOiTn7r7j1Bf1Dg
Protocol
HTTP/1.1
Server
2.18.234.21 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://googleads.g.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:10:04 GMT
Server
Apache
Vary
Is-Traffic-Usersync
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Fri, 17 Dec 2021 11:10:04 GMT

Redirect headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
server
HTTP server (unknown)
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
location
https://dsum-sec.casalemedia.com/rum?cm_dsp_id=45&external_user_id=CAESEByZq5FghuOsMUYUlYpelz4&google_cver=1
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
text/html; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
313
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
rum
dsum-sec.casalemedia.com/ Frame B72F
Redirect Chain
  • https://dsum-sec.casalemedia.com/rrum?ixi=0&cm_dsp_id=85&cb=https%3A%2F%2Fcm.g.doubleclick.net%2Fpixel%3Fgoogle_nid%3Dcasale_media2_dsp_secure%26google_cm%26google_hm%3D
  • https://dsum-sec.casalemedia.com/rrum?cb=https%3A%2F%2Fcm.g.doubleclick.net%2Fpixel%3Fgoogle_nid%3Dcasale_media2_dsp_secure%26google_cm%26google_hm%3D&cm_dsp_id=85&ixi=0&C=1
  • https://cm.g.doubleclick.net/pixel?google_nid=casale_media2_dsp_secure&google_cm&google_hm=YbxwDE-W-9XYIIFVE2pejAAA
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=45&external_user_id=CAESEByZq5FghuOsMUYUlYpelz4&google_cver=1
43 B
894 B
Image
General
Full URL
https://dsum-sec.casalemedia.com/rum?cm_dsp_id=45&external_user_id=CAESEByZq5FghuOsMUYUlYpelz4&google_cver=1
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/xbbe/pixel?d=CPv1SRDa1sb8AhjB0aC6ATAB&v=APEucNUi_OX0z4afvOV-4GTOhVmiXXZDy8MvxreoaOMnlll3rISnvyodrKP-uCbikqjrz2Vl9oO5Vl6gqVJs1N5H4emDSuEzmv_SPaEqFeMv3utO2Zi7vMNqQdJ-gY99nBj9J_DkYIDUKpK4SzVyOiTn7r7j1Bf1Dg
Protocol
HTTP/1.1
Server
2.18.234.21 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://googleads.g.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:10:04 GMT
Server
Apache
Vary
Is-Traffic-Usersync
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Fri, 17 Dec 2021 11:10:04 GMT

Redirect headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
server
HTTP server (unknown)
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
location
https://dsum-sec.casalemedia.com/rum?cm_dsp_id=45&external_user_id=CAESEByZq5FghuOsMUYUlYpelz4&google_cver=1
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
text/html; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
313
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
setuid
ib.adnxs.com/ Frame B72F
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=appnexus&google_cm&google_dbm
  • https://ib.adnxs.com/setuid?entity=101&code=CAESENX44gTlwqukBNvKEPVqRq8&google_cver=1
43 B
1004 B
Image
General
Full URL
https://ib.adnxs.com/setuid?entity=101&code=CAESENX44gTlwqukBNvKEPVqRq8&google_cver=1
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/xbbe/pixel?d=CPv1SRDa1sb8AhjB0aC6ATAB&v=APEucNUi_OX0z4afvOV-4GTOhVmiXXZDy8MvxreoaOMnlll3rISnvyodrKP-uCbikqjrz2Vl9oO5Vl6gqVJs1N5H4emDSuEzmv_SPaEqFeMv3utO2Zi7vMNqQdJ-gY99nBj9J_DkYIDUKpK4SzVyOiTn7r7j1Bf1Dg
Protocol
HTTP/1.1
Server
37.252.172.38 Frankfurt am Main, Germany, ASN29990 (ASN-APPNEX, US),
Reverse DNS
690.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.17.9 /
Resource Hash
4b5b6b15c6255109e06720cce42a06d3aead8b7874423d9c52cb0303212c25ef
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://googleads.g.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:10:04 GMT
X-Proxy-Origin
91.199.118.72; 91.199.118.72; 690.bm-nginx-loadbalancer.mgmt.fra1; adnxs.com
AN-X-Request-Uuid
f03dbf1d-8df7-44ec-a5f8-373def0f46e8
Server
nginx/1.17.9
P3P
policyref="http://cdn.adnxs-simple.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Cache-Control
no-store, no-cache, private
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT

Redirect headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
server
HTTP server (unknown)
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
location
https://ib.adnxs.com/setuid?entity=101&code=CAESENX44gTlwqukBNvKEPVqRq8&google_cver=1
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
text/html; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
290
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel
cm.g.doubleclick.net/ Frame B72F
Redirect Chain
  • https://ib.adnxs.com/getuid?https://cm.g.doubleclick.net/pixel?google_nid=appnexus&google_hm=${BASE64_UID_ENC}
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fcm.g.doubleclick.net%2Fpixel%3Fgoogle_nid%3Dappnexus%26google_hm%3D%24%7BBASE64_UID_ENC%7D
  • https://cm.g.doubleclick.net/pixel?google_nid=appnexus&google_hm=MzIyNjgxNjkxMTg3NTM0NzAwMA%3D%3D
170 B
188 B
Image
General
Full URL
https://cm.g.doubleclick.net/pixel?google_nid=appnexus&google_hm=MzIyNjgxNjkxMTg3NTM0NzAwMA%3D%3D
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/xbbe/pixel?d=CPv1SRDa1sb8AhjB0aC6ATAB&v=APEucNUi_OX0z4afvOV-4GTOhVmiXXZDy8MvxreoaOMnlll3rISnvyodrKP-uCbikqjrz2Vl9oO5Vl6gqVJs1N5H4emDSuEzmv_SPaEqFeMv3utO2Zi7vMNqQdJ-gY99nBj9J_DkYIDUKpK4SzVyOiTn7r7j1Bf1Dg
Protocol
H3
Server
142.250.185.194 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s52-in-f2.1e100.net
Software
HTTP server (unknown) /
Resource Hash
0b8a20373c6dd04e091902226d922b3688143a8938afb9d283d889de7b55ceb5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://googleads.g.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
server
HTTP server (unknown)
content-type
image/png
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
170
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:10:04 GMT
X-Proxy-Origin
91.199.118.72; 91.199.118.72; 690.bm-nginx-loadbalancer.mgmt.fra1; adnxs.com
AN-X-Request-Uuid
db7d5f49-e5a7-495f-bcb8-ec7e2f99ba2e
Server
nginx/1.17.9
Access-Control-Allow-Origin
*
P3P
policyref="http://cdn.adnxs-simple.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Location
https://cm.g.doubleclick.net/pixel?google_nid=appnexus&google_hm=MzIyNjgxNjkxMTg3NTM0NzAwMA%3D%3D
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
impl_v81.js
www.googletagservices.com/dcm/ Frame 3150
41 KB
17 KB
Script
General
Full URL
https://www.googletagservices.com/dcm/impl_v81.js
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f3be6ad457ba5d4425f4d105688e9cf5a32595ff156bd290c8ccbe0e6ca3a68a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 10 Dec 2021 15:45:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
588256
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/ads-dcm-tag
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
17189
x-xss-protection
0
last-modified
Mon, 29 Nov 2021 19:28:15 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="ads-dcm-tag"
vary
Accept-Encoding
report-to
{"group":"ads-dcm-tag","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-dcm-tag"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Sat, 10 Dec 2022 15:45:48 GMT
omrhp.js
pagead2.googlesyndication.com/pagead/js/r20211207/r20110914/elements/html/ Frame A81A
8 KB
3 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20211207/r20110914/elements/html/omrhp.js
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318185658;dc_ver=81.236;sz=300x600;u_sd=1;nel=1;dc_adk=2584428108;ord=j5kocd;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsu7dhw51K2q1q7xGc1KTZZO6EpFxhQVlgxfuU87Btkrr74nS3p4_cAoIUP6Q0VZeyhOOLz_29Az4yKQW8q_MqRP1cK2iDm7z0mNapxn63_3YpxQkG0z0kjvjtzVIa8dWhYcGplSMwDPemPOy8U8gj6JjS9HcoRhYFwwf7i0CGX2OBWQ1CanKaJuqIvp2W56bHsKC8uof0NYqukdAQCCCjiHmXVwvpeBz-Dz7PBffW_MOLv_FVGwHCinDAw9LPPruXJ0W1hHxWSUbMwKruZeanC-vO8iBMKjKlb0MKJj-WBQF0DV7lVS3Fnh0hAtDMIppgemCdSavyvareFD%26sai%3DAMfl-YT-IHZVgZeIAU2vSxK5Pi14LTRNNcfqqI8TS0uOVY0Il5vhbXau6q0jJZDTf3EcSLftFGnyHsZEbj8wHkA_YLXrzpPUkKMpGS3WLn7o_E-R73qGzrVl0lVMlOn528Z8%26sig%3DCg0ArKJSzDPjBnyizA1aEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68$0;xdt=0;crlt=wzsNZ16Vva;sttr=80;prcl=s
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
9db8a678d1681c1c4a3f15e1769c3f54d96f126db4a7b00cea65127c820a7763
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:06:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
198
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
3140
x-xss-protection
0
server
cafe
etag
17163059639670574047
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Fri, 31 Dec 2021 11:06:46 GMT
view
googleads4.g.doubleclick.net/pcs/ Frame A81A
0
524 B
Ping
General
Full URL
https://googleads4.g.doubleclick.net/pcs/view?xai=AKAOjsvZMDui4dG5oJd2Tcs-7B6yqR8pW2pjTQzpwLvDjQsSfipMU2LUZt636MX1E0EKMY0XtkBZiWsky97-qROM9JruBe2DFu6FFh8XfQXzxBL6WV1XHTCengqipxlKQ_FJbcZAunHJ6Zhue1YkpY8R9YCd&sig=Cg0ArKJSzN-6oQweJxeYEAE&uach_m=[UACH]&cry=1&fbs_aeid=[gw_fbsaeid]&urlfix=1&omid=0&rm=1&ctpt=0&cbvp=1&cstd=0&cisv=r20211207.64252&adurl=
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318185658;dc_ver=81.236;sz=300x600;u_sd=1;nel=1;dc_adk=2584428108;ord=j5kocd;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsu7dhw51K2q1q7xGc1KTZZO6EpFxhQVlgxfuU87Btkrr74nS3p4_cAoIUP6Q0VZeyhOOLz_29Az4yKQW8q_MqRP1cK2iDm7z0mNapxn63_3YpxQkG0z0kjvjtzVIa8dWhYcGplSMwDPemPOy8U8gj6JjS9HcoRhYFwwf7i0CGX2OBWQ1CanKaJuqIvp2W56bHsKC8uof0NYqukdAQCCCjiHmXVwvpeBz-Dz7PBffW_MOLv_FVGwHCinDAw9LPPruXJ0W1hHxWSUbMwKruZeanC-vO8iBMKjKlb0MKJj-WBQF0DV7lVS3Fnh0hAtDMIppgemCdSavyvareFD%26sai%3DAMfl-YT-IHZVgZeIAU2vSxK5Pi14LTRNNcfqqI8TS0uOVY0Il5vhbXau6q0jJZDTf3EcSLftFGnyHsZEbj8wHkA_YLXrzpPUkKMpGS3WLn7o_E-R73qGzrVl0lVMlOn528Z8%26sig%3DCg0ArKJSzDPjBnyizA1aEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68$0;xdt=0;crlt=wzsNZ16Vva;sttr=80;prcl=s
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.186.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:04 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
dvtp_src.js
cdn.doubleverify.com/ Frame A81A
8 KB
4 KB
Script
General
Full URL
https://cdn.doubleverify.com/dvtp_src.js?ctx=3758893&cmp=26699368&sid=5755331&plc=318185658&num=&adid=&advid=9640137&adsrv=1&btreg=510963286&btadsrv=doubleclick&crt=160251313&crtname=&chnl=&unit=&pid=&uid=&tagtype=&dvtagver=6.1.src
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318185658;dc_ver=81.236;sz=300x600;u_sd=1;nel=1;dc_adk=2584428108;ord=j5kocd;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsu7dhw51K2q1q7xGc1KTZZO6EpFxhQVlgxfuU87Btkrr74nS3p4_cAoIUP6Q0VZeyhOOLz_29Az4yKQW8q_MqRP1cK2iDm7z0mNapxn63_3YpxQkG0z0kjvjtzVIa8dWhYcGplSMwDPemPOy8U8gj6JjS9HcoRhYFwwf7i0CGX2OBWQ1CanKaJuqIvp2W56bHsKC8uof0NYqukdAQCCCjiHmXVwvpeBz-Dz7PBffW_MOLv_FVGwHCinDAw9LPPruXJ0W1hHxWSUbMwKruZeanC-vO8iBMKjKlb0MKJj-WBQF0DV7lVS3Fnh0hAtDMIppgemCdSavyvareFD%26sai%3DAMfl-YT-IHZVgZeIAU2vSxK5Pi14LTRNNcfqqI8TS0uOVY0Il5vhbXau6q0jJZDTf3EcSLftFGnyHsZEbj8wHkA_YLXrzpPUkKMpGS3WLn7o_E-R73qGzrVl0lVMlOn528Z8%26sig%3DCg0ArKJSzDPjBnyizA1aEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68$0;xdt=0;crlt=wzsNZ16Vva;sttr=80;prcl=s
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00:2b2::4469 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Microsoft-IIS/10.0 /
Resource Hash
3ce4399c5078ca5cea592b3eaf5eadeb4e8e0ca168468bb5ceb3122bc83a6bbd

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:10:04 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Dec 2021 19:20:31 GMT
Server
Microsoft-IIS/10.0
ETag
"80a9affdb1f2d71:0"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=900
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
3291
UFYwWwmt.js
tpc.googlesyndication.com/sodar/ Frame A81A
41 KB
15 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/UFYwWwmt.js
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318185658;dc_ver=81.236;sz=300x600;u_sd=1;nel=1;dc_adk=2584428108;ord=j5kocd;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsu7dhw51K2q1q7xGc1KTZZO6EpFxhQVlgxfuU87Btkrr74nS3p4_cAoIUP6Q0VZeyhOOLz_29Az4yKQW8q_MqRP1cK2iDm7z0mNapxn63_3YpxQkG0z0kjvjtzVIa8dWhYcGplSMwDPemPOy8U8gj6JjS9HcoRhYFwwf7i0CGX2OBWQ1CanKaJuqIvp2W56bHsKC8uof0NYqukdAQCCCjiHmXVwvpeBz-Dz7PBffW_MOLv_FVGwHCinDAw9LPPruXJ0W1hHxWSUbMwKruZeanC-vO8iBMKjKlb0MKJj-WBQF0DV7lVS3Fnh0hAtDMIppgemCdSavyvareFD%26sai%3DAMfl-YT-IHZVgZeIAU2vSxK5Pi14LTRNNcfqqI8TS0uOVY0Il5vhbXau6q0jJZDTf3EcSLftFGnyHsZEbj8wHkA_YLXrzpPUkKMpGS3WLn7o_E-R73qGzrVl0lVMlOn528Z8%26sig%3DCg0ArKJSzDPjBnyizA1aEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68$0;xdt=0;crlt=wzsNZ16Vva;sttr=80;prcl=s
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5056305b09ad6474ea540f796c79be51d6b8e96043cb3d7bc4ef774e56765f4f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:51:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1108
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15207
x-xss-protection
0
last-modified
Tue, 03 Mar 2020 20:15:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
vary
Accept-Encoding
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 17 Dec 2022 10:51:36 GMT
4217474214653602766
s0.2mdn.net/simgad/ Frame A81A
35 KB
35 KB
Image
General
Full URL
https://s0.2mdn.net/simgad/4217474214653602766
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:812::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
436e47e341227f4837eb6cd70da448b5e1a355a8c886a423219acf77f8016c19
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Wed, 15 Dec 2021 23:46:36 GMT
x-content-type-options
nosniff
age
127408
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35579
x-xss-protection
0
last-modified
Fri, 29 Oct 2021 16:28:28 GMT
server
sffe
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
expires
Thu, 15 Dec 2022 23:46:36 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame A81A
119 KB
36 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37305
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1638461285297402"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:10:04 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 0AAB
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuex0mE2Rp2uZ1b1swGmm5NvzcUNijejEwmDcE0utJEcrDe3Gk9FvSYfKtTcH1g29_g1OHy5RxK4w1VTPXf6P3M01vkjO9Hm2M0ptHojj4HaZ5r_FG4uOji9r3G2A6cUSxY2zhNe4xpzvMPyyudkkQRLqawgtC4BUYzfaCvqwZcngqrHdfz3-ICTHCvEzWUIuGNHPPBna0WC_eKpp3QdoltZG6izeNNsEBcp6-5RX_RtWoIpoeIgTUpu5E-n7Lz20VX67j2prqGpD1oXT7f9CS-GDo_McBjVmLoi5trzVAzzciDibCX4g&sig=Cg0ArKJSzAuVAriCIcFvEAE&uach_m=[UACH]&adurl=
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:04 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20211207/r20110914/client/ Frame 0AAB
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20211207/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36eb26e781bd5df368210633ce1197df38df32820e93c18e48afb04ad1cea627
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:01:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
533
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1332
x-xss-protection
0
server
cafe
etag
3351516697335751560
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Fri, 31 Dec 2021 11:01:11 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 0AAB
119 KB
36 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37305
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1638461285297402"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:10:04 GMT
moatad.js
z.moatads.com/redventuresgamdisplay60805146916/ Frame 0AAB
335 KB
112 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamdisplay60805146916/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ec3300dff5a35315ea608c5dc57e965957897133eb6a543533566d6e2c35ed07

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
last-modified
Thu, 09 Dec 2021 16:36:30 GMT
server
AmazonS3
x-amz-request-id
SXBZ8ADYT77KW7MP
etag
"9c75e5b0c5bc0a53e0cdef53eae89c77"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=15081
accept-ranges
bytes
content-length
114446
x-amz-id-2
Js3u1th+lEwEMVGKInxoBehDmEsPJoYn2GSrvSApeaA9h/kdmOzjLJkUhJKG3pI/I9LMlptFND8=
16181266791146063110
tpc.googlesyndication.com/simgad/ Frame 0AAB
17 KB
17 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/16181266791146063110
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
bb3661ac37cbb213b64eb600c7c30da647babd9a2b2ffdbe5f30830fcebe2cc4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Wed, 15 Dec 2021 11:23:28 GMT
x-content-type-options
nosniff
age
171996
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
17729
x-xss-protection
0
last-modified
Thu, 01 Jul 2021 21:34:20 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
expires
Thu, 15 Dec 2022 11:23:28 GMT
l
www.google.com/ads/measurement/ Frame 0AAB
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaRDeWKBw3T0raDMAL1fcAFh_oddwdPhdksfPIM7x_-9g9L68b1hzWn2XelfXkbUFY3f0ktia_4ikmNmdAnfalRRqyRTnw
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=226&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1639739403574&r=341503257798&t=meas&os=0&fi2=0&div1=0&ait=0&gpt_target_pos=middle&gpt_target_vguid=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&gpt_target_ptype=article&gpt_target_sl=mpu-middle%3FLL%7CT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Ftechnology%2Fsecurity&bedc=1&q=1&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=226&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1639739403574&r=341503257798&t=nht&os=0&fi2=0&div1=0&ait=0&gpt_target_pos=middle&gpt_target_vguid=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&gpt_target_ptype=article&gpt_target_sl=mpu-middle%3FLL%7CT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Ftechnology%2Fsecurity&bedc=1&q=2&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=technology&zMoatAdUnit3=security&wf=1&ra=3&pxm=&sgs=3&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2F58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com%2Fsafeframe%2F1-0-38%2Fhtml%2Fcontainer.html&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&bq=11&zMoatpos=middle&zMoatvguid=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatptype=article&zMoatsl=mpu-middle%3FLL%7CT-1000&g=0&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&h=250&w=300&rm=1&fy=1050&gp=1320.4375&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739403574&de=341503257798&cu=1639739403574&m=950&ar=8ab009d7785-clean&iw=04a0275&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=1320.4375&lb=2769&le=1&lf=77&lg=1&lh=10&ch=0&vv=1&vw=1%3A0%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=226&cd=0&ah=226&am=0&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&jk=2&jm=-1&tc=0&fs=195979&na=508322533&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=232&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1639739403574&r=341503257798&t=hdn&os=0&fi2=0&div1=0&ait=0&gpt_target_pos=middle&gpt_target_vguid=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&gpt_target_ptype=article&gpt_target_sl=mpu-middle%3FLL%7CT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Ftechnology%2Fsecurity&bedc=1&q=3&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
truncated
/ Frame 0AAB
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1632b88892393ad59913db33ff38ecf26e314ee8e9017ee8c49b4fc76a1bd1a4

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
B26731448.319366990;dc_ver=81.236;sz=300x250;u_sd=1;dc_adk=2228999113;ord=e15s65;click=https%3A%2F%2Fgoogleads.g.doubleclick.net%2Fdbm%2Fclk%3Fsa%3DL%26ai%3DCjbiBC3C8YaWXJNzD7_UPs8mTyAK7i_WaZ-CWgcq...
ad.doubleclick.net/ddm/adi/N7171.3054164TW_ORGANIC/ Frame 69CD
51 KB
24 KB
Document
General
Full URL
https://ad.doubleclick.net/ddm/adi/N7171.3054164TW_ORGANIC/B26731448.319366990;dc_ver=81.236;sz=300x250;u_sd=1;dc_adk=2228999113;ord=e15s65;click=https%3A%2F%2Fgoogleads.g.doubleclick.net%2Fdbm%2Fclk%3Fsa%3DL%26ai%3DCjbiBC3C8YaWXJNzD7_UPs8mTyAK7i_WaZ-CWgcqWD7_O8_0IEAEg97vHgwFglQLIAQmoAwGqBJICT9DlcQg8r501u4B9hx7Bmnq-DK0Jak7lk669RcCwtDh1NblV2l1Y8fpqkMkgygEZtXksznMENyRSB58_azXe8H5gC-SGx9kWQiQiESzwkN6zK9fjtJ8XW375I6594qhF6hzcJU4I1mrKLSz0GkS4HGWsUedd0u-LVOVDHMvXxPQksSP3ElGr1dcu2oR10dLSzrZEh6BDmylOFoS8x1YYIzuwq7UQU_IN6PSevTODt0Nju5QXOAqcrE4zfVHxWGAia64Z0Xenv1fEQ6OQ2t4PWmWX6sGSdhj74ejbv2QtB_FdztOM_rh0KG4GzM62coud46PhPZaTQJ3XNZPb2sEHKQdCQDPAxskdWapPwOwljgCIjcAEoJDP1fYD4AQDkAYBoAZNgAegzvb6AqgHjs4bqAeT2BuoB-6WsQKoB_6esQKoB9XJG6gHpr4bqAfz0RuoB5bYG6gHqpuxAqgH35-xAtgHANIICQiI4YAQEAEYHYAKA5gLAcgLAYAMAbATrb3UDdATANgTA9gUAdAVAfgWAYAXAQ%26ae%3D1%26num%3D1%26cid%3DCAASFeRojv-AmDjftYpCJQy3V_q7_jBCcw%26sig%3DAOD64_1iQgxtn8cOuH8KEcUE8Kk-gxuxBw%26client%3Dca-pub-8820362605711196%26dbm_c%3DAKAmf-A8fSI75fEvh909rFjOUV7URVdDDnksfplYAcJFNUc8EHXWXV59dnM8zZU222C24ROh-661gVQkpW--fSnXzD71Lc0m87xKwyebohEp5BEP5t2hybsQc_d0uWxGLpGTioTTQXvXg2_3p3cCSCirJbWF6OjjiQ%26cry%3D1%26dbm_d%3DAKAmf-C20cWwuzoID2yJytfQg7xPPIsJm42NKSbBSMpawVeQNNezpF3VXbCPg20nD-mYd8YYtAa4miZKci5dKRH37S164-jX0KT_9Cjh4F_LRxNbboX94rcBjNIowPy-hjt0gSMs_YlvwrQIlNDLmsC76cElYYW0b_Kep5kwUymFvjvPwOY5oaYD1Ycfs0iu8ZDo1EbFH8lC3TMt88ptFOIqIM6eT-V__jqW-2b5hac1DRLB21Mkw11Br326XXxZuZTFIbsFQaGWmQLCxVX-KUJjej-zRdBpeSh7z49Ipc7vHr7dgDy53VkSLogxJQizcFv5dAZK7KfuNElkWBc8CQ1llgIqZcCi-3NqB7v3J0-3pAH2OGKnKuFYSDVjKignYsPAW3XlJkY2GFvKnKkYWJ6-6FySylZKNc5tUq7Z4eqC59FUAkZFsTFAEKJoYyHPKM4P_BPaWK13z7DOKe83vWbyk_K3kZHs1WyKNbmUIBs3rQj8z-h--ZjtyradDVKRPhvnWKy56pa-nT04oQUiCr6oMC6cebPl1wnPLuA5vI_RluM786HV3Apq1ov9DcirgwN-Hc2ff-IMQq2YmOeTaygTRRQms31AtWl0T988Phjb7m6lcpIzZ2A%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter$0;xdt=1;crlt=3x1dtabP_p;sttr=121;prcl=s
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.230 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f6.1e100.net
Software
cafe /
Resource Hash
3da93d469d1fcf6c1964e06daac2706d77a40a2e07f2f6d7149551a880153557
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/

Response headers

p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
cross-origin-resource-policy
cross-origin
date
Fri, 17 Dec 2021 11:10:04 GMT
pragma
no-cache
expires
Fri, 01 Jan 1990 00:00:00 GMT
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
server
cafe
content-length
24045
x-xss-protection
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
truncated
/ Frame 3150
221 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2d50d8ebd20f053d16f4104f4a1f6c1421d2769abdc12459ebad9f72437bd47b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=31&fi=1&apd=61&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739404013&r=110680706678&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=1&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=31&fi=1&apd=61&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739404013&r=110680706678&t=fv&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=2&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=31&fi=1&apd=61&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739404013&r=110680706678&t=nht&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=3&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
Enqz_20U.html
tpc.googlesyndication.com/sodar/ Frame 5EB9
22 KB
8 KB
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
127ab3ff6d14112ae6aa40b68d9d3144748eda08efbc60a48a5be0555cf8622b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com/

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
timing-allow-origin
*
content-length
8395
date
Fri, 17 Dec 2021 10:51:37 GMT
expires
Sat, 17 Dec 2022 10:51:37 GMT
last-modified
Tue, 03 Mar 2020 20:15:00 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1107
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
truncated
/ Frame A81A
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
57977349a3e71d145a734182aa6fe694199862bed8767e3b039c04f9f64b9d5d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=2&fi=1&apd=3&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370174589&S1id=22308610192&S2id=22654085702&ord=1639739404635&r=31011698570&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=1&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=2&fi=1&apd=3&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370174589&S1id=22308610192&S2id=22654085702&ord=1639739404635&r=31011698570&t=fv&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=2&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=2&fi=1&apd=3&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370174589&S1id=22308610192&S2id=22654085702&ord=1639739404635&r=31011698570&t=nht&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=3&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
zdnet+65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
1 MB
1 MB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/a/fly/046431-fly/js/main.default.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
7a4c34b8b214e347836a070bad5395040344e037e289f77b11e9e49394ba0558

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
via
1.1 varnish, 1.1 varnish
age
118
x-guploader-uploadid
ADPycdsi4XT0OFfFGuCHjx7eZLtiBfonP2e2MBvaZ8izou62xowJhWrpuxH0vuGE11N7PSGv6zy9y1M-FNdonX2ZOSs
x-cache
HIT, HIT
x-goog-storage-class
REGIONAL
x-cache-hits
1, 1
content-length
1098648
x-served-by
cache-chi21126-CHI, cache-fra19177-FRA
last-modified
Mon, 06 Dec 2021 15:33:22 GMT
server
UploadServer
x-timer
S1639739405.650691,VS0,VE0
etag
"6c5e7bec419989b25bd78586518ca3d4"
x-goog-hash
crc32c=PmX9Ug==, md5=bF577EGZibJb14WGUYyj1A==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:08:06 GMT
zdnet+67d31788-4872-43ce-a4f9-31e95154f3fb.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
171 KB
171 KB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+67d31788-4872-43ce-a4f9-31e95154f3fb.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/a/fly/046431-fly/js/main.default.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
29996f1588a8aa881f5ed1a207b098a9a8cfead8a41f785d528ca3417ea52fc3

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
via
1.1 varnish, 1.1 varnish
age
153
x-guploader-uploadid
ADPycdsKFjWqb0OqIxnDN3qTpnz6g9TG5gAFhYsjx6wv47jH2E1q1RXJjQioa4kAI6iuCGKmytmBGPC_-0QgeUNndVVQGtDzUQ
x-cache
HIT, HIT
x-goog-storage-class
REGIONAL
x-cache-hits
1, 1
content-length
174929
x-served-by
cache-chi21127-CHI, cache-fra19177-FRA
last-modified
Fri, 10 Dec 2021 14:03:19 GMT
server
UploadServer
x-timer
S1639739405.652444,VS0,VE0
etag
"c23bec11b723d1377e231e18cdfe53d3"
x-goog-hash
crc32c=qAvwoQ==, md5=wjvsEbcj0Td+Ix4Yzf5T0w==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:07:31 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2Fwww.zdnet.com%2F%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739404013&de=110680706678&cu=1639739404013&m=583&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2769&le=1&lf=0&lg=1&lh=9&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=0&ag=31&an=0&gf=31&gg=0&ix=31&ic=31&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=31&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=61&cd=0&ah=61&am=0&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=3&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1056602766&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
Enqz_20U.html
tpc.googlesyndication.com/sodar/ Frame 85BD
22 KB
8 KB
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/UFYwWwmt.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
127ab3ff6d14112ae6aa40b68d9d3144748eda08efbc60a48a5be0555cf8622b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
timing-allow-origin
*
content-length
8395
date
Fri, 17 Dec 2021 10:51:37 GMT
expires
Sat, 17 Dec 2022 10:51:37 GMT
last-modified
Tue, 03 Mar 2020 20:15:00 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1107
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
E=fq
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=649/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/Q=f.1_c.1_p... Frame 30BF
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=649/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/Q=f.1_c.1_p.1_l.1_v.1_fc.1_fp.1_fl.1_fr.1_cp.1_cl.1_pl.1_pv.1_lv.1/G=17dc815b05939588d14199e/E=fq
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://ad.clipcentric.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
view
securepubads.g.doubleclick.net/pcs/ Frame 0AAB
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstpOrJDgQhu0ExWZJQK2VeVghps5XQljb5RlaulpfwKapTVbMNYgQf0fsfB52cq_4mnbqiOLN8cv7dtzOoaykPKL70S4pnfdAJnB27wbhe9zkL1lAMP-djMzzT-h6hM6uNllSXGmGAGrXTtv5mtRcXKEHVSZlaSJ_aau9lxPhxwMFRMgMqQab2NFowldWUgWJ6M9_EEcF-RmJ4tQAzC6qtyVieZBf5DuTY3KiI_EUI52AGjHyt83AQn7YxSt1IEqQgcEv8H_Iv5Jgg8dzCVen7iLkFhCZRdZmYu87bgL-OYLho5xfUzkNYX&sig=Cg0ArKJSzKAn3U7t_-UzEAE&uach_m=[UACH]&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:04 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Fri, 17 Dec 2021 11:10:04 GMT
view
googleads4.g.doubleclick.net/pcs/ Frame A81A
0
23 B
Ping
General
Full URL
https://googleads4.g.doubleclick.net/pcs/view?xai=AKAOjsvZMDui4dG5oJd2Tcs-7B6yqR8pW2pjTQzpwLvDjQsSfipMU2LUZt636MX1E0EKMY0XtkBZiWsky97-qROM9JruBe2DFu6FFh8XfQXzxBL6WV1XHTCengqipxlKQ_FJbcZAunHJ6Zhue1YkpY8R9YCd&sig=Cg0ArKJSzN-6oQweJxeYEAE&uach_m=[UACH]&cry=1&fbs_aeid=[gw_fbsaeid]&urlfix=1&omid=0&rm=1&ctpt=273&vt=11&dtpt=273&dett=2&cstd=0&cisv=r20211207.64252&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&adurl=
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318185658;dc_ver=81.236;sz=300x600;u_sd=1;nel=1;dc_adk=2584428108;ord=j5kocd;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsu7dhw51K2q1q7xGc1KTZZO6EpFxhQVlgxfuU87Btkrr74nS3p4_cAoIUP6Q0VZeyhOOLz_29Az4yKQW8q_MqRP1cK2iDm7z0mNapxn63_3YpxQkG0z0kjvjtzVIa8dWhYcGplSMwDPemPOy8U8gj6JjS9HcoRhYFwwf7i0CGX2OBWQ1CanKaJuqIvp2W56bHsKC8uof0NYqukdAQCCCjiHmXVwvpeBz-Dz7PBffW_MOLv_FVGwHCinDAw9LPPruXJ0W1hHxWSUbMwKruZeanC-vO8iBMKjKlb0MKJj-WBQF0DV7lVS3Fnh0hAtDMIppgemCdSavyvareFD%26sai%3DAMfl-YT-IHZVgZeIAU2vSxK5Pi14LTRNNcfqqI8TS0uOVY0Il5vhbXau6q0jJZDTf3EcSLftFGnyHsZEbj8wHkA_YLXrzpPUkKMpGS3WLn7o_E-R73qGzrVl0lVMlOn528Z8%26sig%3DCg0ArKJSzDPjBnyizA1aEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68$0;xdt=0;crlt=wzsNZ16Vva;sttr=80;prcl=s
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:04 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
view
securepubads.g.doubleclick.net/pcs/ Frame A81A
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvMWvT2pMC5ruc_lEA14Q3zsbMcqXxdzW2qfQSPOQUnNdhQ_gPJxKOszVpKucNy-yNW0AC1AGC6mWa3S5-UAAMwPGvcMUBUzA5eytz3TiRSnQr5PYeymZs_RDZnd9a4ZqX4R81ymBQTAxXWP51Shqdee_C1UnYTr3PtodvZ55WYmKkduBry8d8fiC6liJYDpwrU4w5anWsLKpY_bWLr8D93YSpDEJE5oWIk-DV3hgPT839zus4dUgqZZH74K6USC9GvfQJy8kyeuaGfQgv03i9TIg-G9UMmsHvgNmaGQAb-1kAUYYRAQI8jSZIIKbrYLhkuThjsIDsyTSsqxGuFxZ0&sai=AMfl-YTqWwEPDmUD4e4mu7HuEiyP_zvHwVUZV1h310Irsuf-16vKvtEJRLUntYUTpSeZoe5-KJnzk-S0vk-dm63-kLYPFO5s7eHtKz7cYt1XKPGZAvJ56vjI3-gRMmUOX1iE&sig=Cg0ArKJSzIYkYLJE5PVXEAE&uach_m=[UACH]&urlfix=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:04 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Fri, 17 Dec 2021 11:10:04 GMT
dv-measurements1950.js
cdn.doubleverify.com/ Frame 9790
490 KB
89 KB
Script
General
Full URL
https://cdn.doubleverify.com/dv-measurements1950.js
Requested by
Host: t.co
URL: https://t.co/Bi3lGmiArD
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00:2b2::4469 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Microsoft-IIS/10.0 /
Resource Hash
88343b81dd1c646160dcf8856b77f8d7e12334fa17a9ae39c1a6958b134a1b25

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:10:04 GMT
Content-Encoding
gzip
Last-Modified
Wed, 15 Dec 2021 11:38:54 GMT
Server
Microsoft-IIS/10.0
ETag
"01b9356a8f1d71:0"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=946080900
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
91099
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=3&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5009920773&L2id=2848205265&L3id=5677026463&L4id=138355023537&S1id=22308610192&S2id=22383746382&ord=1639739404756&r=52034830188&t=meas&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=&zMoatPT=&zMoatSL=&moatClientSlicer3=0&bedc=1&q=1&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=3&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5009920773&L2id=2848205265&L3id=5677026463&L4id=138355023537&S1id=22308610192&S2id=22383746382&ord=1639739404756&r=52034830188&t=nht&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=&zMoatPT=&zMoatSL=&moatClientSlicer3=0&bedc=1&q=2&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=224&fi=1&apd=254&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739404013&r=110680706678&t=hdn&os=1&fi2=0&div1=0&ait=97&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=4&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
omrhp.js
pagead2.googlesyndication.com/pagead/js/r20211207/r20110914/elements/html/ Frame 69CD
8 KB
3 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20211207/r20110914/elements/html/omrhp.js
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adi/N7171.3054164TW_ORGANIC/B26731448.319366990;dc_ver=81.236;sz=300x250;u_sd=1;dc_adk=2228999113;ord=e15s65;click=https%3A%2F%2Fgoogleads.g.doubleclick.net%2Fdbm%2Fclk%3Fsa%3DL%26ai%3DCjbiBC3C8YaWXJNzD7_UPs8mTyAK7i_WaZ-CWgcqWD7_O8_0IEAEg97vHgwFglQLIAQmoAwGqBJICT9DlcQg8r501u4B9hx7Bmnq-DK0Jak7lk669RcCwtDh1NblV2l1Y8fpqkMkgygEZtXksznMENyRSB58_azXe8H5gC-SGx9kWQiQiESzwkN6zK9fjtJ8XW375I6594qhF6hzcJU4I1mrKLSz0GkS4HGWsUedd0u-LVOVDHMvXxPQksSP3ElGr1dcu2oR10dLSzrZEh6BDmylOFoS8x1YYIzuwq7UQU_IN6PSevTODt0Nju5QXOAqcrE4zfVHxWGAia64Z0Xenv1fEQ6OQ2t4PWmWX6sGSdhj74ejbv2QtB_FdztOM_rh0KG4GzM62coud46PhPZaTQJ3XNZPb2sEHKQdCQDPAxskdWapPwOwljgCIjcAEoJDP1fYD4AQDkAYBoAZNgAegzvb6AqgHjs4bqAeT2BuoB-6WsQKoB_6esQKoB9XJG6gHpr4bqAfz0RuoB5bYG6gHqpuxAqgH35-xAtgHANIICQiI4YAQEAEYHYAKA5gLAcgLAYAMAbATrb3UDdATANgTA9gUAdAVAfgWAYAXAQ%26ae%3D1%26num%3D1%26cid%3DCAASFeRojv-AmDjftYpCJQy3V_q7_jBCcw%26sig%3DAOD64_1iQgxtn8cOuH8KEcUE8Kk-gxuxBw%26client%3Dca-pub-8820362605711196%26dbm_c%3DAKAmf-A8fSI75fEvh909rFjOUV7URVdDDnksfplYAcJFNUc8EHXWXV59dnM8zZU222C24ROh-661gVQkpW--fSnXzD71Lc0m87xKwyebohEp5BEP5t2hybsQc_d0uWxGLpGTioTTQXvXg2_3p3cCSCirJbWF6OjjiQ%26cry%3D1%26dbm_d%3DAKAmf-C20cWwuzoID2yJytfQg7xPPIsJm42NKSbBSMpawVeQNNezpF3VXbCPg20nD-mYd8YYtAa4miZKci5dKRH37S164-jX0KT_9Cjh4F_LRxNbboX94rcBjNIowPy-hjt0gSMs_YlvwrQIlNDLmsC76cElYYW0b_Kep5kwUymFvjvPwOY5oaYD1Ycfs0iu8ZDo1EbFH8lC3TMt88ptFOIqIM6eT-V__jqW-2b5hac1DRLB21Mkw11Br326XXxZuZTFIbsFQaGWmQLCxVX-KUJjej-zRdBpeSh7z49Ipc7vHr7dgDy53VkSLogxJQizcFv5dAZK7KfuNElkWBc8CQ1llgIqZcCi-3NqB7v3J0-3pAH2OGKnKuFYSDVjKignYsPAW3XlJkY2GFvKnKkYWJ6-6FySylZKNc5tUq7Z4eqC59FUAkZFsTFAEKJoYyHPKM4P_BPaWK13z7DOKe83vWbyk_K3kZHs1WyKNbmUIBs3rQj8z-h--ZjtyradDVKRPhvnWKy56pa-nT04oQUiCr6oMC6cebPl1wnPLuA5vI_RluM786HV3Apq1ov9DcirgwN-Hc2ff-IMQq2YmOeTaygTRRQms31AtWl0T988Phjb7m6lcpIzZ2A%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter$0;xdt=1;crlt=3x1dtabP_p;sttr=121;prcl=s
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
9db8a678d1681c1c4a3f15e1769c3f54d96f126db4a7b00cea65127c820a7763
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://ad.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:06:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
198
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
3140
x-xss-protection
0
server
cafe
etag
17163059639670574047
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Fri, 31 Dec 2021 11:06:46 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_DISPLAY1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x600&zMoatPS=top&zMoatSZPS=300x600%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=https%3A%2F%2Ft.co&t=1639739404635&de=31011698570&m=0&ar=cc97a930ec1-clean&iw=101177c&q=19&cb=0&ym=0&cu=1639739404635&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=5029661432%3A2929336068%3A5821501893%3A138370174589&zMoatW=300&zMoatH=600&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&gw=redventuresgamdisplay60805146916&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1121%3A1121%3A2560%3A1112&iq=na&tt=na&tu=&tp=&jk=-1&jm=-1&fs=195926&na=1313839627&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame BF7F
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjst2ZbsHva7nCVdBqCrNPxOxUD-5nzaP_hxp7IoDmwKaYH9lu-heX97QVIlGprUf5X01rLC0YAT9FxGMpb8334AOZi8b97WxHbrbmU2hblvGoYAdK5c_7rHbglqIy7jmi1TSjLdoF3xPS_e_NKp_wWmGWhnZx0wZrFulQDXgTYLBU9IB8H3yCH0IRy8dOHKBbFf_aoVKPnBcFJ6yKSQXkJre65I3lxG5MYz4RVyzfAQD_aMno9kSK2rujwwMzh3KTrYhMIh9gUW1y8vx9zd0HDBmCwC4dGKJ9JVKxHocm0bFk5m285Q-a62cXEPV6Pj6m-7QOHTDDDwT7g_qyg&sig=Cg0ArKJSzGu5lT_gcmWHEAE&uach_m=[UACH]&urlfix=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:04 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Fri, 17 Dec 2021 11:10:04 GMT
sodar
pagead2.googlesyndication.com/getconfig/ Frame BF7F
11 KB
8 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2021120601&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
88361c168a4fbf50e1b3ed0c8a8026d4fbe9ad9323d65aa2dce5bd6822794346
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
8469
x-xss-protection
0
express_html_inpage_rendering_lib_200_275.js
s0.2mdn.net/879366/ Frame 69CD
106 KB
37 KB
Script
General
Full URL
https://s0.2mdn.net/879366/express_html_inpage_rendering_lib_200_275.js
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adi/N7171.3054164TW_ORGANIC/B26731448.319366990;dc_ver=81.236;sz=300x250;u_sd=1;dc_adk=2228999113;ord=e15s65;click=https%3A%2F%2Fgoogleads.g.doubleclick.net%2Fdbm%2Fclk%3Fsa%3DL%26ai%3DCjbiBC3C8YaWXJNzD7_UPs8mTyAK7i_WaZ-CWgcqWD7_O8_0IEAEg97vHgwFglQLIAQmoAwGqBJICT9DlcQg8r501u4B9hx7Bmnq-DK0Jak7lk669RcCwtDh1NblV2l1Y8fpqkMkgygEZtXksznMENyRSB58_azXe8H5gC-SGx9kWQiQiESzwkN6zK9fjtJ8XW375I6594qhF6hzcJU4I1mrKLSz0GkS4HGWsUedd0u-LVOVDHMvXxPQksSP3ElGr1dcu2oR10dLSzrZEh6BDmylOFoS8x1YYIzuwq7UQU_IN6PSevTODt0Nju5QXOAqcrE4zfVHxWGAia64Z0Xenv1fEQ6OQ2t4PWmWX6sGSdhj74ejbv2QtB_FdztOM_rh0KG4GzM62coud46PhPZaTQJ3XNZPb2sEHKQdCQDPAxskdWapPwOwljgCIjcAEoJDP1fYD4AQDkAYBoAZNgAegzvb6AqgHjs4bqAeT2BuoB-6WsQKoB_6esQKoB9XJG6gHpr4bqAfz0RuoB5bYG6gHqpuxAqgH35-xAtgHANIICQiI4YAQEAEYHYAKA5gLAcgLAYAMAbATrb3UDdATANgTA9gUAdAVAfgWAYAXAQ%26ae%3D1%26num%3D1%26cid%3DCAASFeRojv-AmDjftYpCJQy3V_q7_jBCcw%26sig%3DAOD64_1iQgxtn8cOuH8KEcUE8Kk-gxuxBw%26client%3Dca-pub-8820362605711196%26dbm_c%3DAKAmf-A8fSI75fEvh909rFjOUV7URVdDDnksfplYAcJFNUc8EHXWXV59dnM8zZU222C24ROh-661gVQkpW--fSnXzD71Lc0m87xKwyebohEp5BEP5t2hybsQc_d0uWxGLpGTioTTQXvXg2_3p3cCSCirJbWF6OjjiQ%26cry%3D1%26dbm_d%3DAKAmf-C20cWwuzoID2yJytfQg7xPPIsJm42NKSbBSMpawVeQNNezpF3VXbCPg20nD-mYd8YYtAa4miZKci5dKRH37S164-jX0KT_9Cjh4F_LRxNbboX94rcBjNIowPy-hjt0gSMs_YlvwrQIlNDLmsC76cElYYW0b_Kep5kwUymFvjvPwOY5oaYD1Ycfs0iu8ZDo1EbFH8lC3TMt88ptFOIqIM6eT-V__jqW-2b5hac1DRLB21Mkw11Br326XXxZuZTFIbsFQaGWmQLCxVX-KUJjej-zRdBpeSh7z49Ipc7vHr7dgDy53VkSLogxJQizcFv5dAZK7KfuNElkWBc8CQ1llgIqZcCi-3NqB7v3J0-3pAH2OGKnKuFYSDVjKignYsPAW3XlJkY2GFvKnKkYWJ6-6FySylZKNc5tUq7Z4eqC59FUAkZFsTFAEKJoYyHPKM4P_BPaWK13z7DOKe83vWbyk_K3kZHs1WyKNbmUIBs3rQj8z-h--ZjtyradDVKRPhvnWKy56pa-nT04oQUiCr6oMC6cebPl1wnPLuA5vI_RluM786HV3Apq1ov9DcirgwN-Hc2ff-IMQq2YmOeTaygTRRQms31AtWl0T988Phjb7m6lcpIzZ2A%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter$0;xdt=1;crlt=3x1dtabP_p;sttr=121;prcl=s
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:812::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a23e44d9d02a2a9641a9bd3b47693656054c00b71890aed2fa7fc90151750f73
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://ad.doubleclick.net/
Origin
https://ad.doubleclick.net
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:38:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1882
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37892
x-xss-protection
0
last-modified
Mon, 27 Sep 2021 18:44:52 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=86400
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
expires
Sat, 18 Dec 2021 10:38:42 GMT
UFYwWwmt.js
tpc.googlesyndication.com/sodar/ Frame 69CD
41 KB
15 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/UFYwWwmt.js
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adi/N7171.3054164TW_ORGANIC/B26731448.319366990;dc_ver=81.236;sz=300x250;u_sd=1;dc_adk=2228999113;ord=e15s65;click=https%3A%2F%2Fgoogleads.g.doubleclick.net%2Fdbm%2Fclk%3Fsa%3DL%26ai%3DCjbiBC3C8YaWXJNzD7_UPs8mTyAK7i_WaZ-CWgcqWD7_O8_0IEAEg97vHgwFglQLIAQmoAwGqBJICT9DlcQg8r501u4B9hx7Bmnq-DK0Jak7lk669RcCwtDh1NblV2l1Y8fpqkMkgygEZtXksznMENyRSB58_azXe8H5gC-SGx9kWQiQiESzwkN6zK9fjtJ8XW375I6594qhF6hzcJU4I1mrKLSz0GkS4HGWsUedd0u-LVOVDHMvXxPQksSP3ElGr1dcu2oR10dLSzrZEh6BDmylOFoS8x1YYIzuwq7UQU_IN6PSevTODt0Nju5QXOAqcrE4zfVHxWGAia64Z0Xenv1fEQ6OQ2t4PWmWX6sGSdhj74ejbv2QtB_FdztOM_rh0KG4GzM62coud46PhPZaTQJ3XNZPb2sEHKQdCQDPAxskdWapPwOwljgCIjcAEoJDP1fYD4AQDkAYBoAZNgAegzvb6AqgHjs4bqAeT2BuoB-6WsQKoB_6esQKoB9XJG6gHpr4bqAfz0RuoB5bYG6gHqpuxAqgH35-xAtgHANIICQiI4YAQEAEYHYAKA5gLAcgLAYAMAbATrb3UDdATANgTA9gUAdAVAfgWAYAXAQ%26ae%3D1%26num%3D1%26cid%3DCAASFeRojv-AmDjftYpCJQy3V_q7_jBCcw%26sig%3DAOD64_1iQgxtn8cOuH8KEcUE8Kk-gxuxBw%26client%3Dca-pub-8820362605711196%26dbm_c%3DAKAmf-A8fSI75fEvh909rFjOUV7URVdDDnksfplYAcJFNUc8EHXWXV59dnM8zZU222C24ROh-661gVQkpW--fSnXzD71Lc0m87xKwyebohEp5BEP5t2hybsQc_d0uWxGLpGTioTTQXvXg2_3p3cCSCirJbWF6OjjiQ%26cry%3D1%26dbm_d%3DAKAmf-C20cWwuzoID2yJytfQg7xPPIsJm42NKSbBSMpawVeQNNezpF3VXbCPg20nD-mYd8YYtAa4miZKci5dKRH37S164-jX0KT_9Cjh4F_LRxNbboX94rcBjNIowPy-hjt0gSMs_YlvwrQIlNDLmsC76cElYYW0b_Kep5kwUymFvjvPwOY5oaYD1Ycfs0iu8ZDo1EbFH8lC3TMt88ptFOIqIM6eT-V__jqW-2b5hac1DRLB21Mkw11Br326XXxZuZTFIbsFQaGWmQLCxVX-KUJjej-zRdBpeSh7z49Ipc7vHr7dgDy53VkSLogxJQizcFv5dAZK7KfuNElkWBc8CQ1llgIqZcCi-3NqB7v3J0-3pAH2OGKnKuFYSDVjKignYsPAW3XlJkY2GFvKnKkYWJ6-6FySylZKNc5tUq7Z4eqC59FUAkZFsTFAEKJoYyHPKM4P_BPaWK13z7DOKe83vWbyk_K3kZHs1WyKNbmUIBs3rQj8z-h--ZjtyradDVKRPhvnWKy56pa-nT04oQUiCr6oMC6cebPl1wnPLuA5vI_RluM786HV3Apq1ov9DcirgwN-Hc2ff-IMQq2YmOeTaygTRRQms31AtWl0T988Phjb7m6lcpIzZ2A%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter$0;xdt=1;crlt=3x1dtabP_p;sttr=121;prcl=s
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5056305b09ad6474ea540f796c79be51d6b8e96043cb3d7bc4ef774e56765f4f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://ad.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:51:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1108
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15207
x-xss-protection
0
last-modified
Tue, 03 Mar 2020 20:15:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
vary
Accept-Encoding
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 17 Dec 2022 10:51:36 GMT
skeleton.js
static.adsafeprotected.com/ Frame 6CF1
Redirect Chain
  • https://pixel.adsafeprotected.com/rfw/st/903347/59128494/skeleton.js?ias_dspID=64&adsafe_url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3F...
  • https://static.adsafeprotected.com/skeleton.js
17 B
464 B
Script
General
Full URL
https://static.adsafeprotected.com/skeleton.js
Protocol
H2
Server
2600:9000:223f:200:8:48e:53c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
bdeed1e1c0751610c8f3dc2a5c78c93f841c366b36a7f7a54f5e6752c2656c05

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Wed, 07 Jul 2021 08:35:57 GMT
via
1.1 fb49d852ca52c03c834ce98098b51517.cloudfront.net (CloudFront)
age
14092448
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
x-amz-replication-status
COMPLETED
content-length
17
last-modified
Mon, 17 Aug 2020 23:54:35 GMT
server
AmazonS3
etag
"53fab767ecbd3bf07990b10246befbd4"
x-amz-version-id
nylqTweorRThFHMBJSrf_fHcWx3KVKN3
cache-control
max-age=315360000
x-amz-cf-pop
FRA56-P5
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
nSdMCoq_wLBlW6F4-3LoeshYE3MRfRLw4cV18I8y8_JwGofd4N2Kcg==

Redirect headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
x-server-name
app10.ie.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
location
https://static.adsafeprotected.com/skeleton.js
cache-control
no-cache
content-length
0
server
nginx
sca.17.5.12.js
static.adsafeprotected.com/ Frame 04AD
80 KB
21 KB
Script
General
Full URL
https://static.adsafeprotected.com/sca.17.5.12.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:223f:200:8:48e:53c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
233bc983d773cb9a38ca251753bd43f9a2288279fab44598b49c433b32f6d285

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 01 Oct 2021 08:08:31 GMT
content-encoding
gzip
age
6663694
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
x-amz-replication-status
COMPLETED
last-modified
Thu, 19 Aug 2021 16:31:24 GMT
server
AmazonS3
etag
W/"9304f57298c3834ff107ea7ccb547996"
vary
Accept-Encoding
x-amz-version-id
9YodSBhG3Q8HTUbQ_WDUpcPK09tSZ5ja
via
1.1 fb49d852ca52c03c834ce98098b51517.cloudfront.net (CloudFront)
cache-control
max-age=315360000
x-amz-cf-pop
FRA56-P5
content-type
application/javascript
x-amz-cf-id
zr4DWwrVp64F3BGSZtMW_o7U13aFIG7e27yNQvWuWlVckA16tbZ-xw==
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=247&fi=1&apd=248&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370174589&S1id=22308610192&S2id=22654085702&ord=1639739404635&r=31011698570&t=hdn&os=1&fi2=0&div1=0&ait=123&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=4&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x600&zMoatPS=top&zMoatSZPS=300x600%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2Fs0.2mdn.net%2Fsimgad%2F4217474214653602766&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739404635&de=31011698570&cu=1639739404635&m=9&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2769&le=1&lf=0&lg=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=0&ag=2&an=0&gf=2&gg=0&ix=2&ic=2&ez=1&aj=1&pg=100&pf=0&ib=1&cc=0&bw=2&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=3&cd=0&ah=3&am=0&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370174589&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=600&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DOMSEARCH&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=3&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=40599032&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
visit.js
tps.doubleverify.com/ Frame 9790
2 KB
2 KB
Script
General
Full URL
https://tps.doubleverify.com/visit.js?gdpr=&gdpr_consent=&ttmms=178&ttfrms=23&bridua=3&tstype=2&eparams=DC4FC%3Dl9EEADTbpTauTauHHH%5DK5%3F6E%5D4%40%3ETau2CE%3A4%3D6TauDFDA64E65%5C%3AC2%3F%3A2%3F%5C924%3C6CD%5CE2C86E%5C2%3AC%3D%3A%3F6%5CH%3AE9%5C%3F6H%5C324%3C5%40%40CTauTbuFE%3E0D%40FC46Tbs5%3DGC%5D%3AETaeFE%3E0%3E65%3AF%3ETbsEH%3AEE6CTab7E28Tbs%23%24%2432773egU2%3F4r92%3A%3Fl9EEADTbpTauTauHHH%5DK5%3F6E%5D4%40%3ETar9EEADTbpTauTauHHH%5DK5%3F6E%5D4%40%3E&srcurlD=0&aUrlD=0&ssl=https:&dfs=314&ddur=144&uid=1639739404931121&jsCallback=dvCallback_1639739404931338&dvtagver=6.1.src&navUa=Mozilla%2F5.0%20(Windows%20NT%2010.0%3B%20Win64%3B%20x64)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F96.0.4664.93%20Safari%2F537.36&htmlmsging=1&chro=0&hist=2&winh=1200&winw=1600&wouh=1200&wouw=1600&scah=1200&scaw=1600&dvp_isOnHead=1&jsver=1950&tgjsver=1950&lvvn=28&m1=13&refD=1&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter&fwc=0&fcl=1777&flt=9&fec=953&fcifrms=10&brh=2&sdf=2&dvp_epl=351&noc=4&ctx=3758893&cmp=26699368&sid=5755331&plc=318185658&crt=160251313&btreg=510963286&btadsrv=doubleclick&adsrv=1&advid=9640137&errorURL=https://tps.doubleverify.com/visit.jpg&mib=0&dvp_rcp=2&dvp_htec=2&dvp_seem=2&dvp_tuk=1&dvp_sukv=122606198.87378855&dvp_tukv=40377867010.53198&dvp_uuid=51539156.499758825&dvp_tuid=1381422859440
Requested by
Host: cdn.doubleverify.com
URL: https://cdn.doubleverify.com/dv-measurements1950.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
34.117.228.201 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
201.228.117.34.bc.googleusercontent.com
Software
/
Resource Hash
1c682d5e1f223e292a578fc31eb903d1c8fa7c595d97f14d6b7790c0aa5e6c31

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:10:05 GMT
Cache-Control
max-age=0
Connection
keep-alive
Content-Type
text/javascript
Transfer-Encoding
chunked
Expires
12/16/2021 11:10:05
dt
dt.adsafeprotected.com/
43 B
216 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=129f2999-bf80-c966-27b9-3f48e3d968ae&tv=%7Bc:x3eEyv,pingTime:-2,time:748,type:a,im:%7Bsf:0,pom:1,prf:%7BbdA:5,bdZ:148,beA:308,beZ:309,mfA:944,cmA:945,inA:945,inZ:949,prA:949,prZ:953,si:961,poA:962,poZ:975,cmZ:975,mfZ:975,loA:995,loZ:996,ltA:1055,ltZ:1055%7D%7D,sca:%7Bdfp:%7Bdf:0%7D%7D,env:%7Bgca:false,cca:false,gca2:false%7D,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:652%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:748,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:652,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B109~100%5D,as:%5B109~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:0,fm:sRQDqVh+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C161%7C162%7C163%7C171%7C172%7C181%7C182%7C191%7C1a,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs,slid:%5Bgoogle_ads_iframe_/22309610186/aw-zdnet/technology/security_0,google_ads_iframe_/22309610186/aw-zdnet/technology/security_0__container__,nav-ad-plus-leader%5D,sinceFw:93,readyFired:true%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.84.167.118 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-84-167-118.compute-1.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
x-server-name
dt04.va.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
EnZy1JEvhtfL3qsMHM2VNqoz8zWnsWCdOjk5wdd4Ig4.js
pagead2.googlesyndication.com/bg/ Frame 5EB9
35 KB
13 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/bg/EnZy1JEvhtfL3qsMHM2VNqoz8zWnsWCdOjk5wdd4Ig4.js
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
127672d4912f86d7cbdeab0c1ccd9536aa33f335a7b1609d3a3939c1d778220e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Thu, 16 Dec 2021 15:05:28 GMT
content-encoding
br
x-content-type-options
nosniff
age
72276
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/botguard-scs
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13555
x-xss-protection
0
last-modified
Mon, 06 Dec 2021 19:18:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="botguard-scs"
vary
Accept-Encoding
report-to
{"group":"botguard-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/botguard-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Fri, 16 Dec 2022 15:05:28 GMT
sodar2.js
tpc.googlesyndication.com/sodar/ Frame BF7F
17 KB
6 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
61c32059a5e94075a7ecff678b33907966fc9cfa384daa01aa057f872da14dbb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
etag
"1637097310169751"
vary
Accept-Encoding
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
6386
x-xss-protection
0
expires
Fri, 17 Dec 2021 11:10:04 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=221&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5009920773&L2id=2848205265&L3id=5677026463&L4id=138355023537&S1id=22308610192&S2id=22383746382&ord=1639739404756&r=52034830188&t=hdn&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=&zMoatPT=&zMoatSL=&moatClientSlicer3=0&bedc=1&q=3&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_DISPLAY1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22383746382&bd=undefined&zMoatNotCnet=true&zMoatPT=Not%20Specified&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatPS=Not%20Specified&zMoatSZPS=Not%20Specified&zMoatPTAT=Not%20Specified&zMoatPTATSECT=content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=https%3A%2F%2Ft.co&t=1639739404756&de=52034830188&m=0&ar=cc97a930ec1-clean&iw=101177c&q=23&cb=0&ym=0&cu=1639739404756&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=5009920773%3A2848205265%3A5677026463%3A138355023537&zMoatW=300&zMoatH=250&zMoatMMV_MAX=na&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22383746382&dfp=0%2C1&la=22383746382&gw=redventuresgamdisplay60805146916&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A1121%3A1121%3A2560%3A1112&iq=na&tt=na&tu=&tp=&jk=-1&jm=-1&fs=195926&na=491310410&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:04 GMT
A3sS0H_86Eu8poIaUPJJxUQpsgwPL9Z0aaC7WTcRMFE.js
pagead2.googlesyndication.com/bg/ Frame 85BD
35 KB
13 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/bg/A3sS0H_86Eu8poIaUPJJxUQpsgwPL9Z0aaC7WTcRMFE.js
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
037b12d07ffce84bbca6821a50f249c54429b20c0f2fd67469a0bb5937113051
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:54:44 GMT
content-encoding
br
x-content-type-options
nosniff
age
920
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/botguard-scs
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13610
x-xss-protection
0
last-modified
Mon, 06 Dec 2021 19:18:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="botguard-scs"
vary
Accept-Encoding
report-to
{"group":"botguard-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/botguard-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Sat, 17 Dec 2022 10:54:44 GMT
Enqz_20U.html
tpc.googlesyndication.com/sodar/ Frame 11C5
22 KB
8 KB
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/UFYwWwmt.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
127ab3ff6d14112ae6aa40b68d9d3144748eda08efbc60a48a5be0555cf8622b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://ad.doubleclick.net/

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
timing-allow-origin
*
content-length
8395
date
Fri, 17 Dec 2021 10:51:37 GMT
expires
Sat, 17 Dec 2022 10:51:37 GMT
last-modified
Tue, 03 Mar 2020 20:15:00 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1107
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 69CD
119 KB
36 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: s0.2mdn.net
URL: https://s0.2mdn.net/879366/express_html_inpage_rendering_lib_200_275.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:830::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://ad.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37305
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1638461285297402"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:10:05 GMT
index.html
s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/ Frame E1DA
6 KB
2 KB
Document
General
Full URL
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/index.html
Requested by
Host: s0.2mdn.net
URL: https://s0.2mdn.net/879366/express_html_inpage_rendering_lib_200_275.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:812::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
cf889b22e5baed855c2c880ecf09f6a531bf5fa20bff0a0935ce6eb11504b290
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://ad.doubleclick.net/

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
access-control-allow-origin
*
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-length
2378
date
Fri, 17 Dec 2021 06:29:22 GMT
expires
Sat, 18 Dec 2021 06:29:22 GMT
last-modified
Wed, 03 Nov 2021 19:17:37 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
age
16843
cache-control
public, max-age=86400
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
view
googleads4.g.doubleclick.net/pcs/ Frame 69CD
0
23 B
Ping
General
Full URL
https://googleads4.g.doubleclick.net/pcs/view?xai=AKAOjsuf4HO5LW5tgsNRoz3uDH6LfbNQc9U7ef53BAq4d10H4Od6dUtWRkUQRNlH2XzOvQSzDiz6R9odBR0sV29VKEvo1NCYOmwPY3GX2GBobrBa8cLhV1trqllRTBAM2gTbp5nhXrTRdsTfea3mkWYbPQ&sig=Cg0ArKJSzNyGcIkHGUK8EAE&uach_m=[UACH]&fbs_aeid=[gw_fbsaeid]&urlfix=1&omid=0&rm=1&ctpt=180&cbvp=1&cstd=176&cisv=r20211207.58066&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&adurl=
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adi/N7171.3054164TW_ORGANIC/B26731448.319366990;dc_ver=81.236;sz=300x250;u_sd=1;dc_adk=2228999113;ord=e15s65;click=https%3A%2F%2Fgoogleads.g.doubleclick.net%2Fdbm%2Fclk%3Fsa%3DL%26ai%3DCjbiBC3C8YaWXJNzD7_UPs8mTyAK7i_WaZ-CWgcqWD7_O8_0IEAEg97vHgwFglQLIAQmoAwGqBJICT9DlcQg8r501u4B9hx7Bmnq-DK0Jak7lk669RcCwtDh1NblV2l1Y8fpqkMkgygEZtXksznMENyRSB58_azXe8H5gC-SGx9kWQiQiESzwkN6zK9fjtJ8XW375I6594qhF6hzcJU4I1mrKLSz0GkS4HGWsUedd0u-LVOVDHMvXxPQksSP3ElGr1dcu2oR10dLSzrZEh6BDmylOFoS8x1YYIzuwq7UQU_IN6PSevTODt0Nju5QXOAqcrE4zfVHxWGAia64Z0Xenv1fEQ6OQ2t4PWmWX6sGSdhj74ejbv2QtB_FdztOM_rh0KG4GzM62coud46PhPZaTQJ3XNZPb2sEHKQdCQDPAxskdWapPwOwljgCIjcAEoJDP1fYD4AQDkAYBoAZNgAegzvb6AqgHjs4bqAeT2BuoB-6WsQKoB_6esQKoB9XJG6gHpr4bqAfz0RuoB5bYG6gHqpuxAqgH35-xAtgHANIICQiI4YAQEAEYHYAKA5gLAcgLAYAMAbATrb3UDdATANgTA9gUAdAVAfgWAYAXAQ%26ae%3D1%26num%3D1%26cid%3DCAASFeRojv-AmDjftYpCJQy3V_q7_jBCcw%26sig%3DAOD64_1iQgxtn8cOuH8KEcUE8Kk-gxuxBw%26client%3Dca-pub-8820362605711196%26dbm_c%3DAKAmf-A8fSI75fEvh909rFjOUV7URVdDDnksfplYAcJFNUc8EHXWXV59dnM8zZU222C24ROh-661gVQkpW--fSnXzD71Lc0m87xKwyebohEp5BEP5t2hybsQc_d0uWxGLpGTioTTQXvXg2_3p3cCSCirJbWF6OjjiQ%26cry%3D1%26dbm_d%3DAKAmf-C20cWwuzoID2yJytfQg7xPPIsJm42NKSbBSMpawVeQNNezpF3VXbCPg20nD-mYd8YYtAa4miZKci5dKRH37S164-jX0KT_9Cjh4F_LRxNbboX94rcBjNIowPy-hjt0gSMs_YlvwrQIlNDLmsC76cElYYW0b_Kep5kwUymFvjvPwOY5oaYD1Ycfs0iu8ZDo1EbFH8lC3TMt88ptFOIqIM6eT-V__jqW-2b5hac1DRLB21Mkw11Br326XXxZuZTFIbsFQaGWmQLCxVX-KUJjej-zRdBpeSh7z49Ipc7vHr7dgDy53VkSLogxJQizcFv5dAZK7KfuNElkWBc8CQ1llgIqZcCi-3NqB7v3J0-3pAH2OGKnKuFYSDVjKignYsPAW3XlJkY2GFvKnKkYWJ6-6FySylZKNc5tUq7Z4eqC59FUAkZFsTFAEKJoYyHPKM4P_BPaWK13z7DOKe83vWbyk_K3kZHs1WyKNbmUIBs3rQj8z-h--ZjtyradDVKRPhvnWKy56pa-nT04oQUiCr6oMC6cebPl1wnPLuA5vI_RluM786HV3Apq1ov9DcirgwN-Hc2ff-IMQq2YmOeTaygTRRQms31AtWl0T988Phjb7m6lcpIzZ2A%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter$0;xdt=1;crlt=3x1dtabP_p;sttr=121;prcl=s
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://ad.doubleclick.net/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:05 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22383746382&bd=undefined&zMoatNotCnet=true&zMoatPT=Not%20Specified&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatPS=Not%20Specified&zMoatSZPS=Not%20Specified&zMoatPTAT=Not%20Specified&zMoatPTATSECT=content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F16181266791146063110&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739404756&de=52034830188&cu=1639739404756&m=9&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2769&le=1&lf=0&lg=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=3&cd=0&ah=3&am=0&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5009920773%3A2848205265%3A5677026463%3A138355023537&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22383746382&dfp=0%2C1&la=22383746382&zMoatW=300&zMoatH=250&zMoatMMV_MAX=na&zMoatSlotId=mpu-bottom&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-bottom&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&jk=2&jm=-1&tz=mpu-bottom&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1777810041&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:05 GMT
E=wi
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=1027/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=1027/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=wi
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:05 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
runner.html
tpc.googlesyndication.com/sodar/sodar2/225/ Frame EEAA
13 KB
5 KB
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
55a119c0394f901a8a297e109c17b5e5402689708b999ab10691c16179f32a4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-length
5046
date
Fri, 17 Dec 2021 10:54:44 GMT
expires
Sat, 17 Dec 2022 10:54:44 GMT
last-modified
Mon, 21 Jun 2021 20:47:05 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
921
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
aframe
www.google.com/recaptcha/api2/ Frame 3E0E
783 B
534 B
Document
General
Full URL
https://www.google.com/recaptcha/api2/aframe
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
4839032937e4dbc2eaac84badab0dc710083a31c1be5eaf722d8d8f78e12b0e7
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-BF1YSiAtZb5rvYTpIJSq/Q' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter

Response headers

cross-origin-resource-policy
cross-origin
cross-origin-embedder-policy
require-corp
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
expires
Fri, 17 Dec 2021 11:10:05 GMT
date
Fri, 17 Dec 2021 11:10:05 GMT
cache-control
private, max-age=300
content-type
text/html; charset=utf-8
content-security-policy
script-src 'report-sample' 'nonce-BF1YSiAtZb5rvYTpIJSq/Q' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
512
server
GSE
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
gen_204
pagead2.googlesyndication.com/pagead/
0
20 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=225&t=2&li=gpt_2021120601&jk=3797515782955650&bg=!wMOlw4fNAAZKWFskSlg7ACkAdvg8WoQfr3IKVqGEEGg5GsyamCBjAabDQt-BjIWVlkooWoYgqBpI2QIAAAHEUgAAAC5oAQcKAB5eA_Bzff2H_orM6NHc3vCaOtkqbbPiiTiosyX8Mw2ZAq8sM8yu0rFyHjTBLP0okNbyaGsNJwwXRYp-7xqUJzY2DTnqEmFTT4tejeAJOUejF9Z-Lt3QEXJUiIrgUgK1VTtlnU0_H0DrsxdlxH2cNhRhLGwgMVQgZujtsmJfke468bpevhwWhPRKADFRAzqpOmnNxWNyuh441LviyQqDeXpj401buGhsGNHnJs2f9v_QL_7LeW-PJyP6R5giML4hFLRpII9hSWdqY3cBEXUUvk9Q4fe62qs0ud_hEwlxTv1Lhm1Dl6rBZifwD9wtALg9kE_2fSog3VB1_KalURdE9xWTTTeTi2B_hW1YopsZ6wnOnyrqPAXXVWh5x9g7RSRHv5OIIR0OBpKPPN482VX9aprB4Ovfp6KXb8QtNho1UzFgH7BeCm-S2TO3TZ90xpPm8pML7JwTWbz6V9DehhrTo8nruaOypOAmZ1sPUMnRgfOFIkMP6BGJOq48RbnDzfGZIhvP8sdUXcGDK5keFj5_QV9hKwP78hxrStYqsltulatTIDTU8OoZe3i6335YYW4q1B0VJHarwxJnN1Vz6iLfiurs5O6Wo_SHA0UhQUOsapZ0FMeEEwTe-d3C8ATk67UIdmsUY4xLqVgnENmY7YBjDBzX9UXdrbO2xovNBU4fgPcc_5kLtQukIQSSVNxRUzeAkgooRZdfa1jPPd3dTlKcv4WfmGA0Okp2DoviD6KKqRjUd3Emwyc963rCtvptFaMiVSOyR3Tvo4gF-pY-1cXdL4pqiDmvF1E6WVA4qgrS1KfmKPkiRjvi7_usQEHsPLJaEVl5BeKOrugryJpmVvGZQMruzHoCjylAdqAwWdcrljBbbVhL9GEQfc5eq6wPqqJSFKwheSLcUQ1n0Zc-eTqKdBr7p7CleGx4UrwSwGmzNCuftoEz9QH2OJRBjOBg90txe9Y
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
zdnet+880e080a-7301-4a4b-a4e7-def615879cd5.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
1 MB
1 MB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+880e080a-7301-4a4b-a4e7-def615879cd5.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/a/fly/046431-fly/js/main.default.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
a6d814cd452c142099d23b1952b1f8f30a2f6c26b5c544a6d4c941ad387087bf

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:05 GMT
via
1.1 varnish, 1.1 varnish
age
572
x-guploader-uploadid
ADPycductNKyjzM5snz0RAqtEWMvqJSDBpZKSaZaAWMIHoKcLZVRj8WogMiEQSmvRCWAbbotNYv_MfQnJj7Dmr03GtI_sP_cVA
x-cache
HIT, HIT
x-goog-storage-class
REGIONAL
x-cache-hits
1, 1
content-length
1333834
x-served-by
cache-chi21175-CHI, cache-fra19177-FRA
last-modified
Thu, 12 Aug 2021 15:40:10 GMT
server
UploadServer
x-timer
S1639739405.161811,VS0,VE0
etag
"55fe6fa99fded7919ef98197501793e3"
x-goog-hash
crc32c=IPIV8Q==, md5=Vf5vqZ/e15Ge+YGXUBeT4w==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:00:33 GMT
createjs.min.js
code.createjs.com/1.0.0/ Frame E1DA
236 KB
63 KB
Script
General
Full URL
https://code.createjs.com/1.0.0/createjs.min.js
Requested by
Host: s0.2mdn.net
URL: https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/index.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00::210:ba1a Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Apache /
Resource Hash
e439bebf8de2df0582273906d2c1dceff2387c661efb2152ef1c28420ce4e7e5

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://s0.2mdn.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:05 GMT
content-encoding
gzip
server
Apache
cache-control
max-age=900
vary
Accept-Encoding
content-type
text/javascript
x-n
S
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:25:05 GMT
mandiant_constant_300x250.js
s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/ Frame E1DA
79 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/mandiant_constant_300x250.js
Requested by
Host: s0.2mdn.net
URL: https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/index.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:812::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47152db1f38aa49b1b67a174e8978966ad5949fdbb608dda81a19d043a2c857
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/index.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Thu, 16 Dec 2021 11:18:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
85893
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
10161
x-xss-protection
0
last-modified
Wed, 03 Nov 2021 19:17:37 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-type
text/javascript
access-control-allow-origin
*
cache-control
public, max-age=86400
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
expires
Fri, 17 Dec 2021 11:18:32 GMT
A3sS0H_86Eu8poIaUPJJxUQpsgwPL9Z0aaC7WTcRMFE.js
pagead2.googlesyndication.com/bg/ Frame 11C5
35 KB
13 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/bg/A3sS0H_86Eu8poIaUPJJxUQpsgwPL9Z0aaC7WTcRMFE.js
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
037b12d07ffce84bbca6821a50f249c54429b20c0f2fd67469a0bb5937113051
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:54:44 GMT
content-encoding
br
x-content-type-options
nosniff
age
921
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/botguard-scs
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13610
x-xss-protection
0
last-modified
Mon, 06 Dec 2021 19:18:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="botguard-scs"
vary
Accept-Encoding
report-to
{"group":"botguard-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/botguard-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Sat, 17 Dec 2022 10:54:44 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 6CF1
42 B
64 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstD57_kOY0EVUvAemJPdh2GN3BQHVnNmPXPnDf8yNlktH_ljIeGObdi9wZrs64tE9afBMaVDPH7Zva_yIcMS3lpU6OuCvlanqZWpOjv4cqDfDsXZx9C&sig=Cg0ArKJSzPQID5kfl8neEAE&id=lidar2&mcvt=1015&p=0,0,105,1600&mtos=1015,1015,1015,1015,1015&tos=1015,0,0,0,0&v=20211202&bin=7&avms=nio&bs=1600,1200&mc=1&app=0&itpl=19&adk=3529097836&rs=4&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&vs=4&r=v&rst=1639739403900&rpt=291&isd=0&lsd=0&met=mue&wmsd=0
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
zdnet+40984316-75d4-4890-a717-84a4ec3a088a.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
1 MB
1 MB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+40984316-75d4-4890-a717-84a4ec3a088a.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/a/fly/046431-fly/js/main.default.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
753c21d87b2659d7ba709cf0b4b8824aeabe2405359821565daca11041b484bb

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:05 GMT
via
1.1 varnish, 1.1 varnish
age
1
x-guploader-uploadid
ADPycdsXJ7BYrdsqi2NWTHxViMAVJiIkATQG27zdm0VTDTHVN-OVH00YNUYmWM0H-GNWS0s8fJDA6R5Tp8zhhuUL2zSPnCitXA
x-cache
MISS, HIT
x-goog-storage-class
REGIONAL
x-cache-hits
0, 1
content-length
1164965
x-served-by
cache-chi21183-CHI, cache-fra19177-FRA
last-modified
Mon, 06 Dec 2021 19:58:18 GMT
server
UploadServer
x-timer
S1639739405.245952,VS0,VE0
etag
"09b9e61e214d49899600a60821de1fd6"
x-goog-hash
crc32c=FMrjMQ==, md5=CbnmHiFNSYmWAKYIId4f1g==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:10:04 GMT
zdnet+480b69f4-89a3-4338-85c7-a898aef5bd51.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
957 KB
958 KB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+480b69f4-89a3-4338-85c7-a898aef5bd51.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/a/fly/046431-fly/js/main.default.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
7a4107595add66138757d4890ca96318b0636ef631914bc992c3489e905479c9

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:05 GMT
via
1.1 varnish, 1.1 varnish
age
1541
x-guploader-uploadid
ADPycdsYjBIKXUMzvBuKKP9xC6iHM_0xmU311WtUO5-sp_7oP0mCTa27pu_EuZiiEMaePPhMNoLey5y9HpNQnud7Cgn-LSOrEg
x-cache
HIT, HIT
x-goog-storage-class
REGIONAL
x-cache-hits
1, 2
content-length
979820
x-served-by
cache-chi21176-CHI, cache-fra19177-FRA
last-modified
Sat, 04 Sep 2021 11:00:18 GMT
server
UploadServer
x-timer
S1639739405.253212,VS0,VE0
etag
"8246313e0558adfc79e2fb0953fa6691"
x-goog-hash
crc32c=EfNJ8g==, md5=gkYxPgVYrfx54vsJU/pmkQ==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 10:44:24 GMT
sodar
pagead2.googlesyndication.com/pagead/ Frame 3E0E
0
0
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/sodar?id=sodar2&v=225&li=gpt_2021120601&jk=1496279916739184&rc=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.google.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=129f2999-bf80-c966-27b9-3f48e3d968ae&tv=%7Bc:x3eEE6,pingTime:-10,time:1095,type:s,mvn:ZnNjPTEyLHNkPTMsbm89OCxhc3A9MQ--,sd:MTcuNS4xMnYxMjAwfHwxNjAwfHwxfHwxfHwyNHx8MTIwMHx8MHx8MHx8MXx8bGFuZHNjYXBlLXByaW1hcnl8fDI0fHw0LzN8fDQvM3x8MHx8MTYwMA--,no:MTcuNS4xMnZNb3ppbGxhfHxOZXRzY2FwZXx8bnx8bnx8MHx8bnx8TGludXggeDg2XzY0fHxHZWNrb3x8MjAwMzAxMDd8fDB8fE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IFdpbjY0OyB4NjQpIEFwcGxlV2ViS2l0LzUzNy4zNiAoS0hUTUwsIGxpa2UgR2Vja28pIENocm9tZS85Ni4wLjQ2NjQuOTMgU2FmYXJpLzUzNy4zNnx8MXx8MXx8R29vZ2xlIEluYy58fG4-,ch:n,fsc:17.5.12v220002022000220000022002220000022220200000222200022220002022022022222202002220222022222022222000220200000022220222220222222222222202222222222222222222222222222222222222200000022022020020000002022202022022022222222000000000020222202022022222000000020000000000000000000020220202220000022200222202220022200200222022202220022202220020222202000220000222202222202222000002002002222222202220022202200022002220222202,asp:1639739405301%7C%7Cbc70b0b06b7f3ddbf3357c63a273a781%7C%7Ca2fdad25d911a8a4b39828759d282361%7C%7Cefb599c9ecdf5c95cda0ad928a4299c8%7C%7Cf14d987ebbe0d163bbfe1cc5171751da%7C%7Cb3305296fb89f7eb571c61e170f3522e%7C%7C74ee0d9a50de416d287e1f309bb66cfd%7C%7Cabd495ca4c2e28d49da1e3d1c2dab38e%7C%7C1629390669,im:%7Bimprf:%7Bttecl:1139,ecd:32,tsecr:34%7D%7D%7D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.84.167.118 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-84-167-118.compute-1.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
x-server-name
dt14.va.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
zdnet+9ace91bb-15e2-4b5f-90dc-a721785f2af9.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
3 MB
3 MB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+9ace91bb-15e2-4b5f-90dc-a721785f2af9.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/a/fly/046431-fly/js/main.default.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
ee4fc478db1bf8c0b0746a3a07cef506a0b51d5db65d5b0aab3a1dbe1610dedd

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:05 GMT
via
1.1 varnish, 1.1 varnish
age
390
x-guploader-uploadid
ADPycdsHufSY-Pg_5Vo-IVA_jiuZ25qFK0LYO2Plv9GkE-HFAvU6t4cUuKRBf4okCI_FaOlhCnmWtd8JgFUTVqL0k5s5yWlSpA
x-cache
HIT, HIT
x-goog-storage-class
REGIONAL
x-cache-hits
4, 2
content-length
3334969
x-served-by
cache-chi21146-CHI, cache-fra19177-FRA
last-modified
Tue, 21 Sep 2021 12:15:16 GMT
server
UploadServer
x-timer
S1639739405.384546,VS0,VE0
etag
"8cb626914b1b2008f701245e62b97271"
x-goog-hash
crc32c=AF6arw==, md5=jLYmkUsbIAj3ASReYrlycQ==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:03:34 GMT
EnZy1JEvhtfL3qsMHM2VNqoz8zWnsWCdOjk5wdd4Ig4.js
pagead2.googlesyndication.com/bg/ Frame EEAA
35 KB
13 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/bg/EnZy1JEvhtfL3qsMHM2VNqoz8zWnsWCdOjk5wdd4Ig4.js
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
127672d4912f86d7cbdeab0c1ccd9536aa33f335a7b1609d3a3939c1d778220e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Thu, 16 Dec 2021 15:05:28 GMT
content-encoding
br
x-content-type-options
nosniff
age
72277
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/botguard-scs
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13555
x-xss-protection
0
last-modified
Mon, 06 Dec 2021 19:18:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="botguard-scs"
vary
Accept-Encoding
report-to
{"group":"botguard-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/botguard-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Fri, 16 Dec 2022 15:05:28 GMT
zdnet+4c59176c-e92f-43bb-b3d8-cc361201fcb0.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
793 KB
794 KB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+4c59176c-e92f-43bb-b3d8-cc361201fcb0.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/a/fly/046431-fly/js/main.default.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
c54ead22625ab058445b4b9c02536227625f0de2e435fd143b1092e7f5c72a13

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:05 GMT
via
1.1 varnish, 1.1 varnish
age
816
x-guploader-uploadid
ADPycdskXUrkldSITDZklGmE21x-CsaRObLe-CfZwVceQ4vkOzVNHrfg9-ksague79o8RhHzPbqGrWCa0cRDYxGMxlDE0O5CiA
x-cache
HIT, HIT
x-goog-storage-class
REGIONAL
x-cache-hits
1, 2
content-length
811981
x-served-by
cache-chi21153-CHI, cache-fra19177-FRA
last-modified
Thu, 09 Dec 2021 14:53:15 GMT
server
UploadServer
x-timer
S1639739405.494807,VS0,VE0
etag
"4c7a4650a0587e94f5278441a1589d2a"
x-goog-hash
crc32c=IZxjqw==, md5=THpGUKBYfpT1J4RBoVidKg==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 10:56:29 GMT
man_constant_300_copy1.png
s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/ Frame E1DA
4 KB
4 KB
Image
General
Full URL
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/man_constant_300_copy1.png
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adi/N7171.3054164TW_ORGANIC/B26731448.319366990;dc_ver=81.236;sz=300x250;u_sd=1;dc_adk=2228999113;ord=e15s65;click=https%3A%2F%2Fgoogleads.g.doubleclick.net%2Fdbm%2Fclk%3Fsa%3DL%26ai%3DCjbiBC3C8YaWXJNzD7_UPs8mTyAK7i_WaZ-CWgcqWD7_O8_0IEAEg97vHgwFglQLIAQmoAwGqBJICT9DlcQg8r501u4B9hx7Bmnq-DK0Jak7lk669RcCwtDh1NblV2l1Y8fpqkMkgygEZtXksznMENyRSB58_azXe8H5gC-SGx9kWQiQiESzwkN6zK9fjtJ8XW375I6594qhF6hzcJU4I1mrKLSz0GkS4HGWsUedd0u-LVOVDHMvXxPQksSP3ElGr1dcu2oR10dLSzrZEh6BDmylOFoS8x1YYIzuwq7UQU_IN6PSevTODt0Nju5QXOAqcrE4zfVHxWGAia64Z0Xenv1fEQ6OQ2t4PWmWX6sGSdhj74ejbv2QtB_FdztOM_rh0KG4GzM62coud46PhPZaTQJ3XNZPb2sEHKQdCQDPAxskdWapPwOwljgCIjcAEoJDP1fYD4AQDkAYBoAZNgAegzvb6AqgHjs4bqAeT2BuoB-6WsQKoB_6esQKoB9XJG6gHpr4bqAfz0RuoB5bYG6gHqpuxAqgH35-xAtgHANIICQiI4YAQEAEYHYAKA5gLAcgLAYAMAbATrb3UDdATANgTA9gUAdAVAfgWAYAXAQ%26ae%3D1%26num%3D1%26cid%3DCAASFeRojv-AmDjftYpCJQy3V_q7_jBCcw%26sig%3DAOD64_1iQgxtn8cOuH8KEcUE8Kk-gxuxBw%26client%3Dca-pub-8820362605711196%26dbm_c%3DAKAmf-A8fSI75fEvh909rFjOUV7URVdDDnksfplYAcJFNUc8EHXWXV59dnM8zZU222C24ROh-661gVQkpW--fSnXzD71Lc0m87xKwyebohEp5BEP5t2hybsQc_d0uWxGLpGTioTTQXvXg2_3p3cCSCirJbWF6OjjiQ%26cry%3D1%26dbm_d%3DAKAmf-C20cWwuzoID2yJytfQg7xPPIsJm42NKSbBSMpawVeQNNezpF3VXbCPg20nD-mYd8YYtAa4miZKci5dKRH37S164-jX0KT_9Cjh4F_LRxNbboX94rcBjNIowPy-hjt0gSMs_YlvwrQIlNDLmsC76cElYYW0b_Kep5kwUymFvjvPwOY5oaYD1Ycfs0iu8ZDo1EbFH8lC3TMt88ptFOIqIM6eT-V__jqW-2b5hac1DRLB21Mkw11Br326XXxZuZTFIbsFQaGWmQLCxVX-KUJjej-zRdBpeSh7z49Ipc7vHr7dgDy53VkSLogxJQizcFv5dAZK7KfuNElkWBc8CQ1llgIqZcCi-3NqB7v3J0-3pAH2OGKnKuFYSDVjKignYsPAW3XlJkY2GFvKnKkYWJ6-6FySylZKNc5tUq7Z4eqC59FUAkZFsTFAEKJoYyHPKM4P_BPaWK13z7DOKe83vWbyk_K3kZHs1WyKNbmUIBs3rQj8z-h--ZjtyradDVKRPhvnWKy56pa-nT04oQUiCr6oMC6cebPl1wnPLuA5vI_RluM786HV3Apq1ov9DcirgwN-Hc2ff-IMQq2YmOeTaygTRRQms31AtWl0T988Phjb7m6lcpIzZ2A%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter$0;xdt=1;crlt=3x1dtabP_p;sttr=121;prcl=s
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:812::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7952a62cdab4b5901f6bf7e09d005733444cd3881164bba62577c64c79eda330
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/index.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 05:30:21 GMT
x-content-type-options
nosniff
age
20384
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
3908
x-xss-protection
0
last-modified
Wed, 03 Nov 2021 19:17:37 GMT
server
sffe
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=86400
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
expires
Sat, 18 Dec 2021 05:30:21 GMT
view
googleads4.g.doubleclick.net/pcs/ Frame 69CD
0
23 B
Ping
General
Full URL
https://googleads4.g.doubleclick.net/pcs/view?xai=AKAOjsuf4HO5LW5tgsNRoz3uDH6LfbNQc9U7ef53BAq4d10H4Od6dUtWRkUQRNlH2XzOvQSzDiz6R9odBR0sV29VKEvo1NCYOmwPY3GX2GBobrBa8cLhV1trqllRTBAM2gTbp5nhXrTRdsTfea3mkWYbPQ&sig=Cg0ArKJSzNyGcIkHGUK8EAE&uach_m=[UACH]&fbs_aeid=[gw_fbsaeid]&urlfix=1&omid=0&rm=1&ctpt=670&vt=11&dtpt=490&dett=3&cstd=176&cisv=r20211207.58066&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&adurl=
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adi/N7171.3054164TW_ORGANIC/B26731448.319366990;dc_ver=81.236;sz=300x250;u_sd=1;dc_adk=2228999113;ord=e15s65;click=https%3A%2F%2Fgoogleads.g.doubleclick.net%2Fdbm%2Fclk%3Fsa%3DL%26ai%3DCjbiBC3C8YaWXJNzD7_UPs8mTyAK7i_WaZ-CWgcqWD7_O8_0IEAEg97vHgwFglQLIAQmoAwGqBJICT9DlcQg8r501u4B9hx7Bmnq-DK0Jak7lk669RcCwtDh1NblV2l1Y8fpqkMkgygEZtXksznMENyRSB58_azXe8H5gC-SGx9kWQiQiESzwkN6zK9fjtJ8XW375I6594qhF6hzcJU4I1mrKLSz0GkS4HGWsUedd0u-LVOVDHMvXxPQksSP3ElGr1dcu2oR10dLSzrZEh6BDmylOFoS8x1YYIzuwq7UQU_IN6PSevTODt0Nju5QXOAqcrE4zfVHxWGAia64Z0Xenv1fEQ6OQ2t4PWmWX6sGSdhj74ejbv2QtB_FdztOM_rh0KG4GzM62coud46PhPZaTQJ3XNZPb2sEHKQdCQDPAxskdWapPwOwljgCIjcAEoJDP1fYD4AQDkAYBoAZNgAegzvb6AqgHjs4bqAeT2BuoB-6WsQKoB_6esQKoB9XJG6gHpr4bqAfz0RuoB5bYG6gHqpuxAqgH35-xAtgHANIICQiI4YAQEAEYHYAKA5gLAcgLAYAMAbATrb3UDdATANgTA9gUAdAVAfgWAYAXAQ%26ae%3D1%26num%3D1%26cid%3DCAASFeRojv-AmDjftYpCJQy3V_q7_jBCcw%26sig%3DAOD64_1iQgxtn8cOuH8KEcUE8Kk-gxuxBw%26client%3Dca-pub-8820362605711196%26dbm_c%3DAKAmf-A8fSI75fEvh909rFjOUV7URVdDDnksfplYAcJFNUc8EHXWXV59dnM8zZU222C24ROh-661gVQkpW--fSnXzD71Lc0m87xKwyebohEp5BEP5t2hybsQc_d0uWxGLpGTioTTQXvXg2_3p3cCSCirJbWF6OjjiQ%26cry%3D1%26dbm_d%3DAKAmf-C20cWwuzoID2yJytfQg7xPPIsJm42NKSbBSMpawVeQNNezpF3VXbCPg20nD-mYd8YYtAa4miZKci5dKRH37S164-jX0KT_9Cjh4F_LRxNbboX94rcBjNIowPy-hjt0gSMs_YlvwrQIlNDLmsC76cElYYW0b_Kep5kwUymFvjvPwOY5oaYD1Ycfs0iu8ZDo1EbFH8lC3TMt88ptFOIqIM6eT-V__jqW-2b5hac1DRLB21Mkw11Br326XXxZuZTFIbsFQaGWmQLCxVX-KUJjej-zRdBpeSh7z49Ipc7vHr7dgDy53VkSLogxJQizcFv5dAZK7KfuNElkWBc8CQ1llgIqZcCi-3NqB7v3J0-3pAH2OGKnKuFYSDVjKignYsPAW3XlJkY2GFvKnKkYWJ6-6FySylZKNc5tUq7Z4eqC59FUAkZFsTFAEKJoYyHPKM4P_BPaWK13z7DOKe83vWbyk_K3kZHs1WyKNbmUIBs3rQj8z-h--ZjtyradDVKRPhvnWKy56pa-nT04oQUiCr6oMC6cebPl1wnPLuA5vI_RluM786HV3Apq1ov9DcirgwN-Hc2ff-IMQq2YmOeTaygTRRQms31AtWl0T988Phjb7m6lcpIzZ2A%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter$0;xdt=1;crlt=3x1dtabP_p;sttr=121;prcl=s
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://ad.doubleclick.net/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:10:05 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
man_constant_300_copy2.png
s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/ Frame E1DA
5 KB
5 KB
Image
General
Full URL
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/man_constant_300_copy2.png
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:812::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
514c85fb6ec85c9db16d9033431268d6c8b76f728848ecfd2d53c5b0f3c9fa32
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/index.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Thu, 16 Dec 2021 15:55:29 GMT
x-content-type-options
nosniff
age
69276
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5298
x-xss-protection
0
last-modified
Wed, 03 Nov 2021 19:17:37 GMT
server
sffe
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=86400
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
expires
Fri, 17 Dec 2021 15:55:29 GMT
gen_204
pagead2.googlesyndication.com/pagead/ Frame 5EB9
0
20 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar&v=30&t=2&bgai=B0920DHC8YfrFFZCmgAeO26D4CQAAAAA4AeAEAg&bg=!OTqlOn7NAAZKWFskSlg7ACkAdvg8WvW1rHzDk7me5R98hCqVK_Dn3FKsdcQuazqR5uVsj6FidPRJ4QIAAAGiUgAAAD5oAQeZAu0Ehc3ptqo-3wbfoaMMXWBj1fdyczfQtLx9aIWN0VvbtW9eaRV5rjaavlXbd3m9UUJHAHxOUJX7lXPh54RtiIxLMLkYb_Hcd0Pa4tlBekELZ3D-oBYq7bwaSsyelsTflKzIw80QfwQjADQzo52P3rip_MgrHP8E-STbfRRhw-EZzvJz7JcWVaUJz-Z3XQfdzB9fjrZVpX7FOK3pGQ2_eeD5n9n9SkTbJHLjM8jxX2Ocnop9I_HEbOirOAMJyfizEPXJIyZcnPXzfPkQfKoCIoey-L3PZztRs7yhw18n7Tip0Siwnm-T96oymQ6uK5LZnVl1Dfeo1pl_Y-V_8kRbkwtke9PdCRe7X-yISUErfdqNYSzDZ9-eyjO6OhksZ86GvZJ7YOOav33VPQIzQGs7rjwdfPVb2skCwI51Etme5ZnWVsjtRqSTPyiyA90kzdMcaMXtjcppiJzyNYFkGtTj0Je5n6dFN7asHPG17L1UsUo-scw9E4AAOCB6E8KyYbFiMopxRreXRKMFCwHB8K82taJQxwauxI3S0C5eiW4AwsFywdYrZNpI9Vdvaxr3rgEC2tprKsAOURKpP2jm3MN6LnZb4rHQejKp9GnjixUURvj8rstySJazcf7NjIT_67m169rE6fYRFCRCmjN8TGf79tmP42OG12vGRbs9ShYPLGRUzR4_9m6XSt3OMQg7MY3o8u1m0mp3UdoOV1dfOK5dhPIwzhqVI-P2Hwi058rNby9COp48zf2Yo7ADq0Lf_mHbUshdTSvrS0DpprDHrf5lZqNFqsJV8ZZ_mUIhINE5yfmcJO_o_wSLNTm5dEq_u10TnQAR2TPucUPAzDUOcgShyGNFjgs3oY5TM0sNsmW1x2T5gUaZOxK2uhxs9eFHvNSu1UsfVpxtXFFY7HvZNVXDSpY2Xx7iMNRVxwGzkPP5YEoYWAYFF4TuATnL_D-PFBQhmf91XGHv8RreW8mXCqRiyADs8c4P9STbMNaN6MKdAg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
gen_204
pagead2.googlesyndication.com/pagead/ Frame 85BD
0
20 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar&v=30&t=2&bgai=BPdcDDHC8Ya_XFfeCx_APwNakwA4AAAAAOAHgBAI&bg=!qaqlqu7NAAZKWFskSlg7ACkAdvg8Wn-bwwJJiifrbqVEoB_AR2kSEncQ9_NkNglJDMVh4KbSHCy_cgIAAAF9UgAAAD9oAQeZAs_h5wa749M1VLJVvKxzmo-Ib2QiPR4-PMS5TqBHwvJIo-3nMHu8PV1hDxU2CWoqg0LcbFo8mfrHZUXR7tMa7-nKdMl4nto9Zynv42C9A7eEewlKXW1flontFq3DP1gnrgNZkr2wq195aR5EiDplglsDC3SCPknQ7VSF73Qnm9mx7-Wamvj5sYHiZhDHopyKrIeluCT4Z9V3r5pNXXw8Ow_Q_aS9IQz7Wa26trFUDjS5ZXlLAmJPh2r378em2fhgnwZuhrV0Wlsj2hZDx1S0U1sj2r5_Z-Yd8T3wv9EVvyrvRBMhIM4LpWgvL2zlpjnbn8Bte0wXKsBbf-MbRaYjcKbXxap9YldJd6X_ADoPF9qyCjlMWhFSjo16BCBgTKJzr35w457YNjzceXu7zqNv62vTOdeGjoWmR4k-XNUr1I7Uiv04QkgJsPnleYjhtCYJKr_DiukMCe-1wBsX6Fk7yahy1N_6nUyGjv7jkGZ4xYwygTY5gM8vLBLQHorVR3Rum6dQtKTeV8rdRmteGoEClCWDeRGVfs9elrJTNQP9_pLtAqJkXM9sAr7H6p2pnwV21O9g62YlSKG-_UDQivLbpWPq3-uMrYRgAnpfzVAfiipCgCNdbYancrmjl0qt1bRgsJ5gTIv003pvI8REvwcxg_4rkAzHembpu7DF9pRkWNeDdS50QnBMw_04OI5tOi_fLChxGuSzivV4EqqrKcSaFk6t29IWmHtuXkbdfrKN-9dI7sbchzfJvPuZ_b_UxOQUGOQLuDb5wo55ToieKcCSiVrFnSvq1B73Q9_hWSz_n48VHS_3kSANKm6u3wDX5xjDhC6iKHDuQRNDhHiyk9jqaDWeUIu0lcc78ZgkDVHUdw3TKTLt9P8TNS8gstLFb8yQyLjCPXManyPN_jXjYhtO30sDlQoSD6O6RVbIV-KoP7KDsK8qWsLeovDZmaiqLIRg1A
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
man_constant_300_copy3.png
s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/ Frame E1DA
5 KB
5 KB
Image
General
Full URL
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/man_constant_300_copy3.png
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:812::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c02ba998a75a95e190a308da3478a6e45c938afa8cdd26448545f18e1634620c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/index.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 05:30:22 GMT
x-content-type-options
nosniff
age
20383
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4669
x-xss-protection
0
last-modified
Wed, 03 Nov 2021 19:17:37 GMT
server
sffe
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=86400
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
expires
Sat, 18 Dec 2021 05:30:22 GMT
zdnet+21454e45-531c-4224-902a-fd96a695fa5a.png
media-mtml.mt.rvapps.io/image-assets/zdnet/
2 MB
2 MB
Image
General
Full URL
https://media-mtml.mt.rvapps.io/image-assets/zdnet/zdnet+21454e45-531c-4224-902a-fd96a695fa5a.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/a/fly/046431-fly/js/main.default.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4d::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
UploadServer /
Resource Hash
baac2823513825af0f6a94984c6f77811a95c0728f7d240a201b55ef78985c41

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:05 GMT
via
1.1 varnish, 1.1 varnish
age
690
x-guploader-uploadid
ADPycdtqFafPYqaG3o7tiICvBpPFHgQTBGPC-MUqS4H9UpFeCQQsSp1D3oq_hb9otNuqoMFt9NxOCv4yv9XHJ6RLJq3efyD7Hw
x-cache
HIT, HIT
x-goog-storage-class
REGIONAL
x-cache-hits
2, 2
content-length
1869081
x-served-by
cache-chi21158-CHI, cache-fra19177-FRA
last-modified
Thu, 09 Dec 2021 15:58:14 GMT
server
UploadServer
x-timer
S1639739406.648722,VS0,VE0
etag
"ad6148f3c408948c3d9c305fb974c8c2"
x-goog-hash
crc32c=RFtBeQ==, md5=rWFI88QIlIw9nDBfuXTIwg==
content-type
image/png
cache-control
private, max-age=0
accept-ranges
bytes
expires
Fri, 17 Dec 2021 10:58:35 GMT
man_names_300_bg.jpg
s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/ Frame E1DA
19 KB
19 KB
Image
General
Full URL
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/man_names_300_bg.jpg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:812::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6eb04f751aab4e62a200d88992d98315a4c3a7294ec4c3080373b17f98eca471
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/index.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 05:30:22 GMT
x-content-type-options
nosniff
age
20383
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18996
x-xss-protection
0
last-modified
Wed, 03 Nov 2021 19:17:37 GMT
server
sffe
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=86400
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
expires
Sat, 18 Dec 2021 05:30:22 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739404013&de=110680706678&cu=1639739404013&m=1651&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2748&le=1&lf=0&lg=1&lh=9&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=1&ag=1107&an=31&gi=1&gf=1107&gg=31&ix=1107&ic=1107&ez=1&ck=1107&kw=927&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1107&bx=31&ci=1107&jz=927&dj=1&aa=0&ad=980&cn=0&gk=980&gl=0&ik=980&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=927&cd=61&ah=927&am=61&xd=00&rf=0&re=1&ft=980&fv=0&fw=980&wb=1&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=986079025&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:05 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=927&tet=1107&fi=1&apd=1137&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739404013&r=110680706678&t=iv&os=1&fi2=0&div1=1&ait=980&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=5&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:05 GMT
gen_204
pagead2.googlesyndication.com/pagead/ Frame 11C5
0
20 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar&v=30&t=2&bgai=BrTHbDHC8Yb3_IveCx_APwNakwA4AAAAAOAHgBAI&bg=!r6ylrOjNAAZKWFskSlg7ACkAdvg8Wn8t0oTANKU9FsxRePIXwwUJNNSsd1C2VaYfXtuDYRMM3Fls2AIAAAEzUgAAABhoAQeZAyTrs2oIBpWbMUK42fN9m8CY96lwopZRT4Q4V_s51hwfnI4xP-kCPV_SAHTSlPbo6RMLzOTKbNBIUkp7Pxbr_RErT-EeSpO-FGiOeBhkcSQRg_VWOLdxX5wOL0Lh8pkhk-lOC3SOAQa1S2AKhbYiX-1p9UA6OqucdO39EmZDoTPVX42dMpieRhPmT1kWhpo8nzbh4UTJROmV6rmJoKigG9K6bXlroxkC67Q4RhIE2PClFIvk3NlPs8GQcwCTwxk-TA4oyKLGtO0_L1fv5y5qQO7CVZmr0sFtXvQILrpNMqjvkMEbEaZUaW9nzQzwmGRgpbrF5XhXoj8WdjrDjVpPkaQVPJW8dOy01jNSkMPsYg0ViGyjoBrmeOT8oNUP5TWEaz7uQ1zlJclPnH0kBPZaOQshf2cfqOexuer5bDPCYgjvZ_PHyOnlB-hdgJgACZArRmgrUNFwSdEghqz-fBermlbfVmDB-2W8qaKVtc2HjoW3kTbcuWL_19d13tX6AlQZA8T2SQX07vUG18ooI-5HAOTXFEPNDN1MMraNc6_wZHBR6j-sBHMsr3y5u14b8Fu9DRcSaq2Mtw6sNVUTQX51dq0xOPz2V-VszwM8j3_N8jx6pSuIsE_mDUbLnX8R1qIpkZWTlNtAtHFSExYF2S9X-Oqdb_ok_lTvn2L0PLi0rF9ykwqJ1qLzciTy74vRXEFlHdwmPSUe0XkXkn1cfk6AfI9qVGxFRly4MsWd3NDEq4dnZw69XINTDh-GclkMmk2PSb7e-FhC3iRB0xvKHDE4BFrg6ShMOFiGvpd8c5-FnedGrD-ZGl0rpYExoqFvBHm01F_OLVIjo73A_sgUbac76KYxIKC35yTHN0_u5vzuiI_M7NVmRlbrf4anDPRkOiu4FJH-HHc1sj0aD2DnvxXrSKWoepRM0Xc0430bp6-N_--TGmd9Y7Bk7bUjdLizf9vUTg3XvfEZH4S34OE2VEeCH6EFz-3O8Y6RgZ3JtkGbs0UMHXFaPsHOnYD3L09OYiuqcl0VndA9H5tOTDN8WAI81GdjqtsWK6fNjCelAwJGgP9eNqr5XcA
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
man_names_300_cta_bg.png
s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/ Frame E1DA
491 B
515 B
Image
General
Full URL
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/man_names_300_cta_bg.png
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:812::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
af5e974a4a92ca31767207a220ec95b2e4a482c1cfcd12e184c49c6a416b535c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/index.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Thu, 16 Dec 2021 11:29:30 GMT
x-content-type-options
nosniff
age
85235
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
491
x-xss-protection
0
last-modified
Wed, 03 Nov 2021 19:17:37 GMT
server
sffe
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=86400
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
expires
Fri, 17 Dec 2021 11:29:30 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739404013&de=110680706678&cu=1639739404013&m=1652&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2748&le=1&lf=0&lg=1&lh=9&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=1&ag=1107&an=1107&gi=1&gf=1107&gg=1107&ix=1107&ic=1107&ez=1&ck=1107&kw=927&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1107&bx=1107&ci=1107&jz=927&dj=1&aa=0&ad=980&cn=980&gk=980&gl=980&ik=980&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=927&cd=927&ah=927&am=927&xd=00&rf=0&re=1&ft=980&fv=980&fw=980&wb=1&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=475314590&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:05 GMT
gen_204
pagead2.googlesyndication.com/pagead/ Frame BF7F
0
20 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=225&t=2&li=gpt_2021120601&jk=1496279916739184&bg=!iYqlis7NAAZKWFskSlg7ACkAdvg8WouR0Vu1ZfzF0pmB-AHrBU2h3Jw3BX-37yTYejRjMnhkZKxhDgIAAACdUgAAAAtoAQeZAtGcM0q2iy4fb5SgrbxouNfFMLkBbj9-ZdKZzRZH_pkHWw9ERH0xRvQsf0jhk_hl-6suux8NpCCfMdHuxz4VbgabBGuB6k-128M_DqxRnZPWSpoD02LN62B5jRcAw3zbIiFg3Td5vgE396P4OFqkO_krk0CZEvpH7zKq0MsIWfzDjExwFfRctPcldyMQ46DjRvgA2QHmulVwqGZcLw-BJe60Qe9Q6UAzSFKgYdgMfhmSCQ1mXnYktdI8G-fvllkao6crvInxlopyYgwh1F-uEW_baHM5ShhzGXJ7dl7meRbF1tUH33tt3gMw-XS-1naBBo0omibI4Q2QApBpDhxCwmj4Ku_ugwLGFQiYlSySOnuAMS1EY8zLUfEVrpR4AzDp3MAkTEAOEQgi6KZWVFms3D7tlq_4XgBEbI6oQRHYTrakhSuureTTQETFJs3RAERGgHuAPmZMmxszxFqsvRpuuZuU0ho07-ULFUpFeiVX2J6fy99TuPYgfRXJJZd0_fOGJIITxKJK-euC5NfZVzFM_UHYNgPpPMaA4eErC7Bomyve0edKRHIFKOI1UR15GUvoEpPH7EnPowap1GxWvBIWCSRqPVk_xqVJKs4xUQC0i6OOO66edbwIG5mvI_zrC7Jc5Ou2BX3oNJslukUiVNZAK2EMiS4i5WM-AD4sqWcsyUXeTHBT-LaMdNX-HWdE1Sb2cW1ukkkrNWiYC0wTsmJGRTjQMr_G_ObEVyFmfI6B6PTwwFR2qzLyb1RBjN_92fSckRjgXKlM6SEB3f8_CkL5d-R7cG52tbsYkzoPIa5xWrhjpotnVMGmeqrhw7iowJd5ExI662iBv4gKXOwM49e7eoHY3JYm6Lt4kts1TWRm2damF8fK6919b9mNO3FHtFXeY_5XVzUUBeqfFm9i4kKyRk766QO-KjnBijGS7-kwS5YuXQj6bu6-goNGEXK5WHgOwneB
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
man_names_300_cta_text.png
s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/ Frame E1DA
2 KB
2 KB
Image
General
Full URL
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/man_names_300_cta_text.png
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:812::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
34b7d5639294ad4881b3503e7f08be7d6398561b2a9c471374e28f3f72c27554
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/index.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Thu, 16 Dec 2021 23:18:27 GMT
x-content-type-options
nosniff
age
42698
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1832
x-xss-protection
0
last-modified
Wed, 03 Nov 2021 19:17:37 GMT
server
sffe
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=86400
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
expires
Fri, 17 Dec 2021 23:18:27 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739404013&de=110680706678&cu=1639739404013&m=1652&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2748&le=1&lf=0&lg=1&lh=9&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=1&ag=1107&an=1107&gi=1&gf=1107&gg=1107&ix=1107&ic=1107&ez=1&ck=1107&kw=927&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1107&bx=1107&ci=1107&jz=927&dj=1&aa=0&ad=980&cn=980&gk=980&gl=980&ik=980&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=927&cd=927&ah=927&am=927&xd=00&rf=0&re=1&ft=980&fv=980&fw=980&wb=1&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1569818909&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:05 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame A81A
42 B
64 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvfyOZ8lfZYRWfZTLdUPqoE8joGgdw4WHOXbTyRkLpgsvhvMQUKlCMe-jm_XcU-vaYKpG9690KvY2wxjyQVxYT6UR_REJattRv6E1NfrqDhybodYOu1&sig=Cg0ArKJSzPQZbsZNEHLwEAE&id=lidar2&mcvt=1018&p=456,1050,1056,1350&mtos=987,1018,1018,1018,1018&tos=987,31,0,0,0&v=20211202&bin=7&avms=nio&bs=1600,1200&mc=1&app=0&itpl=19&adk=1139850431&rs=4&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&vs=4&r=v&rst=1639739404143&rpt=586&isd=0&lsd=0&met=ie&wmsd=0
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame A81A
42 B
64 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjss4UTGboobgJF5DOzqaBJAd5V8b7kd7nedShqqOsgzPkBJ_jB9r861--EdoVRRpA81uBFdbnz3rxVRd7BsHD9F8Gq4pSmrF8pI&sig=Cg0ArKJSzD51NBjpXfY2EAE&id=lidar2&mcvt=1020&p=0,0,600,300&mtos=989,1020,1020,1020,1020&tos=989,31,0,0,0&v=20211202&bin=7&avms=nio&bs=1600,1200&mc=1&app=0&itpl=32&adk=2584428108&rs=6&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&vs=4&r=v&rst=1639739404143&rpt=589&wmsd=0
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:811::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
man_names_300_logo.png
s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/ Frame E1DA
4 KB
4 KB
Image
General
Full URL
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/man_names_300_logo.png
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:812::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
3dc3837ba5ec5fdd3e15dc1d9e5e00f02a464d59b96f1ac4133f5a9018d4d15f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://s0.2mdn.net/11449174/1635967057236/mandiant_constant_300x250/index.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 05:30:22 GMT
x-content-type-options
nosniff
age
20383
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
3803
x-xss-protection
0
last-modified
Wed, 03 Nov 2021 19:17:37 GMT
server
sffe
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=86400
accept-ranges
bytes
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
expires
Sat, 18 Dec 2021 05:30:22 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x600&zMoatPS=top&zMoatSZPS=300x600%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739404635&de=31011698570&cu=1639739404635&m=1218&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2748&le=1&lf=0&lg=1&lh=52&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=1&ag=1212&an=2&gi=1&gf=1212&gg=2&ix=1212&ic=1212&ez=1&ck=1212&kw=992&aj=1&pg=100&pf=100&ib=1&cc=1&bw=1212&bx=2&ci=1212&jz=992&dj=1&aa=1&ad=1088&cn=0&gn=1&gk=1088&gl=0&ik=1088&co=1088&cp=992&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=992&cd=3&ah=992&am=3&xd=00&rf=0&re=1&ft=1088&fv=0&fw=1088&wb=1&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370174589&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=600&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=283060150&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:05 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=992&tet=1212&fi=1&apd=1213&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370174589&S1id=22308610192&S2id=22654085702&ord=1639739404635&r=31011698570&t=iv&os=1&fi2=0&div1=1&ait=1088&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=5&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:05 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x600&zMoatPS=top&zMoatSZPS=300x600%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739404635&de=31011698570&cu=1639739404635&m=1219&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2748&le=1&lf=0&lg=1&lh=52&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=1&ag=1212&an=1212&gi=1&gf=1212&gg=1212&ix=1212&ic=1212&ez=1&ck=1212&kw=992&aj=1&pg=100&pf=100&ib=1&cc=1&bw=1212&bx=1212&ci=1212&jz=992&dj=1&aa=1&ad=1088&cn=1088&gn=1&gk=1088&gl=1088&ik=1088&co=1088&cp=992&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=992&cd=992&ah=992&am=992&xd=00&rf=0&re=1&ft=1088&fv=1088&fw=1088&wb=1&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370174589&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=600&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1201284652&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:05 GMT
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=129f2999-bf80-c966-27b9-3f48e3d968ae&tv=%7Bc:x3eENF,pingTime:1,time:1688,type:p,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:652%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:1688,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:652,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B1049~100%5D,as:%5B1049~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:183,fm:sRQDqVh+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C161%7C162%7C163%7C171%7C172%7C181%7C182%7C191%7C1a,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.84.167.118 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-84-167-118.compute-1.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
x-server-name
dt14.va.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=129f2999-bf80-c966-27b9-3f48e3d968ae&tv=%7Bc:x3eENG,pingTime:1,time:1689,type:pf,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:652%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:1689,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:652,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B1050~100%5D,as:%5B1050~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:183,fm:sRQDqVh+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C161%7C162%7C163%7C171%7C172%7C181%7C182%7C191%7C1a,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.84.167.118 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-84-167-118.compute-1.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
x-server-name
dt02.va.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=1867/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogres... Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=1867/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogress_1:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:05 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x600&zMoatPS=top&zMoatSZPS=300x600%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739404635&de=31011698570&cu=1639739404635&m=1219&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2748&le=1&lf=0&lg=1&lh=52&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=1&ag=1212&an=1212&gi=1&gf=1212&gg=1212&ix=1212&ic=1212&ez=1&ck=1212&kw=992&aj=1&pg=100&pf=100&ib=1&cc=1&bw=1212&bx=1212&ci=1212&jz=992&dj=1&aa=1&ad=1088&cn=1088&gn=1&gk=1088&gl=1088&ik=1088&co=1088&cp=992&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=992&cd=992&ah=992&am=992&xd=00&rf=0&re=1&ft=1088&fv=1088&fw=1088&wb=1&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370174589&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=600&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=706198805&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:05 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739404013&de=110680706678&cu=1639739404013&m=1854&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2748&le=1&lf=0&lg=1&lh=9&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=1&ag=1310&an=1107&gi=1&gf=1310&gg=1107&ix=1310&ic=1310&ez=1&ck=1107&kw=927&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1310&bx=1107&ci=1107&jz=927&dj=1&aa=1&ad=1183&cn=980&gn=1&gk=1183&gl=980&ik=1183&co=1183&cp=1137&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1137&cd=927&ah=1137&am=927&xd=00&rf=0&re=1&ft=1183&fv=980&fw=980&wb=1&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=5&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=428517906&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:05 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:05 GMT
event.png
tpsc-ue1.doubleverify.com/ Frame 9790
0
254 B
Ping
General
Full URL
https://tpsc-ue1.doubleverify.com/event.png?impid=4394302d65c044469ae0c9519fd2261b&gdpr=&gdpr_consent=&vdur=203&eoid=8&msrjs=1950&nav_pltfrm=Linux%20x86_64&sdf=2&vit=2&isvelg=1&tltms=144&tetms=14&msltms=120&vltms=203&sei=290&vetms=83&engms=1&engisel=1&ttfurm=2312&mpt=1639739407223338
Requested by
Host: cdn.doubleverify.com
URL: https://cdn.doubleverify.com/dv-measurements1950.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
34.117.228.201 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
201.228.117.34.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Access-Control-Allow-Origin
https://www.zdnet.com
Pragma
no-cache
Date
Fri, 17 Dec 2021 11:10:07 GMT
Cache-Control
max-age=0
Access-Control-Allow-Credentials
true
Connection
keep-alive
Expires
12/16/2021 11:10:07
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=3365/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogres... Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=3365/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogress_2:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:07 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
/
684dd326.akstat.io/
0
354 B
Ping
General
Full URL
https://684dd326.akstat.io/
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:1700:391::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:10:08 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Fri, 17 Dec 2021 11:10:08 GMT
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=4165/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogres... Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=4165/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogress_2p5:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:08 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
event.png
tpsc-ue1.doubleverify.com/ Frame 9790
0
254 B
Ping
General
Full URL
https://tpsc-ue1.doubleverify.com/event.png?impid=4394302d65c044469ae0c9519fd2261b&gdpr=&gdpr_consent=&msrcanlm=394&msrcannum=4&eoid=10&ismms=42&isumms=41&isvelg=1&nvr=6&elmtp=3&isbxdms=2341&b11=2553&adhgt=600&adwdth=300&norwdth=300&norhgt=600&engisel=1&vsos=9&dvp_vsosnmr=16&dvp_mvpw=device-width&dvp_mvpiss=0&lftb=2553&sftb=2553&msrdp=5&naral=2&vct=1&vphgt=1200&vpwdth=1600&chgt=600&cwdth=300&invcs=false&scrhgt=1200&scrwdth=1600&strp=100&advisonl=true&isiabvms=875&isuiabvms=875&ispmxpms=875&iscvmvms=1841&engalms=41&dvp_hdnAd=0&dvp_dpr=1&mpt=1639739408222551
Requested by
Host: cdn.doubleverify.com
URL: https://cdn.doubleverify.com/dv-measurements1950.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
34.117.228.201 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
201.228.117.34.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Access-Control-Allow-Origin
https://www.zdnet.com
Pragma
no-cache
Date
Fri, 17 Dec 2021 11:10:08 GMT
Cache-Control
max-age=0
Access-Control-Allow-Credentials
true
Connection
keep-alive
Expires
12/16/2021 11:10:08
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=4865/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogres... Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=4865/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogress_3:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:08 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x600&zMoatPS=top&zMoatSZPS=300x600%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739404635&de=31011698570&cu=1639739404635&m=5037&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2748&le=1&lf=0&lg=1&lh=52&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=1&ag=5031&an=1212&gi=1&gf=5031&gg=1212&ix=5031&ic=5031&ez=1&ck=1212&kw=992&aj=1&pg=100&pf=100&ib=1&cc=1&bw=5031&bx=1212&ci=1212&jz=992&dj=1&aa=1&ad=4907&cn=1088&gn=1&gk=4907&gl=1088&ik=4907&co=1088&cp=992&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4831&cd=992&ah=4831&am=992&xd=00&rf=0&re=1&ft=4907&fv=1088&fw=1088&wb=2&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370174589&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=600&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=5&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1229558859&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:09 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:09 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739404013&de=110680706678&cu=1639739404013&m=5671&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2748&le=1&lf=0&lg=1&lh=9&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=1&ag=5127&an=1310&gi=1&gf=5127&gg=1310&ix=5127&ic=5127&ez=1&ck=1107&kw=927&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5127&bx=1310&ci=1107&jz=927&dj=1&aa=1&ad=5000&cn=1183&gn=1&gk=5000&gl=1183&ik=5000&co=1183&cp=1137&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4956&cd=1137&ah=4956&am=1137&xd=00&rf=0&re=1&ft=4900&fv=1183&fw=980&wb=2&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatSN=a&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=5&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=2096977130&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:09 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:09 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=technology&zMoatAdUnit3=security&wf=1&ra=3&pxm=&sgs=3&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=middle&zMoatvguid=d5ebeff1-aaff-4a87-ba0f-c0c9612e3738&zMoatptype=article&zMoatsl=mpu-middle%3FLL%7CT-1000&g=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&h=250&w=300&rm=1&fy=1050&gp=1496.671875&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739403574&de=341503257798&cu=1639739403574&m=6116&ar=8ab009d7785-clean&iw=04a0275&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=1496.671875&lb=2748&le=1&lf=77&lg=1&lh=10&ch=0&vv=1&vw=1%3A0%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5196&cd=226&ah=5196&am=226&xd=00&rf=0&re=1&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&jk=3&jm=-1&tc=0&fs=195979&na=617891781&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:09 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:09 GMT
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=129f2999-bf80-c966-27b9-3f48e3d968ae&tv=%7Bc:x3eFQb,pingTime:5,time:5688,type:p,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:652%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:5688,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:652,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B5049~100%5D,as:%5B5049~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:130,fm:sRQDqVh+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C161%7C162%7C163%7C171%7C172%7C181%7C182%7C191%7C1a,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.84.167.118 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-84-167-118.compute-1.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:09 GMT
x-server-name
dt10.va.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=129f2999-bf80-c966-27b9-3f48e3d968ae&tv=%7Bc:x3eFQb,pingTime:5,time:5688,type:pf,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:652%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:5688,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:652,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B5049~100%5D,as:%5B5050~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:130,fm:sRQDqVh+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C161%7C162%7C163%7C171%7C172%7C181%7C182%7C191%7C1a,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.84.167.118 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-84-167-118.compute-1.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:09 GMT
x-server-name
dt12.va.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22383746382&bd=undefined&zMoatNotCnet=true&zMoatPT=Not%20Specified&zMoatFT=Not%20Specified&zMoatSZ=300x250&zMoatPS=Not%20Specified&zMoatSZPS=Not%20Specified&zMoatPTAT=Not%20Specified&zMoatPTATSECT=content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-0fUj1TPl77BJmR4uHVjPGlx1P1tMeAYh8VIp1Vf7AbESGfrl5%2FmliBNlAlwWxmRnpyWz&rs=1-3VB%2FRG458kcdYQ%3D%3D&sc=1&os=1-Sw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&pcode=redventuresgamheader644747280705&rx=102643891211&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&id=1&ii=4&f=0&j=https%3A%2F%2Ft.co&t=1639739404756&de=52034830188&cu=1639739404756&m=5339&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2748&le=1&lf=0&lg=1&lh=32&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A0%3A-&pe=1%3A1121%3A1121%3A2560%3A1112&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&cq=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5133&cd=3&ah=5133&am=3&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5009920773%3A2848205265%3A5677026463%3A138355023537&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22383746382&dfp=0%2C1&la=22383746382&zMoatW=300&zMoatH=250&zMoatMMV_MAX=na&zMoatSlotId=mpu-bottom&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-bottom&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&jk=3&jm=-1&tz=mpu-bottom&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=444419666&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.21.143.57 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-21-143-57.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:10:10 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:10:10 GMT
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=6365/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogres... Frame 6CF1
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.502338.1639739404030/U=www.zdnet.com/T=6365/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogress_4:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.234.228.134 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-234-228-134.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:10:10 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif

Verdicts & Comments Add Verdict or Comment

137 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4 object| 5 object| 6 object| 7 object| 8 object| NREUM object| newrelic function| __nr_require object| cbsoptanon object| soastaTracking object| ZdnetPageVars string| chsn_post_id string| chsn_pageType object| ZdnetFunctions number| BOOMR_lstart object| _sf_async_config number| _sf_startpt object| _cbq object| knownServiceWorkers object| BidBarrel function| uuidv4 object| webVitals function| UUIDv4 string| __tealium_data_guid object| utag_data string| key function| loadMyFinance string| _cbsotstate object| OneTrustStub string| OnetrustActiveGroups string| OptanonActiveGroups object| dataLayer function| requirejs function| require function| define object| BOOMR object| BOOMR_mq function| $ function| jQuery object| Modernizr function| jsonFeed string| chsn_ad_id number| _sf_endpt object| CryptoJS object| mPulseApp object| regeneratorRuntime object| mf function| iFrameResize string| MYFI_SCRIPT_FOLDER function| initializeMyFinance function| requestMyFinanceAds function| initializeInline function| requestInlineAds boolean| MF_OVERWRITE_CONTAINER object| MF_DEBUG_URL object| mfEmbed boolean| mfInitialized string| _mfuuid_ object| otStubData number| BOOMR_configt object| core object| pbjs object| _pbjsGlobals object| adFlow object| googletag object| confiant undefined| easyXDM object| AudEng object| URS object| Optanon object| OneTrust object| _bmrEvents function| Waypoint object| ggeac object| google_js_reporting_queue object| _Cohesion object| _Preamp object| _Fuse object| _Tagular function| cohesion function| preamp function| fuse function| tagular object| debug object| jQuery1830404235918548949 object| adsbygoogle object| viacbs_at function| blankAdCallback function| CbsMoatListener function| moatYieldReady function| setMoatPrebidData undefined| google_measure_js_timing object| googleToken object| googleIMState function| processGoogleToken number| google_unique_id object| gaGlobal object| __Cohesion object| _Taggy object| _Monarch function| monarch undefined| ct undefined| et undefined| hourElapsed undefined| msg undefined| pixelDomain undefined| isDomless undefined| documentReferrer undefined| isBeta undefined| viewHash undefined| tagType undefined| pxSrc undefined| moat_px object| Moat#G26 object| MoatSuperV26 object| MoatNadoAllJsonpRequest_37709686 object| Moat#PML#26#1.2 boolean| Moat#EVA object| DOMlessLLDcallback_37709686 object| MoatDataJsonpRequest_37709686 object| moatPrebidApi function| confiantDfpWrap number| BOOMR_onload object| $tealium boolean| searchOpen string| pageType string| waypointContextKey object| GoogleGcLKhOms object| ampInaboxIframes object| ampInaboxPendingMessages object| goog_ddm_ps string| keyName object| google_image_requests

36 Cookies

Domain/Path Name / Value
www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor Name: pv
Value: 1
www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor Name: zdnet_ad
Value: %7B%22type%22%3A%22gpt%22%2C%22region%22%3A%22aw%22%2C%22subses%22%3A%223%22%2C%22session%22%3A%22a%22%7D
.t.co/ Name: muc
Value: ea608c55-9896-4280-b6c9-d444f13e5744
.t.co/ Name: muc_ads
Value: ea608c55-9896-4280-b6c9-d444f13e5744
.zdnet.com/ Name: fly_geo
Value: {"countryCode": "de"}
.zdnet.com/ Name: fly_device
Value: desktop
.zdnet.com/ Name: fly_preferred_edition
Value: eu
.zdnet.com/ Name: fly_default_edition
Value: eu
www.zdnet.com/ Name: _mfuuid_
Value: 1bc33274-73ad-4796-9c5d-5eaf5630cdc4
.zdnet.com/ Name: OptanonConsent
Value: isIABGlobal=false&datestamp=Fri+Dec+17+2021+11%3A10%3A03+GMT%2B0000+(GMT)&version=6.20.0&hosts=&consentId=46a4aba4-6a8f-4343-a714-e3d7e15d06ac&interactionCount=0&landingPath=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%3Futm_source%3Ddlvr.it%26utm_medium%3Dtwitter%23ftag%3DRSSbaffb68&groups=C0001%3A1%2CC0002%3A0%2CC0003%3A0%2CC0004%3A0
.zdnet.com/ Name: arrowImp
Value: true
.zdnet.com/ Name: arrowImpCnt
Value: 1
.zdnet.com/ Name: ugc
Value: 1639739403
.www.zdnet.com/ Name: chsn_cnsnt
Value: tglr_ref%2Ctglr_req%2Ctglr_sess_id%2Ctglr_sess_count%2Ctglr_anon_id%2Ctglr_tenant_id%2Ctglr_virtual_ref%2Ctglr_transit_id%2Cchsn_dcsn_cache%2Cpmpdid%2Cpmpredirected%2Cpmpredir%2Cfuseid%2Ccohsn_xs_id%2Cchsn_auth_id%2ChashID%2CetagID%2CreinforcedID%2ChttpOnlyID%2CfpID%2CflID%2Ctglr_smpl%2Ctglr_reinforce%2Ctglr_gpc_sess_id%2Ctglr_hash_id
.www.zdnet.com/ Name: tglr_tenant_id
Value: src_1kYsAcdpfzbZ8UlNLYht1RPg3m2
.www.zdnet.com/ Name: tglr_transit_id
Value: 0d93332c-7481-4423-b02f-c9e53247051b
.www.zdnet.com/ Name: tglr_sess_id
Value: 1d1e6dff-4411-464a-81b5-e59c3dfda5a3
.www.zdnet.com/ Name: tglr_sess_count
Value: 1
.www.zdnet.com/ Name: tglr_req
Value: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/?utm_source=dlvr.it&utm_medium=twitter#ftag=RSSbaffb68
.www.zdnet.com/ Name: tglr_ref
Value: https://t.co/Bi3lGmiArD
.www.zdnet.com/ Name: tglr_anon_id
Value: 89af45f9-4d3f-4e50-ade4-aa3032dd9f26
.cohesionapps.com/ Name: cohsn_xs_id
Value: 0021d809-6b4f-4e73-830f-30bfcd4d0c02
.www.zdnet.com/ Name: cohsn_xs_id
Value: 0021d809-6b4f-4e73-830f-30bfcd4d0c02
.doubleclick.net/ Name: IDE
Value: AHWqTUmkpyu46-RkNcLCGpiDWNwmamqamSZd94p39x7t9VgUW4AAc127uI5uuCWmGOk
www.zdnet.com/ Name: viewGuid
Value: d5ebeff1-aaff-4a87-ba0f-c0c9612e3738
.zdnet.com/ Name: fly_session
Value: dfff05099300b767bf37783fa8d94ffc
.nr-data.net/ Name: JSESSIONID
Value: a45f23bf67270ff1
.zdnet.com/ Name: __gads
Value: ID=8cf3836d55010fc1:T=1639739403:S=ALNI_MYM7NZmEhlNVUSz6vsP8a00RLxhjg
.adnxs.com/ Name: uuid2
Value: 3226816911875347000
.casalemedia.com/ Name: CMID
Value: YbxwDE-W-9XYIIFVE2pejAAA
.casalemedia.com/ Name: CMPS
Value: 5223
.casalemedia.com/ Name: CMPRO
Value: 1174
.casalemedia.com/ Name: CMST
Value: YbxwDGG8cAwA
.casalemedia.com/ Name: CMRUM3
Value: 2d61bc700c2760CAESEByZq5FghuOsMUYUlYpelz4
.adnxs.com/ Name: anj
Value: dTM7k!M41.D>6NRF']wIg2C%uczS-4!]tbPl1M>e)ZlrFUfJ+tGXxoLOWe=L<8AKAFxx77VGCwxAGK'#Ol@y>S4kCF%nugO%v4VB%nn@k*3PZ?
.zdnet.com/ Name: RT
Value: "z=1&dm=zdnet.com&si=e83708d7-1590-408b-90ce-68edbf78397e&ss=kxaai3hq&sl=1&tt=441&bcn=%2F%2F684dd326.akstat.io%2F&ld=4wa"

1 Console Messages

Source Level URL
Text
security error URL: https://t.co/Bi3lGmiArD
Message:
Unrecognized Content-Security-Policy directive 'referrer'.

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy referrer always;
Strict-Transport-Security max-age=0
X-Xss-Protection 0

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

15bba6cb2a099075211e19961c408204.safeframe.googlesyndication.com
58f70a04ce3c0329dbcf73686be77bd9.safeframe.googlesyndication.com
684dd326.akstat.io
a.myfidevs.io
ad.clipcentric.com
ad.doubleclick.net
adservice.google.com
adservice.google.de
at.adtech.redventures.io
bam-cell.nr-data.net
c.go-mpulse.net
cdn.cohesionapps.com
cdn.cookielaw.org
cdn.doubleverify.com
clipcentric-a.akamaihd.net
cm.g.doubleclick.net
code.createjs.com
confiant-integrations.global.ssl.fastly.net
dlvr.it
dsum-sec.casalemedia.com
dt.adsafeprotected.com
geo.moatads.com
geolocation.onetrust.com
googleads.g.doubleclick.net
googleads4.g.doubleclick.net
ib.adnxs.com
ingest.make.rvapps.io
js-agent.newrelic.com
mb.moatads.com
media-mtml.mt.rvapps.io
pagead2.googlesyndication.com
pixel.adsafeprotected.com
protected-by.clarium.io
px.moatads.com
redventuresgamdisplay60805146916.s.moatpixel.com
redventuresgamheader644747280705.s.moatpixel.com
s0.2mdn.net
securepubads.g.doubleclick.net
static.adsafeprotected.com
static.myfinance.com
t.co
taggy.cohesionapps.com
tpc.googlesyndication.com
tps.doubleverify.com
tpsc-ue1.doubleverify.com
tr.clipcentric.com
urs.zdnet.com
www.google.com
www.googletagservices.com
www.myfinance.com
www.zdnet.com
z.moatads.com
104.244.42.197
13.32.121.58
142.250.184.230
142.250.185.194
142.250.185.66
142.250.186.130
151.101.129.194
151.101.194.154
151.101.2.137
162.247.243.147
18.132.152.138
18.66.139.10
2.16.107.33
2.18.234.21
2.18.235.40
2.21.143.57
2600:9000:223f:200:8:48e:53c0:93a1
2606:4700:10::6814:b844
2606:4700:3030::ac43:b431
2606:4700:3037::6815:2b8a
2606:4700::6810:9440
2a00:1450:4001:802::2002
2a00:1450:4001:80e::2002
2a00:1450:4001:80f::2001
2a00:1450:4001:811::2002
2a00:1450:4001:812::2006
2a00:1450:4001:827::2002
2a00:1450:4001:82f::2001
2a00:1450:4001:82f::2004
2a00:1450:4001:830::2002
2a02:26f0:1700:391::11a6
2a02:26f0:6c00:1bb::11a6
2a02:26f0:6c00:2b2::4469
2a02:26f0:6c00::210:ba1a
2a04:4e42:4d::666
3.11.215.107
3.127.116.150
34.117.228.201
34.120.203.121
34.234.228.134
34.235.197.155
37.252.172.38
44.239.146.245
52.5.105.31
52.73.158.59
54.84.167.118
99.80.242.238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