URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Submission: On March 23 via api from US

Summary

This website contacted 25 IPs in 5 countries across 22 domains to perform 116 HTTP transactions. The main IP is 67.227.194.195, located in Lansing, United States and belongs to LIQUIDWEB, US. The main domain is www.hackread.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on February 13th 2020. Valid for: 3 months.
This is the only time www.hackread.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
42 67.227.194.195 32244 (LIQUIDWEB)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
2 2a04:fa87:fff... 2635 (AUTOMATTIC)
3 2a00:1450:400... 15169 (GOOGLE)
7 2606:2800:234... 15133 (EDGECAST)
1 2a00:1450:400... 15169 (GOOGLE)
7 52.200.11.189 14618 (AMAZON-AES)
12 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2 70.42.32.31 22075 (AS-OUTBRAIN)
2 2 37.252.172.37 29990 (ASN-APPNEX)
3 3 52.29.176.117 16509 (AMAZON-02)
3 3 3.121.238.160 16509 (AMAZON-02)
1 192.132.33.46 18568 (BIDTELLECT)
1 2 2a00:1450:400... 15169 (GOOGLE)
1 2 104.244.42.200 13414 (TWITTER)
6 2606:2800:134... 15133 (EDGECAST)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 1 2001:4860:480... 15169 (GOOGLE)
1 2001:4860:480... 15169 (GOOGLE)
10 151.139.128.10 20446 (HIGHWINDS3)
2 2600:1901:0:f... 15169 (GOOGLE)
7 130.211.115.4 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2606:4700::68... 13335 (CLOUDFLAR...)
2 2a00:1450:400... 15169 (GOOGLE)
116 25
Domain Requested by
42 www.hackread.com www.hackread.com
ajax.googleapis.com
11 googleads.g.doubleclick.net pagead2.googlesyndication.com
8 img.revcontent.com cdn.revcontent.com
7 data.ad-score.com js.ad-score.com
7 trends.revcontent.com www.hackread.com
trends.revcontent.com
cdn.revcontent.com
7 platform.twitter.com www.hackread.com
platform.twitter.com
5 pbs.twimg.com www.hackread.com
4 pagead2.googlesyndication.com www.hackread.com
pagead2.googlesyndication.com
3 rtb.mfadsrvr.com 3 redirects
3 x.bidswitch.net 3 redirects
2 tpc.googlesyndication.com pagead2.googlesyndication.com
tpc.googlesyndication.com
2 js.ad-score.com www.hackread.com
js.ad-score.com
2 cdn.revcontent.com www.hackread.com
2 syndication.twitter.com 1 redirects www.hackread.com
2 www.google-analytics.com 1 redirects www.googletagmanager.com
2 ib.adnxs.com 2 redirects
2 b1sync.zemanta.com 2 redirects
2 secure.gravatar.com www.hackread.com
2 fonts.gstatic.com ajax.googleapis.com
2 cdnjs.cloudflare.com www.hackread.com
1 static.earnify.com cdn.revcontent.com
1 www.google.de www.hackread.com
1 www.google.com 1 redirects
1 stats.g.doubleclick.net 1 redirects
1 cdn.syndication.twimg.com platform.twitter.com
1 bttrack.com www.hackread.com
1 www.googletagservices.com pagead2.googlesyndication.com
1 adservice.google.com pagead2.googlesyndication.com
1 adservice.google.de pagead2.googlesyndication.com
1 www.googletagmanager.com www.hackread.com
1 fonts.googleapis.com ajax.googleapis.com
1 ajax.googleapis.com www.hackread.com
116 32
Subject Issuer Validity Valid
hackread.com
Let's Encrypt Authority X3
2020-02-13 -
2020-05-13
3 months crt.sh
cloudflare.com
CloudFlare Inc ECC CA-2
2020-01-07 -
2020-10-09
9 months crt.sh
*.storage.googleapis.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.google.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.gravatar.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2019-11-12 -
2020-11-18
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
revcontent.com
Amazon
2019-09-19 -
2020-10-19
a year crt.sh
*.bttrack.com
Sectigo RSA Domain Validation Secure Server CA
2019-03-19 -
2021-04-13
2 years crt.sh
syndication.twitter.com
DigiCert SHA2 High Assurance Server CA
2020-01-02 -
2020-12-24
a year crt.sh
www.google.de
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
cdn.revcontent.com
Sectigo RSA Domain Validation Secure Server CA
2020-02-09 -
2020-05-09
3 months crt.sh
*.ad-score.com
Go Daddy Secure Certificate Authority - G2
2019-09-02 -
2020-11-01
a year crt.sh
ssl450535.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2020-03-18 -
2020-09-24
6 months crt.sh
img.revcontent.com
Sectigo RSA Domain Validation Secure Server CA
2020-02-09 -
2020-05-09
3 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh

This page contains 16 frames:

Primary Page: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Frame ID: 473E74E4B20006E92E51921FA4BC9A95
Requests: 109 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20200316/r20190131/zrt_lookup.html
Frame ID: DA686BB2AFF4A6EA22031815E1519BD0
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=3131926736&adf=3273086421&w=570&fwrn=4&lmt=1584991398&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398533&bpp=19&bdt=742&fdt=111&idt=112&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=6515175140065&frm=20&pv=2&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=49&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=306&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=1&uci=a!1&fsb=1&xpc=wKK73Jp6sQ&p=https%3A//www.hackread.com&dtd=128
Frame ID: 5B3810B7B721F7C6DC3C2B24090EB5E1
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=3686882433&adf=1650997229&w=300&lmt=1584991398&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&wgl=1&adsid=NT&dt=1584991398552&bpp=8&bdt=761&fdt=139&idt=139&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=806&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&fsb=1&xpc=2vByTlhwdz&p=https%3A//www.hackread.com&dtd=150
Frame ID: 87786F3D97F20863BAFC43FA77D9399D
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=3131926736&adf=1980691087&w=570&fwrn=4&lmt=1584991398&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398560&bpp=5&bdt=769&fdt=150&idt=150&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=1085&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=3&uci=a!3&fsb=1&xpc=uR4F6isQqt&p=https%3A//www.hackread.com&dtd=155
Frame ID: 5960924667D3D6671D1BACC0E68390EA
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=1082465236&adk=2719963377&adf=3077945714&w=459&fwrn=4&lmt=1584991398&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=459x250_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398565&bpp=5&bdt=774&fdt=157&idt=157&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=518&ady=1895&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=4&uci=a!4&btvi=1&fsb=1&xpc=ppnXYhWn1y&p=https%3A//www.hackread.com&dtd=161
Frame ID: E01CA3012C815AB2FC3A58D796B94900
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=3686882433&adf=3221973030&w=300&lmt=1584991398&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&wgl=1&adsid=NT&dt=1584991398571&bpp=4&bdt=780&fdt=162&idt=162&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=3324&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=5&uci=a!5&btvi=2&fsb=1&xpc=xr9Pss3B82&p=https%3A//www.hackread.com&dtd=169
Frame ID: AAAEE8761D0128E30FFE6665E4346653
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=3131926736&adf=10200015&w=570&fwrn=4&lmt=1584991398&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398575&bpp=5&bdt=784&fdt=173&idt=173&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=3603&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=6&uci=a!6&btvi=3&fsb=1&xpc=6NuciaDJWR&p=https%3A//www.hackread.com&dtd=178
Frame ID: 60AD6E71EE2C899D2AEB719CD5E25968
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.d0f13be8321eb432fba28cfc1c3351b1.html?origin=https%3A%2F%2Fwww.hackread.com
Frame ID: 18E5CA805B451074EEE933466818F6D3
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&adk=1812271804&adf=3025194257&lmt=1584991398&plat=1%3A32776%2C2%3A16809992%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1584991398899&bpp=3&bdt=1108&fdt=4&idt=4&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250%2C570x90_0ads_al&nras=1&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=750050148876284&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=11&uci=a!b&fsb=1&dtd=11
Frame ID: 628663BC81990D677AF9AD2C50E1B030
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=600&slotname=3047884612&adk=2945537484&adf=1398944667&w=300&lmt=1584991398&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&wgl=1&adsid=NT&dt=1584991398595&bpp=5&bdt=804&fdt=402&idt=402&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250%2C570x90_0ads_al%2C0x0&nras=1&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2298162520784892&dssz=62&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1113&ady=945&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQWYUJkZVWYJgyUiFAPd6RHlGn16eoA31VJ1lZMjZxBB_7Q4dbLDBg%2CABP-KfRKvaEV7oVOu0jHMrGB4HV-b7mxPYWlgPQ3WpCXzq2id8ZrLiLGe80%2CABP-KfRUJfe-4Q45cXy04tFIA__dXYrr0eskW5kSQBoPuiruIXAYwZqawO4%2CABP-KfR9siMQsAkhY-JrDZta3V99iXtaDhPbaIvz2tdolIgtUp9sVKL6zsk&pvsid=670523557325424&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7Cm%7CoeE%7C&abl=NS&pfx=0&fu=16&bc=31&ifi=10&uci=a!a&fsb=1&xpc=o6DrI7qFYO&p=https%3A//www.hackread.com&dtd=406
Frame ID: 5E8877F1D667C05DE281DFBD686E0B3A
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=3686882433&adf=1543069684&w=300&lmt=1584991399&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&wgl=1&adsid=NT&dt=1584991398580&bpp=5&bdt=789&fdt=285&idt=285&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250%2C570x90_0ads_al%2C0x0%2C300x600&nras=1&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2298162520784892&dssz=62&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=4645&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQWYUJkZVWYJgyUiFAPd6RHlGn16eoA31VJ1lZMjZxBB_7Q4dbLDBg%2CABP-KfRKvaEV7oVOu0jHMrGB4HV-b7mxPYWlgPQ3WpCXzq2id8ZrLiLGe80%2CABP-KfRUJfe-4Q45cXy04tFIA__dXYrr0eskW5kSQBoPuiruIXAYwZqawO4%2CABP-KfR9siMQsAkhY-JrDZta3V99iXtaDhPbaIvz2tdolIgtUp9sVKL6zsk&pvsid=670523557325424&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=7&uci=a!7&btvi=4&fsb=1&xpc=CQoagXar3m&p=https%3A//www.hackread.com&dtd=432
Frame ID: F47C74BE1031E980447A91BF495DBDB0
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=3131926736&adf=3303316922&w=570&fwrn=4&lmt=1584991399&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398585&bpp=5&bdt=793&fdt=330&idt=331&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250%2C570x90_0ads_al%2C0x0%2C300x600%2C300x250&nras=1&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2298162520784892&dssz=62&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=4693&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQWYUJkZVWYJgyUiFAPd6RHlGn16eoA31VJ1lZMjZxBB_7Q4dbLDBg%2CABP-KfRKvaEV7oVOu0jHMrGB4HV-b7mxPYWlgPQ3WpCXzq2id8ZrLiLGe80%2CABP-KfRUJfe-4Q45cXy04tFIA__dXYrr0eskW5kSQBoPuiruIXAYwZqawO4%2CABP-KfR9siMQsAkhY-JrDZta3V99iXtaDhPbaIvz2tdolIgtUp9sVKL6zsk&pvsid=670523557325424&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=8&uci=a!8&btvi=5&fsb=1&xpc=fpeJrhIz5w&p=https%3A//www.hackread.com&dtd=679
Frame ID: A20B47CC27F5D275E630D96CF7083699
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: 1AB2A48C3F44438E09C3434E57200DF9
Requests: 1 HTTP requests in this frame

Frame: https://js.ad-score.com/x.html?pid=1000177
Frame ID: 2340A9E6079F1A09443CF11DA84BE380
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 98B7132C191EA604855E19E1CE448097
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • script /googleapis\.com\/.+webfont/i

Page Statistics

116
Requests

99 %
HTTPS

67 %
IPv6

22
Domains

32
Subdomains

25
IPs

5
Countries

1826 kB
Transfer

3820 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 70
  • https://b1sync.zemanta.com/usersync/revcontent/?puid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DMGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%253D%26bidder%3D3%26bidder_uid%3D__ZUID__&rev_dt=1584991398 HTTP 302
  • https://b1sync.zemanta.com/usersync/revcontent/?cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DMGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%253D%26bidder%3D3%26bidder_uid%3D__ZUID__&puid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&rev_dt=1584991398&s=2 HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&bidder=3&bidder_uid=u814_9X6s-hzk8Kh4HZA
Request Chain 71
  • https://ib.adnxs.com/getuid?https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fbidder%3D115%26bidder_uid%3D%24UID%26exchange_uid%3DMGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%253D&geo=35&rev_dt=1584991398 HTTP 307
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%253A%252F%252Ftrends.revcontent.com%252Fcm%252Fpixel_sync%253Fbidder%253D115%2526bidder_uid%253D%2524UID%2526exchange_uid%253DMGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%25253D%26geo%3D35%26rev_dt%3D1584991398 HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=1388592644779095469&exchange_uid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&geo=35&rev_dt=1584991398
Request Chain 72
  • https://x.bidswitch.net/sync?ssp=revcontent&rev_dt=1584991398 HTTP 302
  • https://x.bidswitch.net/ul_cb/sync?ssp=revcontent&rev_dt=1584991398 HTTP 302
  • https://rtb.mfadsrvr.com/sync?ssp=bidswitch&bidswitch_ssp_id=revcontent&bsw_user_id=b35fc53a-b2b6-41a5-b33f-7d04ec84cab5 HTTP 302
  • https://x.bidswitch.net/sync?dsp_id=250&expires=14&user_id=b7a36e22-cac9-44be-ac0f-dc14a3866cf5&ssp=revcontent HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=b35fc53a-b2b6-41a5-b33f-7d04ec84cab5
Request Chain 74
  • https://rtb.mfadsrvr.com/sync?ssp=revcontent&ssp_user_id=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&rev_dt=1584991398 HTTP 302
  • https://rtb.mfadsrvr.com/ul_cb/sync?ssp=revcontent&ssp_user_id=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&rev_dt=1584991398 HTTP 302
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY=&bidder=154&bidder_uid=b7a36e22-cac9-44be-ac0f-dc14a3866cf5
Request Chain 80
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=603804334&t=pageview&_s=1&dl=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&ul=en-us&de=UTF-8&dt=Russian%20Intel%20Agency%20FSB%27s%20contractor%20hacked%3B%20sensitive%20data%20leaked%20online&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IAhAAUAB~&jid=47175489&gjid=682227757&cid=3621619.1584991399&tid=UA-36230183-1&_gid=850467146.1584991399&_r=1&gtm=2ou3b2&z=1414940166 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-36230183-1&cid=3621619.1584991399&jid=47175489&_gid=850467146.1584991399&gjid=682227757&_v=j81&z=1414940166 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=3621619.1584991399&jid=47175489&_v=j81&z=1414940166 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=3621619.1584991399&jid=47175489&_v=j81&z=1414940166&slf_rd=1&random=3451843135
Request Chain 97
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html

116 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
92 KB
18 KB
Document
General
Full URL
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
10dda885d48e554c445819c08251a4debdc091e6ce216140eab9f874019a0b73

Request headers

Host
www.hackread.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

Date
Mon, 23 Mar 2020 19:23:16 GMT
Server
Apache
Link
<https://www.hackread.com/wp-json/>; rel="https://api.w.org/", <https://www.hackread.com/?p=76358>; rel=shortlink
Cache-Control
max-age=2592000
Expires
Wed, 22 Apr 2020 19:23:16 GMT
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
18354
Keep-Alive
timeout=2, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
style.min.css
www.hackread.com/wp-includes/css/dist/block-library/
29 KB
5 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-includes/css/dist/block-library/style.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
4b8fe5c3d0e5ef7a6582185cbf5c535b5d369c8df1da98c03ed69833e55f474d

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
4767
Expires
Wed, 22 Apr 2020 19:23:17 GMT
blocks.style.build.css
www.hackread.com/wp-content/plugins/quick-adsense-reloaded/includes/gutenberg/dist/
184 B
514 B
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/quick-adsense-reloaded/includes/gutenberg/dist/blocks.style.build.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
36ed85dd058e4c2843e06146946e0ff1f9ace65760c22af5eb4f1b22319dddb5

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 22:13:31 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
155
Expires
Wed, 22 Apr 2020 19:23:17 GMT
styles.css
www.hackread.com/wp-content/plugins/contact-form-7/includes/css/
2 KB
1 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/contact-form-7/includes/css/styles.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
811e8960b8f79f14983e30df80a4ccc69d82430ccc0520d2a1a3d1405cfbb2a1

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Sat, 07 Mar 2020 22:25:04 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
677
Expires
Wed, 22 Apr 2020 19:23:17 GMT
mashsb.min.css
www.hackread.com/wp-content/plugins/mashsharer/assets/css/
46 KB
28 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/plugins/mashsharer/assets/css/mashsb.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
0500bd58f47403106f2f10da96d8d196941a02a4046e88611a59494557861f98

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Sun, 22 Mar 2020 12:13:59 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
28578
Expires
Wed, 22 Apr 2020 19:23:17 GMT
bootstrap.min.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
120 KB
20 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/bootstrap.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
31fbd99641c212a6ad3681a2397bde13c148c0ccd98385bce6a7eb7c81417d87

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
19883
Expires
Wed, 22 Apr 2020 19:23:17 GMT
mip.external.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
87 KB
18 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/mip.external.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
8afc1a2899ec2d2c29c203e17c69fe00b369d1aec1634a58653208d6db298958

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
17673
Expires
Wed, 22 Apr 2020 19:23:17 GMT
style.css
www.hackread.com/wp-content/themes/newsgamer/
113 KB
18 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/style.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
f9934e8ca51663923f923910d8b0ac7e849f46e87f65f75fcd513dac5e9f16d5

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Fri, 02 Nov 2018 17:34:12 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=100
Content-Length
18556
Expires
Wed, 22 Apr 2020 19:23:17 GMT
media-queries.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
26 KB
4 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/media-queries.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
b5b0cab3bf2be0ec59bd3b301364a639d993e99d0d526e436442065b9406067b

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
3798
Expires
Wed, 22 Apr 2020 19:23:17 GMT
dynamic.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
307 KB
12 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
e5e81b0740590e7983a893419a20568d9ee5b4518d25433f65d621d6c8a18d0d

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 15:11:14 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
12151
Expires
Wed, 22 Apr 2020 19:23:17 GMT
typography.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
19 KB
2 KB
Stylesheet
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/typography.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
106d020c501875011ff5aab5034da42ba83e096c17f901fda9e8f4c92ecde8b4

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 15:11:14 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
1771
Expires
Wed, 22 Apr 2020 19:23:17 GMT
jquery.js
www.hackread.com/wp-includes/js/jquery/
95 KB
33 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/jquery/jquery.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Wed, 22 May 2019 07:16:05 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
33776
Expires
Wed, 22 Apr 2020 19:23:17 GMT
jquery-migrate.min.js
www.hackread.com/wp-includes/js/jquery/
10 KB
4 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/jquery/jquery-migrate.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
48eb8b500ae6a38617b5738d2b3faec481922a7782246e31d2755c034a45cd5d

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Tue, 21 Jun 2016 19:13:07 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
4014
Expires
Wed, 22 Apr 2020 19:23:17 GMT
cookieconsent.min.css
cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/
4 KB
1 KB
Stylesheet
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4104 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
79b378e8f3c1fece39a1472a2e7d920ab80eb5881525a1622d9dbaa954aa23c3
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Mon, 23 Mar 2020 19:23:17 GMT
content-encoding
br
cf-cache-status
HIT
age
3975489
cf-ray
578a86ac3dc564fd-FRA
status
200
strict-transport-security
max-age=15780000; includeSubDomains
alt-svc
h3-27=":443"; ma=86400, h3-25=":443"; ma=86400, h3-24=":443"; ma=86400, h3-23=":443"; ma=86400
last-modified
Tue, 17 Jul 2018 12:30:51 GMT
server
cloudflare
etag
W/"5b4de17b-fe0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
expires
Sat, 13 Mar 2021 19:23:17 GMT
cache-control
public, max-age=30672000
timing-allow-origin
*
served-in-seconds
0.001
cookieconsent.min.js
cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/
20 KB
7 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4104 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cb41292903f6bd996333bdfe6fbc58e1dbdb6109074505ee3ea46373bb23be70
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 19:23:17 GMT
content-encoding
br
cf-cache-status
HIT
age
3927921
cf-ray
578a86ac3dc764fd-FRA
status
200
strict-transport-security
max-age=15780000; includeSubDomains
alt-svc
h3-27=":443"; ma=86400, h3-25=":443"; ma=86400, h3-24=":443"; ma=86400, h3-23=":443"; ma=86400
last-modified
Tue, 17 Jul 2018 12:30:51 GMT
server
cloudflare
etag
W/"5b4de17b-5148"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
expires
Sat, 13 Mar 2021 19:23:17 GMT
cache-control
public, max-age=30672000
timing-allow-origin
*
served-in-seconds
0.001
hackread-logo.png
www.hackread.com/wp-content/uploads/2015/12/
5 KB
6 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2015/12/hackread-logo.png
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c89ff58885f6c99c896f0d833df56bd3ffd048276624c7b31b934cadc9e57ee1

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 23:37:46 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
5519
Expires
Tue, 23 Mar 2021 19:23:17 GMT
webfont.js
ajax.googleapis.com/ajax/libs/webfont/1.5.3/
17 KB
7 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
36ef095d011c4ced97b0acef551ca36d76b95299518595dc1acab792a2344601
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 24 Feb 2020 21:06:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
2413021
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
6791
x-xss-protection
0
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 23 Feb 2021 21:06:16 GMT
wp-emoji-release.min.js
www.hackread.com/wp-includes/js/
14 KB
5 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/wp-emoji-release.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
f4799ef2939b8377cf33f07b07b6d90a4a245adbf1c6eaf47ee3b0fcefcc07fe

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
4622
Expires
Wed, 22 Apr 2020 19:23:17 GMT
css
fonts.googleapis.com/
4 KB
810 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto%7CRoboto+Slab&subset=latin
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
6a0c466dd72e7d2fdd6ed71f97d8b6901714d154c572aeee1f18685ff30c92f2
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
x-xss-protection
0
last-modified
Mon, 23 Mar 2020 19:23:17 GMT
server
ESF
date
Mon, 23 Mar 2020 19:23:17 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Mon, 23 Mar 2020 19:23:17 GMT
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Roboto%7CRoboto+Slab&subset=latin
Origin
https://www.hackread.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 27 Feb 2020 08:47:06 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:50 GMT
server
sffe
age
2198171
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
11016
x-xss-protection
0
expires
Fri, 26 Feb 2021 08:47:06 GMT
b46fad0ee0dc124087b9a350e249485f
secure.gravatar.com/avatar/
4 KB
4 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/b46fad0ee0dc124087b9a350e249485f?s=100&d=mm&r=g
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
63f0d921cde3442ee319b51ae162fe49f1e28d0dd19ba634f235e71119a01055

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

x-nc
MISS lb8.dfw.gravatar.com, MISS fra 3
date
Mon, 23 Mar 2020 19:23:18 GMT
last-modified
Fri, 02 Aug 2019 19:27:46 GMT
server
nginx
access-control-allow-origin
*
content-type
image/jpeg
status
200
cache-control
max-age=300
content-disposition
inline; filename="b46fad0ee0dc124087b9a350e249485f.jpeg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/b46fad0ee0dc124087b9a350e249485f?s=100&d=mm&r=g>; rel="canonical"
content-length
4096
expires
Mon, 23 Mar 2020 19:28:18 GMT
410njbnz9ol_go1_icon.ico
www.hackread.com/wp-content/uploads/2015/12/
37 KB
3 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2015/12/410njbnz9ol_go1_icon.ico
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
a83b6dc4e04e6e657a3c36c83d61e410ac5ef9615e0c3dfcf3c454cde68bf243

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Thu, 08 Aug 2019 11:48:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/x-icon
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
2909
Expires
Tue, 23 Mar 2021 19:23:18 GMT
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/
107 KB
38 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
9f5711f56e97c335749f0337929c3dd3b0463616fd727abeb24d760650727a84
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 19:23:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
39035
x-xss-protection
0
server
cafe
etag
15453439936067551719
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Mon, 23 Mar 2020 19:23:18 GMT
widgets.js
platform.twitter.com/
96 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40D1) /
Resource Hash
198c88313d65f4d2b30b218566c00f96002f78ae125643d5a73a669b46cab112

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 21:21:21 GMT
Server
ECS (fcn/40D1)
Age
1200
Etag
"3ce571864e8afdda3bc0a81ffbebe447+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=1800
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
29105
Digital-Revolution-hackers-russian-intel-agency-fsb-contractor-hacked-1.jpg
www.hackread.com/wp-content/uploads/2020/03/
27 KB
26 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/Digital-Revolution-hackers-russian-intel-agency-fsb-contractor-hacked-1.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
fcc7f4313eda466406fea23410a82f6829fc971a5394acc3697e90b36cf8efe4

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Sat, 21 Mar 2020 22:02:16 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
26222
Expires
Tue, 23 Mar 2021 19:23:18 GMT
fronton-vpn-768x498.jpg
www.hackread.com/wp-content/uploads/2020/03/
34 KB
32 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/fronton-vpn-768x498.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
ccce7b9e5f573e343a42fb52fabd6c50d475e5faeea0f6cdf912c0220fd752ca

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Sat, 21 Mar 2020 14:25:00 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
32122
Expires
Tue, 23 Mar 2021 19:23:18 GMT
ETYoVWhXQAEpOrP.jpg
www.hackread.com/wp-content/uploads/2020/03/
21 KB
15 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/ETYoVWhXQAEpOrP.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
dea703c68603279f9683233ac10719c270eb78bee4e85de9f5e159772192c94c

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Sat, 21 Mar 2020 14:33:13 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=94
Content-Length
15441
Expires
Tue, 23 Mar 2021 19:23:18 GMT
b46fad0ee0dc124087b9a350e249485f
secure.gravatar.com/avatar/
5 KB
5 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/b46fad0ee0dc124087b9a350e249485f?s=115&d=mm&r=g
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
90c59d72a87cb9ded609ce96b3752908e2ac97c6d199d8f2e815f270ce5c5f53

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

x-nc
MISS lb7.dfw.gravatar.com, MISS fra 3
date
Mon, 23 Mar 2020 19:23:18 GMT
last-modified
Fri, 02 Aug 2019 19:27:46 GMT
server
nginx
access-control-allow-origin
*
content-type
image/jpeg
status
200
cache-control
max-age=300
content-disposition
inline; filename="b46fad0ee0dc124087b9a350e249485f.jpeg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/b46fad0ee0dc124087b9a350e249485f?s=115&d=mm&r=g>; rel="canonical"
content-length
4889
expires
Mon, 23 Mar 2020 19:28:18 GMT
russian-intel-agency-fsb-contractor-hacked-277x190.jpg
www.hackread.com/wp-content/uploads/2020/03/
16 KB
16 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/russian-intel-agency-fsb-contractor-hacked-277x190.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
1e50d823c7e05ffb940fb48bcd74f6d54e5e9ee4d51db0500f81e2f457c6903f

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Sat, 21 Mar 2020 22:54:03 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=94
Content-Length
16240
Expires
Tue, 23 Mar 2021 19:23:18 GMT
virgin-media-t-mobile-data-breach-exposes-personal-data-1-277x190.jpg
www.hackread.com/wp-content/uploads/2020/03/
18 KB
18 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/virgin-media-t-mobile-data-breach-exposes-personal-data-1-277x190.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
ac6fdfbfc6e21879c80cf1dafcf919be78bc412719c6a3033f6961db09c7e0ff

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Sat, 07 Mar 2020 18:49:27 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
17994
Expires
Tue, 23 Mar 2021 19:23:18 GMT
facial-recognition-firm-clearview-ai-hacked-cliest-list-stolen-277x190.jpg
www.hackread.com/wp-content/uploads/2020/02/
14 KB
14 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/02/facial-recognition-firm-clearview-ai-hacked-cliest-list-stolen-277x190.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
badbe3f5dc0b4ba5df020c3d34b0233dfd34cdf60d17bb70df1536b45fd9260e

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Thu, 27 Feb 2020 15:35:47 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
14157
Expires
Tue, 23 Mar 2021 19:23:18 GMT
coronavirus-sextortion-scam-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
20 KB
21 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/coronavirus-sextortion-scam-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
81d1aa922759e01b41a5290dcf461e8664d016d18cc24da57bfa6a06c98a8786

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 14:00:42 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
20630
Expires
Tue, 23 Mar 2021 19:23:18 GMT
5-best-internet-service-locators-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
28 KB
28 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/5-best-internet-service-locators-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
3f214c1d454ec457f85673f397592774bbe57e444ec26b24f52ecaf3253d54df

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Sun, 22 Mar 2020 13:20:02 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=94
Content-Length
28085
Expires
Tue, 23 Mar 2021 19:23:18 GMT
russian-intel-agency-fsb-contractor-hacked-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
25 KB
26 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/russian-intel-agency-fsb-contractor-hacked-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
cecf0867f18db5cd665aa8f6664c55ac9b58c107f845739626da9b2802c5538b

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Sat, 21 Mar 2020 22:54:03 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=93
Content-Length
25748
Expires
Tue, 23 Mar 2021 19:23:18 GMT
researchers-find-german-army-secrets-on-laptop-bought-from-ebay-2-350x245.jpg
www.hackread.com/wp-content/uploads/2020/03/
19 KB
19 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/researchers-find-german-army-secrets-on-laptop-bought-from-ebay-2-350x245.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
08aca20624ad599c3bf70c31530cf13f846c223889ee6d8583e8fbc8e63776ff

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Fri, 20 Mar 2020 22:58:03 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
19071
Expires
Tue, 23 Mar 2021 19:23:18 GMT
hackread-logo.png
www.hackread.com/wp-content/uploads/2015/12/
5 KB
6 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2015/12/hackread-logo.png?x62286
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
c89ff58885f6c99c896f0d833df56bd3ffd048276624c7b31b934cadc9e57ee1

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 23:37:46 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=94
Content-Length
5519
Expires
Tue, 23 Mar 2021 19:23:18 GMT
scripts.js
www.hackread.com/wp-content/plugins/contact-form-7/includes/js/
14 KB
4 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/contact-form-7/includes/js/scripts.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
b7e17926b30342edecee8b3a93029ac51462e2b479277d8e077ba57173eb1900

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Sat, 07 Mar 2020 22:25:04 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
3993
Expires
Wed, 22 Apr 2020 19:23:17 GMT
mashsb.min.js
www.hackread.com/wp-content/plugins/mashsharer/assets/js/
4 KB
2 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/mashsharer/assets/js/mashsb.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
a13a1fe4a87c09c6e9122834b5351f80012e2c539b32bc1d33c6982efab21b4b

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Sun, 22 Mar 2020 12:13:59 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
1533
Expires
Wed, 22 Apr 2020 19:23:17 GMT
ta.js
www.hackread.com/wp-content/plugins/thirstyaffiliates/js/app/
10 KB
3 KB
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/thirstyaffiliates/js/app/ta.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
31c020e98d623d9d86a904d64f4b923726a1ab664bff40a7550866ea2d4f5e03

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Fri, 21 Feb 2020 18:34:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
2584
Expires
Wed, 22 Apr 2020 19:23:17 GMT
bootstrap.min.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/
36 KB
10 KB
Script
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/js/bootstrap.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
4a4de7903ea62d330e17410ea4db6c22bcbeb350ac6aa402d6b54b4c0cbed327

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
9745
Expires
Wed, 22 Apr 2020 19:23:17 GMT
mip.external.min.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/
135 KB
42 KB
Script
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/js/mip.external.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
cd605c7d4107ef5b9d511b13cb1e053db59d2daa7df99e1e5754e54c0c7cec87

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
42900
Expires
Wed, 22 Apr 2020 19:23:17 GMT
functions.js
www.hackread.com/wp-content/themes/newsgamer/assets/js/
17 KB
5 KB
Script
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/js/functions.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
afe9c8752a20b726104d37ce2f099e89eba3b62bb31a3307c5a9bbf9de3c2e2d

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=99
Content-Length
4438
Expires
Wed, 22 Apr 2020 19:23:17 GMT
wp-embed.min.js
www.hackread.com/wp-includes/js/
1 KB
1 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/wp-embed.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
2152557cac69e2bd7d6debef5037a9f554f9209cc305b8141b3329acb10c42b7

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
753
Expires
Wed, 22 Apr 2020 19:23:18 GMT
form.js
www.hackread.com/wp-content/plugins/akismet/_inc/
700 B
691 B
Script
General
Full URL
https://www.hackread.com/wp-content/plugins/akismet/_inc/form.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
0515cbd1f8aee97e1c8e0d1d015ca96c86def13e90d2e73bf813072ccc23d531

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 22:13:36 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=95
Content-Length
318
Expires
Wed, 22 Apr 2020 19:23:18 GMT
comment-reply.min.js
www.hackread.com/wp-includes/js/
2 KB
1 KB
Script
General
Full URL
https://www.hackread.com/wp-includes/js/comment-reply.min.js
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
31cb76c05cbf5d71466f93078e8ba0f6e39cd92d0acc86d385b8cf2899963695

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Sun, 17 Nov 2019 13:59:40 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
1093
Expires
Wed, 22 Apr 2020 19:23:18 GMT
js
www.googletagmanager.com/gtag/
75 KB
28 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-36230183-1
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
a977effc2f67a36a460e3e84c53c941542072203da1609c2e986aad52da7a216
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 19:23:18 GMT
content-encoding
br
status
200
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28648
x-xss-protection
0
last-modified
Mon, 23 Mar 2020 18:00:00 GMT
server
Google Tag Manager
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Mon, 23 Mar 2020 19:23:18 GMT
dynamic.css
www.hackread.com/wp-content/themes/newsgamer/assets/css/
64 KB
64 KB
Image
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Mon, 23 Mar 2020 15:11:14 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=96
Content-Length
12151
Expires
Wed, 22 Apr 2020 19:23:17 GMT
vertical-right-shadow.png
www.hackread.com/wp-content/themes/newsgamer/images/
3 KB
2 KB
Image
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/images/vertical-right-shadow.png
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
dfbf744b87270c5e4148371216220d1421d01dfdbf7ad35afff64763cb852484

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:34 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Content-Length
1777
Expires
Tue, 23 Mar 2021 19:23:18 GMT
top-left-shadow.png
www.hackread.com/wp-content/themes/newsgamer/images/
2 KB
2 KB
Image
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/images/top-left-shadow.png
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
3329ee5bb1edc52b18015e9bdedd275415080788f9c1fdd7165bca609874c9c5

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/dynamic.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:34 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Cache-Control
max-age=31536000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=98
Content-Length
1599
Expires
Tue, 23 Mar 2021 19:23:18 GMT
fontawesome-webfont.woff2
www.hackread.com/wp-content/themes/newsgamer/assets/fonts/
75 KB
76 KB
Font
General
Full URL
https://www.hackread.com/wp-content/themes/newsgamer/assets/fonts/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe

Request headers

Referer
https://www.hackread.com/wp-content/themes/newsgamer/assets/css/mip.external.css
Origin
https://www.hackread.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 23 Mar 2020 19:23:17 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Jul 2018 21:18:35 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
font/woff2
Cache-Control
max-age=2592000
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=97
Expires
Wed, 22 Apr 2020 19:23:17 GMT
BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjojISmb2RlV9Su1cai.woff
fonts.gstatic.com/s/robotoslab/v11/
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v11/BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjojISmb2RlV9Su1cai.woff
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1.5.3/webfont.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ce677696c57a6b97fee81d149546716b76f236cf7bb35845fa771feb91914f95
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Roboto%7CRoboto+Slab&subset=latin
Origin
https://www.hackread.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 27 Feb 2020 14:02:43 GMT
x-content-type-options
nosniff
last-modified
Tue, 04 Feb 2020 23:46:05 GMT
server
sffe
age
2179235
content-type
font/woff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
15244
x-xss-protection
0
expires
Fri, 26 Feb 2021 14:02:43 GMT
truncated
/
11 KB
11 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
745caffca4b97cf5cf2374d82c6dfb6fb7c7b694e85432f92ec4dcb35f4418c9

Request headers

Origin
https://www.hackread.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
application/octet-stream
serve.js.php
trends.revcontent.com/
4 KB
2 KB
Script
General
Full URL
https://trends.revcontent.com/serve.js.php?w=3420&t=rc_826&c=1584991398512&width=1600&referer=https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.200.11.189 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-200-11-189.compute-1.amazonaws.com
Software
Apache/2.4.25 (Debian) /
Resource Hash
95c51559a98f7cf7bb516f293d74fc47383f8feabd65471f27928f466d314814
Security Headers
Name Value
Strict-Transport-Security max-age=931536000; includeSubDomains

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 19:23:18 GMT
content-encoding
gzip
server
Apache/2.4.25 (Debian)
access-control-allow-origin
https://www.hackread.com
vary
Accept-Encoding
p3p
CP="NOI DSP COR NID ADM DEV OUR NOR CNT"
status
200
access-control-allow-credentials
true
strict-transport-security
max-age=931536000; includeSubDomains
content-type
text/html; charset=UTF-8
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.hackread.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 19:23:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.hackread.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 19:23:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/
224 KB
84 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a369e130c680ce4782af107acfcac873193d111897fb92351f12453ea11a19e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 19:23:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
85397
x-xss-protection
0
server
cafe
etag
2345445785748755544
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Mon, 23 Mar 2020 19:23:18 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20200316/r20190131/ Frame DA68
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20200316/r20190131/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20200316/r20190131/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Tue, 17 Mar 2020 01:29:30 GMT
expires
Tue, 31 Mar 2020 01:29:30 GMT
content-type
text/html; charset=UTF-8
etag
17714563530871986051
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
4497
x-xss-protection
0
cache-control
public, max-age=1209600
age
582828
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
ads
googleads.g.doubleclick.net/pagead/ Frame 5B38
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=3131926736&adf=3273086421&w=570&fwrn=4&lmt=1584991398&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398533&bpp=19&bdt=742&fdt=111&idt=112&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=6515175140065&frm=20&pv=2&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=49&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=306&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=1&uci=a!1&fsb=1&xpc=wKK73Jp6sQ&p=https%3A//www.hackread.com&dtd=128
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=3131926736&adf=3273086421&w=570&fwrn=4&lmt=1584991398&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398533&bpp=19&bdt=742&fdt=111&idt=112&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=6515175140065&frm=20&pv=2&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=49&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=306&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=1&uci=a!1&fsb=1&xpc=wKK73Jp6sQ&p=https%3A//www.hackread.com&dtd=128
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Mon, 23 Mar 2020 19:23:18 GMT
server
cafe
content-length
5954
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Mon, 23-Mar-2020 19:38:18 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Mon, 23 Mar 2020 19:23:18 GMT
cache-control
private
osd.js
www.googletagservices.com/activeview/js/current/
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b5f16203673e927018b568651ea731f86d62fafe2c57c9da92e4b442a7839af1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 19:23:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1584703791052826"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
27953
x-xss-protection
0
expires
Mon, 23 Mar 2020 19:23:18 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 8778
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=3686882433&adf=1650997229&w=300&lmt=1584991398&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&wgl=1&adsid=NT&dt=1584991398552&bpp=8&bdt=761&fdt=139&idt=139&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=806&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&fsb=1&xpc=2vByTlhwdz&p=https%3A//www.hackread.com&dtd=150
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=3686882433&adf=1650997229&w=300&lmt=1584991398&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&wgl=1&adsid=NT&dt=1584991398552&bpp=8&bdt=761&fdt=139&idt=139&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=806&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=2&uci=a!2&fsb=1&xpc=2vByTlhwdz&p=https%3A//www.hackread.com&dtd=150
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Mon, 23 Mar 2020 19:23:18 GMT
server
cafe
content-length
203
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Mon, 23-Mar-2020 19:38:18 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Mon, 23 Mar 2020 19:23:18 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame 5960
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=3131926736&adf=1980691087&w=570&fwrn=4&lmt=1584991398&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398560&bpp=5&bdt=769&fdt=150&idt=150&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=1085&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=3&uci=a!3&fsb=1&xpc=uR4F6isQqt&p=https%3A//www.hackread.com&dtd=155
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=3131926736&adf=1980691087&w=570&fwrn=4&lmt=1584991398&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398560&bpp=5&bdt=769&fdt=150&idt=150&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=1085&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=3&uci=a!3&fsb=1&xpc=uR4F6isQqt&p=https%3A//www.hackread.com&dtd=155
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Mon, 23 Mar 2020 19:23:18 GMT
server
cafe
content-length
5982
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Mon, 23-Mar-2020 19:38:18 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Mon, 23 Mar 2020 19:23:18 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame E01C
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=1082465236&adk=2719963377&adf=3077945714&w=459&fwrn=4&lmt=1584991398&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=459x250_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398565&bpp=5&bdt=774&fdt=157&idt=157&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=518&ady=1895&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=4&uci=a!4&btvi=1&fsb=1&xpc=ppnXYhWn1y&p=https%3A//www.hackread.com&dtd=161
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=1082465236&adk=2719963377&adf=3077945714&w=459&fwrn=4&lmt=1584991398&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=459x250_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398565&bpp=5&bdt=774&fdt=157&idt=157&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=518&ady=1895&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=4&uci=a!4&btvi=1&fsb=1&xpc=ppnXYhWn1y&p=https%3A//www.hackread.com&dtd=161
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Mon, 23 Mar 2020 19:23:18 GMT
server
cafe
content-length
5984
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Mon, 23-Mar-2020 19:38:18 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Mon, 23 Mar 2020 19:23:18 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame AAAE
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=3686882433&adf=3221973030&w=300&lmt=1584991398&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&wgl=1&adsid=NT&dt=1584991398571&bpp=4&bdt=780&fdt=162&idt=162&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=3324&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=5&uci=a!5&btvi=2&fsb=1&xpc=xr9Pss3B82&p=https%3A//www.hackread.com&dtd=169
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=3686882433&adf=3221973030&w=300&lmt=1584991398&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&wgl=1&adsid=NT&dt=1584991398571&bpp=4&bdt=780&fdt=162&idt=162&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=3324&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=5&uci=a!5&btvi=2&fsb=1&xpc=xr9Pss3B82&p=https%3A//www.hackread.com&dtd=169
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Mon, 23 Mar 2020 19:23:18 GMT
server
cafe
content-length
205
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Mon, 23-Mar-2020 19:38:18 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Mon, 23 Mar 2020 19:23:18 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame 60AD
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=3131926736&adf=10200015&w=570&fwrn=4&lmt=1584991398&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398575&bpp=5&bdt=784&fdt=173&idt=173&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=3603&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=6&uci=a!6&btvi=3&fsb=1&xpc=6NuciaDJWR&p=https%3A//www.hackread.com&dtd=178
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=3131926736&adf=10200015&w=570&fwrn=4&lmt=1584991398&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398575&bpp=5&bdt=784&fdt=173&idt=173&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2529609214733311&dssz=50&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=3603&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=6&uci=a!6&btvi=3&fsb=1&xpc=6NuciaDJWR&p=https%3A//www.hackread.com&dtd=178
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Mon, 23 Mar 2020 19:23:18 GMT
server
cafe
content-length
5977
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Mon, 23-Mar-2020 19:38:18 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Mon, 23 Mar 2020 19:23:18 GMT
cache-control
private
russian-intel-agency-fsb-contractor-hacked.jpg
www.hackread.com/wp-content/uploads/2020/03/
74 KB
74 KB
Image
General
Full URL
https://www.hackread.com/wp-content/uploads/2020/03/russian-intel-agency-fsb-contractor-hacked.jpg
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
6c991c5394db7f312d41d973f465dabbaa87540fd290d24a9df957ce84141da3

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Sat, 21 Mar 2020 22:53:57 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/jpeg
Cache-Control
max-age=31536000
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=2, max=93
Expires
Tue, 23 Mar 2021 19:23:18 GMT
admin-ajax.php
www.hackread.com/wp-admin/
14 B
591 B
XHR
General
Full URL
https://www.hackread.com/wp-admin/admin-ajax.php
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/wp-includes/js/jquery/jquery.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
67.227.194.195 Lansing, United States, ASN32244 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
fd1c95f8ecbef640c0f4808fd12c75017465615c5189f1766e2bd57b364d5125
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

Accept
*/*
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Origin
https://www.hackread.com
X-Requested-With
XMLHttpRequest
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Connection
Keep-Alive
Content-Length
34
Referrer-Policy
strict-origin-when-cross-origin
Server
Apache
X-Frame-Options
SAMEORIGIN
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Access-Control-Allow-Origin
https://www.hackread.com
Cache-Control
no-cache, must-revalidate, max-age=0
Access-Control-Allow-Credentials
true
X-Robots-Tag
noindex
Keep-Alive
timeout=2, max=95
Expires
Wed, 11 Jan 1984 05:00:00 GMT
widget_iframe.d0f13be8321eb432fba28cfc1c3351b1.html
platform.twitter.com/widgets/ Frame 18E5
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.d0f13be8321eb432fba28cfc1c3351b1.html?origin=https%3A%2F%2Fwww.hackread.com
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40FD) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
336307
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Mon, 23 Mar 2020 19:23:18 GMT
Etag
"9fa476ae827f556d5b037fe43632370d+gzip"
Last-Modified
Thu, 19 Mar 2020 21:12:59 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40FD)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
5825
ads
googleads.g.doubleclick.net/pagead/ Frame 6286
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&adk=1812271804&adf=3025194257&lmt=1584991398&plat=1%3A32776%2C2%3A16809992%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1584991398899&bpp=3&bdt=1108&fdt=4&idt=4&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250%2C570x90_0ads_al&nras=1&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=750050148876284&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=11&uci=a!b&fsb=1&dtd=11
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&adk=1812271804&adf=3025194257&lmt=1584991398&plat=1%3A32776%2C2%3A16809992%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1584991398899&bpp=3&bdt=1108&fdt=4&idt=4&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250%2C570x90_0ads_al&nras=1&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=750050148876284&dssz=59&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=670523557325424&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&ifi=11&uci=a!b&fsb=1&dtd=11
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Mon, 23 Mar 2020 19:23:18 GMT
server
cafe
content-length
34
x-xss-protection
0
set-cookie
IDE=AHWqTUn4DCVnIbDP9SJV5DTgUNhMK0-FwrLgVu_r_OQ2EQaYB4Bra6eGyWfsrsqK; expires=Sat, 17-Apr-2021 19:23:18 GMT; path=/; domain=.doubleclick.net; Secure; HttpOnly; SameSite=none test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT; SameSite=none; Secure
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
expires
Mon, 23 Mar 2020 19:23:18 GMT
cache-control
private
moment~timeline~tweet.99ce5e0e4617985354c5c426d7e1b9f4.js
platform.twitter.com/js/
24 KB
8 KB
Script
General
Full URL
https://platform.twitter.com/js/moment~timeline~tweet.99ce5e0e4617985354c5c426d7e1b9f4.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4193) /
Resource Hash
f13585ddb86f9ec0432f36eae40bcaabe3aad166eff8424b27082c2b8174a3a2

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 21:12:51 GMT
Server
ECS (fcn/4193)
Age
336307
Etag
"e137faa829d69782b030b8ae591989d1+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
7864
tweet.9aa9eda3c163ec539c16aef0d822d807.js
platform.twitter.com/js/
16 KB
6 KB
Script
General
Full URL
https://platform.twitter.com/js/tweet.9aa9eda3c163ec539c16aef0d822d807.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/419E) /
Resource Hash
f42a719c42729853609255c0f4e029aa6ae44a9a9925743394343a8a0265a110

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Mon, 23 Mar 2020 19:23:18 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 21:12:51 GMT
Server
ECS (fcn/419E)
Age
336307
Etag
"f87f962919a6220b09193a0007706785+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
5434
serve.js.php
trends.revcontent.com/
118 KB
36 KB
XHR
General
Full URL
https://trends.revcontent.com/serve.js.php?w=3420&t=rc_826&c=1584991398512&width=1600&site_url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&referer=&skip_demand=true
Requested by
Host: trends.revcontent.com
URL: https://trends.revcontent.com/serve.js.php?w=3420&t=rc_826&c=1584991398512&width=1600&referer=https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.200.11.189 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-200-11-189.compute-1.amazonaws.com
Software
Apache/2.4.25 (Debian) /
Resource Hash
ae69ff8296b67e414320be965940b6bf51a0cdb31893c6df6238287bfbbf6564
Security Headers
Name Value
Strict-Transport-Security max-age=931536000; includeSubDomains

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

date
Mon, 23 Mar 2020 19:23:19 GMT
content-encoding
gzip
server
Apache/2.4.25 (Debian)
status
200
strict-transport-security
max-age=931536000; includeSubDomains
p3p
CP="NOI DSP COR NID ADM DEV OUR NOR CNT"
access-control-allow-origin
https://www.hackread.com
access-control-allow-credentials
true
content-type
text/javascript; charset=utf-8
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://b1sync.zemanta.com/usersync/revcontent/?puid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DMGYzZjRlMTBhNjg2MWVlN2U...
  • https://b1sync.zemanta.com/usersync/revcontent/?cb=https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fexchange_uid%3DMGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%253D%26bidder%3D3%26bidder_uid%...
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&bidder=3&bidder_uid=u814_9X6s-hzk8Kh4HZA
35 B
213 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?exchange_uid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&bidder=3&bidder_uid=u814_9X6s-hzk8Kh4HZA
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.200.11.189 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-200-11-189.compute-1.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Mon, 23 Mar 2020 19:23:19 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

Pragma
no-cache
Date
Mon, 23 Mar 2020 19:23:19 GMT
P3p
CP="We do not support P3P header."
Location
https://trends.revcontent.com/cm/pixel_sync?exchange_uid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&bidder=3&bidder_uid=u814_9X6s-hzk8Kh4HZA
Cache-Control
no-cache, no-store, must-revalidate
Content-Type
text/html; charset=utf-8
Content-Length
175
Expires
Thu, 01 Dec 1994 16:00:00 GMT
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://ib.adnxs.com/getuid?https%3A%2F%2Ftrends.revcontent.com%2Fcm%2Fpixel_sync%3Fbidder%3D115%26bidder_uid%3D%24UID%26exchange_uid%3DMGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%253D&geo=35&rev_d...
  • https://ib.adnxs.com/bounce?%2Fgetuid%3Fhttps%253A%252F%252Ftrends.revcontent.com%252Fcm%252Fpixel_sync%253Fbidder%253D115%2526bidder_uid%253D%2524UID%2526exchange_uid%253DMGYzZjRlMTBhNjg2MWVlN2UxY...
  • https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=1388592644779095469&exchange_uid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&geo=35&rev_dt=1584991398
35 B
214 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=1388592644779095469&exchange_uid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&geo=35&rev_dt=1584991398
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.200.11.189 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-200-11-189.compute-1.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Mon, 23 Mar 2020 19:23:19 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

Pragma
no-cache
Date
Mon, 23 Mar 2020 19:23:21 GMT
AN-X-Request-Uuid
399c63eb-6875-4a81-b8b1-b6a272861b37
Content-Type
text/html; charset=utf-8
Server
nginx/1.13.4
Location
https://trends.revcontent.com/cm/pixel_sync?bidder=115&bidder_uid=1388592644779095469&exchange_uid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&geo=35&rev_dt=1584991398
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
X-Proxy-Origin
185.44.76.80; 185.44.76.80; 691.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.109:80
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://x.bidswitch.net/sync?ssp=revcontent&rev_dt=1584991398
  • https://x.bidswitch.net/ul_cb/sync?ssp=revcontent&rev_dt=1584991398
  • https://rtb.mfadsrvr.com/sync?ssp=bidswitch&bidswitch_ssp_id=revcontent&bsw_user_id=b35fc53a-b2b6-41a5-b33f-7d04ec84cab5
  • https://x.bidswitch.net/sync?dsp_id=250&expires=14&user_id=b7a36e22-cac9-44be-ac0f-dc14a3866cf5&ssp=revcontent
  • https://trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=b35fc53a-b2b6-41a5-b33f-7d04ec84cab5
35 B
215 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=b35fc53a-b2b6-41a5-b33f-7d04ec84cab5
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.200.11.189 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-200-11-189.compute-1.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Mon, 23 Mar 2020 19:23:19 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

status
302
date
Mon, 23 Mar 2020 19:23:19 GMT
cache-control
no-cache, no-store, must-revalidate
content-length
0
location
//trends.revcontent.com/cm/pixel_sync?bidder=118&bidder_uid=b35fc53a-b2b6-41a5-b33f-7d04ec84cab5
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
cookiesync
bttrack.com/pixel/
35 B
380 B
Image
General
Full URL
https://bttrack.com/pixel/cookiesync?source=0b0edea9-c9fe-4b9c-9bcd-a51022f2873f&publisherid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%253D&pushdata=109&secure=1&rev_dt=1584991398
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
192.132.33.46 , United States, ASN18568 (BIDTELLECT, US),
Reverse DNS
46.bidtellect.com
Software
Microsoft-IIS/8.5 /
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

X-ServerName
Track004-dc3
Pragma
no-cache
Date
Mon, 23 Mar 2020 19:23:18 GMT
X-AspNetMvc-Version
5.2
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
P3P
CP="CAO DSP COR ADMo DEVo PSAo PSDo HISo IVAo IVDo OUR IND OTC"
Cache-Control
private,no-cache
Content-Type
image/gif
Content-Length
35
Expires
-1
pixel_sync
trends.revcontent.com/cm/
Redirect Chain
  • https://rtb.mfadsrvr.com/sync?ssp=revcontent&ssp_user_id=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&rev_dt=1584991398
  • https://rtb.mfadsrvr.com/ul_cb/sync?ssp=revcontent&ssp_user_id=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY%3D&rev_dt=1584991398
  • https://trends.revcontent.com/cm/pixel_sync?exchange_uid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY=&bidder=154&bidder_uid=b7a36e22-cac9-44be-ac0f-dc14a3866cf5
35 B
215 B
Image
General
Full URL
https://trends.revcontent.com/cm/pixel_sync?exchange_uid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY=&bidder=154&bidder_uid=b7a36e22-cac9-44be-ac0f-dc14a3866cf5
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.200.11.189 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-200-11-189.compute-1.amazonaws.com
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Mon, 23 Mar 2020 19:23:19 GMT
x-powered-by
Express
content-length
35
content-type
image/gif

Redirect headers

Location
//trends.revcontent.com/cm/pixel_sync?exchange_uid=MGYzZjRlMTBhNjg2MWVlN2UxYTUxMGQxZDBiYjFkYjY=&bidder=154&bidder_uid=b7a36e22-cac9-44be-ac0f-dc14a3866cf5
Date
Mon, 23 Mar 2020 19:23:19 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
0
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
analytics.js
www.google-analytics.com/
44 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-36230183-1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
eaf1b128b927ac2868755cb7366d35554255c8af362235afe270f9614f8c806d
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 06 Feb 2020 00:21:02 GMT
server
Golfe2
age
2986
date
Mon, 23 Mar 2020 18:33:32 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
18174
expires
Mon, 23 Mar 2020 20:33:32 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 5E88
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=600&slotname=3047884612&adk=2945537484&adf=1398944667&w=300&lmt=1584991398&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&wgl=1&adsid=NT&dt=1584991398595&bpp=5&bdt=804&fdt=402&idt=402&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250%2C570x90_0ads_al%2C0x0&nras=1&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2298162520784892&dssz=62&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1113&ady=945&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQWYUJkZVWYJgyUiFAPd6RHlGn16eoA31VJ1lZMjZxBB_7Q4dbLDBg%2CABP-KfRKvaEV7oVOu0jHMrGB4HV-b7mxPYWlgPQ3WpCXzq2id8ZrLiLGe80%2CABP-KfRUJfe-4Q45cXy04tFIA__dXYrr0eskW5kSQBoPuiruIXAYwZqawO4%2CABP-KfR9siMQsAkhY-JrDZta3V99iXtaDhPbaIvz2tdolIgtUp9sVKL6zsk&pvsid=670523557325424&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7Cm%7CoeE%7C&abl=NS&pfx=0&fu=16&bc=31&ifi=10&uci=a!a&fsb=1&xpc=o6DrI7qFYO&p=https%3A//www.hackread.com&dtd=406
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=600&slotname=3047884612&adk=2945537484&adf=1398944667&w=300&lmt=1584991398&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&wgl=1&adsid=NT&dt=1584991398595&bpp=5&bdt=804&fdt=402&idt=402&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250%2C570x90_0ads_al%2C0x0&nras=1&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2298162520784892&dssz=62&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1113&ady=945&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQWYUJkZVWYJgyUiFAPd6RHlGn16eoA31VJ1lZMjZxBB_7Q4dbLDBg%2CABP-KfRKvaEV7oVOu0jHMrGB4HV-b7mxPYWlgPQ3WpCXzq2id8ZrLiLGe80%2CABP-KfRUJfe-4Q45cXy04tFIA__dXYrr0eskW5kSQBoPuiruIXAYwZqawO4%2CABP-KfR9siMQsAkhY-JrDZta3V99iXtaDhPbaIvz2tdolIgtUp9sVKL6zsk&pvsid=670523557325424&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7Cm%7CoeE%7C&abl=NS&pfx=0&fu=16&bc=31&ifi=10&uci=a!a&fsb=1&xpc=o6DrI7qFYO&p=https%3A//www.hackread.com&dtd=406
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUn4DCVnIbDP9SJV5DTgUNhMK0-FwrLgVu_r_OQ2EQaYB4Bra6eGyWfsrsqK
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Mon, 23 Mar 2020 19:23:19 GMT
server
cafe
content-length
205
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
ads
googleads.g.doubleclick.net/pagead/ Frame F47C
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=3686882433&adf=1543069684&w=300&lmt=1584991399&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&wgl=1&adsid=NT&dt=1584991398580&bpp=5&bdt=789&fdt=285&idt=285&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250%2C570x90_0ads_al%2C0x0%2C300x600&nras=1&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2298162520784892&dssz=62&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=4645&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQWYUJkZVWYJgyUiFAPd6RHlGn16eoA31VJ1lZMjZxBB_7Q4dbLDBg%2CABP-KfRKvaEV7oVOu0jHMrGB4HV-b7mxPYWlgPQ3WpCXzq2id8ZrLiLGe80%2CABP-KfRUJfe-4Q45cXy04tFIA__dXYrr0eskW5kSQBoPuiruIXAYwZqawO4%2CABP-KfR9siMQsAkhY-JrDZta3V99iXtaDhPbaIvz2tdolIgtUp9sVKL6zsk&pvsid=670523557325424&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=7&uci=a!7&btvi=4&fsb=1&xpc=CQoagXar3m&p=https%3A//www.hackread.com&dtd=432
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=250&slotname=3421156210&adk=3686882433&adf=1543069684&w=300&lmt=1584991399&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&wgl=1&adsid=NT&dt=1584991398580&bpp=5&bdt=789&fdt=285&idt=285&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250%2C570x90_0ads_al%2C0x0%2C300x600&nras=1&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2298162520784892&dssz=62&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=593&ady=4645&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQWYUJkZVWYJgyUiFAPd6RHlGn16eoA31VJ1lZMjZxBB_7Q4dbLDBg%2CABP-KfRKvaEV7oVOu0jHMrGB4HV-b7mxPYWlgPQ3WpCXzq2id8ZrLiLGe80%2CABP-KfRUJfe-4Q45cXy04tFIA__dXYrr0eskW5kSQBoPuiruIXAYwZqawO4%2CABP-KfR9siMQsAkhY-JrDZta3V99iXtaDhPbaIvz2tdolIgtUp9sVKL6zsk&pvsid=670523557325424&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=16&bc=31&ifi=7&uci=a!7&btvi=4&fsb=1&xpc=CQoagXar3m&p=https%3A//www.hackread.com&dtd=432
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUn4DCVnIbDP9SJV5DTgUNhMK0-FwrLgVu_r_OQ2EQaYB4Bra6eGyWfsrsqK
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Mon, 23 Mar 2020 19:23:19 GMT
server
cafe
content-length
205
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
syndication
syndication.twitter.com/i/jot/
43 B
338 B
Image
General
Full URL
https://syndication.twitter.com/i/jot/syndication?dnt=1&l=%7B%22_category_%22%3A%22syndicated_impression%22%2C%22triggered_on%22%3A1584991399025%2C%22dnt%22%3Atrue%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22action%22%3A%22impression%22%7D%7D
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.200 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_f /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
65
x-xss-protection
0
x-response-time
117
pragma
no-cache
last-modified
Mon, 23 Mar 2020 19:23:19 GMT
server
tsa_f
x-frame-options
SAMEORIGIN
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
635935720c8cefd238a70b79d884949b
x-transaction
0019249d00980866
expires
Tue, 31 Mar 1981 05:00:00 GMT
tweets.json
cdn.syndication.twimg.com/
10 KB
3 KB
Script
General
Full URL
https://cdn.syndication.twimg.com/tweets.json?callback=__twttr.callbacks.cb0&ids=1240226232102539267&lang=en&suppress_response_codes=true&theme=light&tz=GMT%2B0100
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
tsa_f /
Resource Hash
1277d0140aee3b80b54467a283e7c72731f6b37e71ba67776ca7a66c0ff31a4b
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 19:23:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
content-disposition
attachment; filename=jsonp.jsonp
strict-transport-security
max-age=631138519
content-length
2288
x-xss-protection
0
x-response-time
143
last-modified
Mon, 23 Mar 2020 19:23:19 GMT
server
tsa_f
x-frame-options
SAMEORIGIN
content-type
application/javascript;charset=utf-8
cache-control
must-revalidate, max-age=60
x-connection-hash
d3d3dea6982acb105d11b271aca84bd6
timing-allow-origin
*
x-transaction
0034fdcf0026fef7
expires
Mon, 23 Mar 2020 19:24:19 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=603804334&t=pageview&_s=1&dl=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&ul=en-us&de=UTF-8&dt=Russian%20In...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-36230183-1&cid=3621619.1584991399&jid=47175489&_gid=850467146.1584991399&gjid=682227757&_v=j81&z=1414940166
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=3621619.1584991399&jid=47175489&_v=j81&z=1414940166
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=3621619.1584991399&jid=47175489&_v=j81&z=1414940166&slf_rd=1&random=3451843135
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=3621619.1584991399&jid=47175489&_v=j81&z=1414940166&slf_rd=1&random=3451843135
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4860:4802:38::75 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 23 Mar 2020 19:23:19 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Mon, 23 Mar 2020 19:23:19 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-36230183-1&cid=3621619.1584991399&jid=47175489&_v=j81&z=1414940166&slf_rd=1&random=3451843135
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
tweet.d41c1d7e4bac44f4658ca45d09564e79.light.ltr.css
platform.twitter.com/css/
52 KB
12 KB
Stylesheet
General
Full URL
https://platform.twitter.com/css/tweet.d41c1d7e4bac44f4658ca45d09564e79.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E5) /
Resource Hash
ca4627707c434a5db3dca160e8883c09864ddb7ab4b28af47dd302d47062fef6

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Mon, 23 Mar 2020 19:23:19 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 21:12:48 GMT
Server
ECS (fcn/40E5)
Age
336308
Etag
"1668dde994ebdac8e42a2bdbba968e61+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
11585
tweet.d41c1d7e4bac44f4658ca45d09564e79.light.ltr.css
platform.twitter.com/css/
52 KB
52 KB
Image
General
Full URL
https://platform.twitter.com/css/tweet.d41c1d7e4bac44f4658ca45d09564e79.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E5) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 23 Mar 2020 19:23:19 GMT
Content-Encoding
gzip
Last-Modified
Thu, 19 Mar 2020 21:12:48 GMT
Server
ECS (fcn/40E5)
Age
336308
Etag
"1668dde994ebdac8e42a2bdbba968e61+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
11585
ads
googleads.g.doubleclick.net/pagead/ Frame A20B
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=3131926736&adf=3303316922&w=570&fwrn=4&lmt=1584991399&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398585&bpp=5&bdt=793&fdt=330&idt=331&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250%2C570x90_0ads_al%2C0x0%2C300x600%2C300x250&nras=1&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2298162520784892&dssz=62&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=4693&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQWYUJkZVWYJgyUiFAPd6RHlGn16eoA31VJ1lZMjZxBB_7Q4dbLDBg%2CABP-KfRKvaEV7oVOu0jHMrGB4HV-b7mxPYWlgPQ3WpCXzq2id8ZrLiLGe80%2CABP-KfRUJfe-4Q45cXy04tFIA__dXYrr0eskW5kSQBoPuiruIXAYwZqawO4%2CABP-KfR9siMQsAkhY-JrDZta3V99iXtaDhPbaIvz2tdolIgtUp9sVKL6zsk&pvsid=670523557325424&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=8&uci=a!8&btvi=5&fsb=1&xpc=fpeJrhIz5w&p=https%3A//www.hackread.com&dtd=679
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-3675825324474978&output=html&h=90&slotname=1082465236&adk=3131926736&adf=3303316922&w=570&fwrn=4&lmt=1584991399&rafmt=10&psa=0&guci=1.2.0.0.2.2.0.0&format=570x90_0ads_al&url=https%3A%2F%2Fwww.hackread.com%2Frussian-intel-agency-fsb-contractor-hacked%2F&flash=0&fwr=0&fwrattr=true&wgl=1&adsid=NT&dt=1584991398585&bpp=5&bdt=793&fdt=330&idt=331&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=570x90_0ads_al%2C300x250%2C570x90_0ads_al%2C459x250_0ads_al%2C300x250%2C570x90_0ads_al%2C0x0%2C300x600%2C300x250&nras=1&correlator=6515175140065&frm=20&pv=1&ga_vid=3621619.1584991399&ga_sid=1584991399&ga_hid=603804334&ga_fc=0&iag=0&icsg=2298162520784892&dssz=62&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=458&ady=4693&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=ABP-KfQWYUJkZVWYJgyUiFAPd6RHlGn16eoA31VJ1lZMjZxBB_7Q4dbLDBg%2CABP-KfRKvaEV7oVOu0jHMrGB4HV-b7mxPYWlgPQ3WpCXzq2id8ZrLiLGe80%2CABP-KfRUJfe-4Q45cXy04tFIA__dXYrr0eskW5kSQBoPuiruIXAYwZqawO4%2CABP-KfR9siMQsAkhY-JrDZta3V99iXtaDhPbaIvz2tdolIgtUp9sVKL6zsk&pvsid=670523557325424&rx=0&eae=0&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&ifi=8&uci=a!8&btvi=5&fsb=1&xpc=fpeJrhIz5w&p=https%3A//www.hackread.com&dtd=679
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUn4DCVnIbDP9SJV5DTgUNhMK0-FwrLgVu_r_OQ2EQaYB4Bra6eGyWfsrsqK
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Mon, 23 Mar 2020 19:23:19 GMT
server
cafe
content-length
6039
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
jpJJQF-H_normal.png
pbs.twimg.com/profile_images/1122073184528998400/
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1122073184528998400/jpJJQF-H_normal.png
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4193) /
Resource Hash
d5f053f7138bf2398caa0e437822cfb87a853674904a7773be79710647873ea0
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:19 GMT
x-content-type-options
nosniff
age
552214
x-cache
HIT
status
200
content-length
4999
x-response-time
130
surrogate-key
profile_images profile_images/bucket/0 profile_images/1122073184528998400
last-modified
Sat, 27 Apr 2019 09:39:08 GMT
server
ECS (fcn/4193)
strict-transport-security
max-age=631138519
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
029880bcc8cfb3d1b790144661d718a2
accept-ranges
bytes
ETYoVeWWoAIFATQ
pbs.twimg.com/media/
7 KB
7 KB
Image
General
Full URL
https://pbs.twimg.com/media/ETYoVeWWoAIFATQ?format=png&name=360x360
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/4191) /
Resource Hash
ad55df440ed87665acf63adf04c2a4a9d2d63c96a6ee7b523c1e7c6b4c6f5567
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:19 GMT
x-content-type-options
nosniff
age
463446
x-cache
HIT
status
200
content-length
7282
x-response-time
152
surrogate-key
media media/bucket/7 media/1240223096776335362
last-modified
Wed, 18 Mar 2020 10:24:43 GMT
server
ECS (fcn/4191)
strict-transport-security
max-age=631138519
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
3c15e8f3382ffb5e88c95df7b80a408a
accept-ranges
bytes
ETYoVWpXYAU7iJu
pbs.twimg.com/media/
13 KB
13 KB
Image
General
Full URL
https://pbs.twimg.com/media/ETYoVWpXYAU7iJu?format=jpg&name=360x360
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40B5) /
Resource Hash
2af7935ca2f540e376352f98eea8e3253be30d4a2b547c455c656adc4f982c58
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:19 GMT
x-content-type-options
nosniff
age
463446
x-cache
HIT
status
200
content-length
13158
x-response-time
145
surrogate-key
media media/bucket/5 media/1240223094708592645
last-modified
Wed, 18 Mar 2020 10:24:42 GMT
server
ECS (fcn/40B5)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
db1e218a06b5de03661f02f413eff045
accept-ranges
bytes
ETYoVWsXYAEHs70
pbs.twimg.com/media/
31 KB
31 KB
Image
General
Full URL
https://pbs.twimg.com/media/ETYoVWsXYAEHs70?format=png&name=360x360
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40FD) /
Resource Hash
355bae3bef40f206463dec8074e8302c9acfd794ff61d198480ee43b51b0c3c2
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:19 GMT
x-content-type-options
nosniff
age
463446
x-cache
HIT
status
200
content-length
31252
x-response-time
151
surrogate-key
media media/bucket/9 media/1240223094721175553
last-modified
Wed, 18 Mar 2020 10:24:42 GMT
server
ECS (fcn/40FD)
strict-transport-security
max-age=631138519
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
84e06c4f2c938f10a3f01e635d4353de
accept-ranges
bytes
ETYoVWhXQAEpOrP
pbs.twimg.com/media/
38 KB
38 KB
Image
General
Full URL
https://pbs.twimg.com/media/ETYoVWhXQAEpOrP?format=png&name=360x360
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40E8) /
Resource Hash
495293cfed7b06d42f5610180a5ded5b88f899e7ebb3a95422815ad86ee6bb15
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:19 GMT
x-content-type-options
nosniff
age
463446
x-cache
HIT
status
200
content-length
38767
x-response-time
153
surrogate-key
media media/bucket/8 media/1240223094675030017
last-modified
Wed, 18 Mar 2020 10:24:42 GMT
server
ECS (fcn/40E8)
strict-transport-security
max-age=631138519
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
ad08431a1ff987fdaa6fe827f2e394df
accept-ranges
bytes
truncated
/
825 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4468e35646c229b518e5f398c5a3d6b15ba1351a71ef22692129bb32f5030ac0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
572 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0341a4478ce861ef85c819b913fa0a2501836a6a2ffda8643e95e39f4a2a7de0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
512 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49c2a3cf0f363bf387c06a35a4a4e6c7255799b3776bed55914862136d783028

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
600 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c50a17e8272b9359e4b62e0f305e201f359cb5bd2245671c115d031f2b7f68d0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
323 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c3531ed2c934e5daee80955db42a0245d666131e6322c6ec6985992922520ab4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
rev2.min.css
cdn.revcontent.com/build/css/
83 KB
26 KB
Stylesheet
General
Full URL
https://cdn.revcontent.com/build/css/rev2.min.css?v=b8105739289accd23ebdbf436f27bfccb40d2ffe
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
92092346680de76a5598060f7827a818c95b1ae9dc8b527d6123dca3778b51d9

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Mon, 23 Mar 2020 19:23:19 GMT
content-encoding
gzip
last-modified
Wed, 18 Mar 2020 21:50:06 GMT
access-control-allow-origin
*
etag
"1584568206"
x-hw
1584991399.cds061.lo4.hn,1584991399.cds221.lo4.c
content-type
text/css
status
200
cache-control
max-age=70556
accept-ranges
bytes
content-length
26346
rev2.min.js
cdn.revcontent.com/build/js/
280 KB
98 KB
Script
General
Full URL
https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
de08c0b7fbe466f95d1706487b3d0c468598ea2a1b8becd8e174a5cd0de6bc42

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 19:23:19 GMT
content-encoding
gzip
last-modified
Wed, 18 Mar 2020 21:50:06 GMT
access-control-allow-origin
*
etag
"1584568206"
x-hw
1584991399.cds061.lo4.hn,1584991399.cds038.lo4.c
content-type
application/javascript
status
200
cache-control
max-age=28
accept-ranges
bytes
content-length
100286
score.min.js
js.ad-score.com/
280 KB
96 KB
Script
General
Full URL
https://js.ad-score.com/score.min.js?pid=1000177
Requested by
Host: www.hackread.com
URL: https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:1901:0:fcac:: , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
0251a68ec0e99d80c757934b267b601c09d07ff6bf25fa67f6183a4d3c73715b

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 15:20:14 GMT
content-encoding
gzip
last-modified
Mon, 23 Mar 2020 15:20:14 GMT
age
14585
access-control-allow-methods
GET
content-type
application/javascript
status
200
alt-svc
clear
cache-control
public, max-age=86400
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
access-control-allow-origin
*
content-length
97819
via
1.1 google
expires
Tue, 24 Mar 2020 15:20:14 GMT
jot.html
platform.twitter.com/ Frame 1AB2
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/41A3) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
Origin
https://www.hackread.com
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
336308
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Mon, 23 Mar 2020 19:23:19 GMT
Etag
"d9592a6c704736fa4da218d4357976dd"
Last-Modified
Thu, 19 Mar 2020 21:21:20 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/41A3)
X-Cache
HIT
Content-Length
80

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Mon, 23 Mar 2020 19:23:19 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Mon, 23 Mar 2020 19:23:19 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_f
strict-transport-security
max-age=631138519
x-connection-hash
635935720c8cefd238a70b79d884949b
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
121
x-transaction
00c1ae8700624502
x-tsa-request-body-time
0
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
cors
data.ad-score.com/data/
42 B
711 B
XHR
General
Full URL
https://data.ad-score.com/data/cors?pm_st=TnFPeykZAKMXLBvNgTNYTbojkxPoOSCa-EU/fPs9ldVP8Nz4Z037KFkvJ-E0/JOMRgbVrjMg==&pm_ct=dbff17ad8024548e9263c03d&pm_pl=1584991399950&pm_td=14&pid=1000177&en=1&callback=__pm_glbl_vt0lQbFpbsi238UasbY5fxRU._gc1&v=b8c2508
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
130.211.115.4 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
4.115.211.130.bc.googleusercontent.com
Software
/
Resource Hash
04bf9adfe48c38e5f252b2df9314bda4a8994b7c286cbac026ed5837020b7b11

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Mon, 23 Mar 2020 19:23:20 GMT
Age
0
Access-Control-Allow-Methods
POST
P3p
CP="CURa ADMa DEVa TAIi PSAi PSDi IVAi IVDi CONi HISa TELi OUR IND DSP CAO COR"
Access-Control-Allow-Origin
https://www.hackread.com
Cache-Control
post-check=0, pre-check=0, false, proxy-revalidate, no-cache, no-cache=Set-Cookie, no-store, must-revalidate, max-age=0, s-maxage=0
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/plain; charset=utf-8
Content-Length
42
fe0f7d69-06ef-4347-8388-35be4b33dc02
https://www.hackread.com/
720 B
0
Other
General
Full URL
blob:https://www.hackread.com/fe0f7d69-06ef-4347-8388-35be4b33dc02
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d2ec07a6e77bc3abc56f801e141e9889c018ca8e96dfbe4042f49378699ee85f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
worker

Response headers

Content-Length
720
Content-Type
application/javascript
x.html
js.ad-score.com/ Frame 2340
0
0
Document
General
Full URL
https://js.ad-score.com/x.html?pid=1000177
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:1901:0:fcac:: , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

:method
GET
:authority
js.ad-score.com
:scheme
https
:path
/x.html?pid=1000177
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/

Response headers

status
200
date
Mon, 23 Mar 2020 16:05:42 GMT
content-type
text/html; charset=utf-8
accept-ranges
bytes
access-control-allow-credentials
true
access-control-allow-methods
GET
access-control-allow-origin
*
content-encoding
gzip
last-modified
Mon, 23 Mar 2020 06:02:04 GMT
via
1.1 google
content-length
5754
age
11858
cache-control
public, max-age=86400
alt-svc
clear
truncated
/
68 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5e89733d8a8e055100cda68bf7a712ab0e1b24fefee7e39792b47cb5ff7c3cb1

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
cors
data.ad-score.com/data/
1 B
272 B
XHR
General
Full URL
https://data.ad-score.com/data/cors?pm_st=TnFPeykZAKMXLBvNgTNYTbojkxPoOSCa-EU/fPs9ldVP8Nz4Z037KFkvJ-E0/JOMRgbVrjMg==&pm_ct=dbff17ad8024548e9263c03d&pm_pl=1584991399950&pm_td=243&pid=1000177&en=1&callback=__pm_glbl_vt0lQbFpbsi238UasbY5fxRU._gc2&v=b8c2508
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
130.211.115.4 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
4.115.211.130.bc.googleusercontent.com
Software
/
Resource Hash
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://www.hackread.com
Date
Mon, 23 Mar 2020 19:23:20 GMT
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
1
Access-Control-Allow-Methods
POST
Content-Type
text/plain; charset=utf-8
truncated
/
35 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
imp.php
trends.revcontent.com/
0
205 B
XHR
General
Full URL
https://trends.revcontent.com/imp.php
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.200.11.189 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-200-11-189.compute-1.amazonaws.com
Software
Apache/2.4.25 (Debian) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=931536000; includeSubDomains

Request headers

Accept
*/*
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Mon, 23 Mar 2020 19:23:21 GMT
server
Apache/2.4.25 (Debian)
status
200
strict-transport-security
max-age=931536000; includeSubDomains
content-type
text/html; charset=UTF-8
access-control-allow-origin
https://www.hackread.com
access-control-allow-credentials
true
content-length
0
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gda&tv=r20200316&st=env
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
1c12aef87f9faabf6541673681706555a80a26b7da7723e327a5cf94895eb27e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Mon, 23 Mar 2020 19:23:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5143
x-xss-protection
0
640x480.jpg
static.earnify.com/m/ca4368be-f78c-4cfd-ba34-f3a33e0d2821/1eebf3da-b019-4224-9d74-f19545f04b53/
96 KB
97 KB
Image
General
Full URL
https://static.earnify.com/m/ca4368be-f78c-4cfd-ba34-f3a33e0d2821/1eebf3da-b019-4224-9d74-f19545f04b53/640x480.jpg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:870f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d59475529de7fe68843b78a33f04dfd3115c269f208a3dc6e4a575cc36960e03

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:20 GMT
cf-cache-status
REVALIDATED
x-amz-request-id
EE998F45CE378067
cf-polished
origFmt=jpeg, origSize=167340
status
200
content-disposition
inline; filename="640x480.webp"
cf-bgj
imgq:100
alt-svc
h3-27=":443"; ma=86400, h3-25=":443"; ma=86400, h3-24=":443"; ma=86400, h3-23=":443"; ma=86400
content-length
98124
x-amz-id-2
37pJByPEfZcJWeOkF7gaLGKeXmHSXq1iQGF75gvalvAEkFTncHLHT2hFA3enYwenqy7M/2L3zxc=
last-modified
Mon, 23 Mar 2020 05:36:54 GMT
server
cloudflare
etag
"1c7855688851cbe94c7f9fe35be7e75e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept
x-amz-version-id
VZtR7LMNWmKp0RFW0AoX3DBqrdhbxUBE
content-type
image/webp
cache-control
public, max-age=7200
accept-ranges
bytes
cf-ray
578a86bc1ccfd6c5-FRA
expires
Mon, 23 Mar 2020 21:23:20 GMT
/
img.revcontent.com/
52 KB
52 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/77d57fd8349c0d86488619b21b35f0dd.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
b576190a8ea112ddddb8237ef38ba7e285395e670a2fe050ddc2dee5b06d6494

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:20 GMT
last-modified
Thu, 16 Jan 2020 22:47:19 GMT
etag
"1579214839"
x-hw
1584991400.cds063.lo4.hn,1584991400.cds056.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
53409
/
img.revcontent.com/
39 KB
39 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/5e50fd6def5f06-87525306.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
d94a8f2e5f18f1c87d26cb47766c6f5dc65030928766c6379891c4074332e1cd

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:20 GMT
last-modified
Sat, 22 Feb 2020 10:07:43 GMT
etag
"1582366063"
x-hw
1584991400.cds063.lo4.hn,1584991400.cds258.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
39610
/
img.revcontent.com/
20 KB
20 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/5e7763ca7604b4-98808865.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
6e495ea3676021ff9dc2150f349d19577c8a4b2b42423a49de90f68cb1fd4815

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:20 GMT
last-modified
Sun, 22 Mar 2020 13:10:35 GMT
etag
"1584882635"
x-hw
1584991400.cds063.lo4.hn,1584991400.cds253.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
20130
/
img.revcontent.com/
43 KB
44 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15805714371652150840.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
2268477350b6858d1d4ea280ea8363946ba979ea71a6de93beb329e560537298

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:20 GMT
last-modified
Sat, 01 Feb 2020 15:37:18 GMT
etag
"1580571438"
x-hw
1584991400.cds063.lo4.hn,1584991400.cds033.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
44441
/
img.revcontent.com/
41 KB
41 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/15197651582135279853.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
638fe957bbac3f5c8ceb07f22c8241b861ee5c969f344fe80317f2748ec90c30

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:20 GMT
last-modified
Tue, 27 Feb 2018 20:59:19 GMT
etag
"1519765159"
x-hw
1584991400.cds063.lo4.hn,1584991400.cds095.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
42265
/
img.revcontent.com/
34 KB
34 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/5e78b0ff47d4a4-07431216.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
5a6abe671a7791aa29fb805870467bd8592bba5c5f84ef5c05ff991535b4bc53

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:20 GMT
last-modified
Mon, 23 Mar 2020 12:52:16 GMT
etag
"1584967936"
x-hw
1584991400.cds063.lo4.hn,1584991400.cds087.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
34565
/
img.revcontent.com/
23 KB
23 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/461587693838e407bb988162c9610a35.jpeg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
9bd0e3fa6f46f54c9d845685bcd530833866a764c5ff417ef4b95ff851bd8184

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:20 GMT
last-modified
Thu, 22 Nov 2018 14:22:05 GMT
etag
"1542896525"
x-hw
1584991400.cds063.lo4.hn,1584991400.cds034.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
23253
/
img.revcontent.com/
59 KB
59 KB
Image
General
Full URL
https://img.revcontent.com/?url=https://revcontent-p0.s3.amazonaws.com/content/images/5e70e2f83cb353-67835351.jpg&static=true&pos=face&h=315&w=420&static=true&fmt=jpeg
Requested by
Host: cdn.revcontent.com
URL: https://cdn.revcontent.com/build/js/rev2.min.js?v=b8105739289accd23ebdbf436f27bfccb40d2ffe&del=https://trends.revcontent.com/&lg=https://cdn.revcontent.com/assets/img/rc-logo.png&ci=https://cdn.revcontent.com/assets/img/icon-close.png&ab=https://trends.revcontent.com/rc-about.php&ldr=https://cdn.revcontent.com/assets/img/rc-spinner-md.gif&ht=https://trends.revcontent.com/rc-interests.php&env=p0
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
/
Resource Hash
cca78b58201c1b982371dcf68961d416dcae3d84bb49608f2da15ed128e507e0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 19:23:20 GMT
last-modified
Tue, 17 Mar 2020 14:47:21 GMT
etag
"1584456441"
x-hw
1584991400.cds063.lo4.hn,1584991400.cds094.lo4.c
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
60079
cors
data.ad-score.com/data/
1 B
272 B
XHR
General
Full URL
https://data.ad-score.com/data/cors?pm_st=TnFPeykZAKMXLBvNgTNYTbojkxPoOSCa-EU/fPs9ldVP8Nz4Z037KFkvJ-E0/JOMRgbVrjMg==&pm_ct=dbff17ad8024548e9263c03d&pm_pl=1584991399950&pm_td=345&pid=1000177&en=1&callback=__pm_glbl_vt0lQbFpbsi238UasbY5fxRU._gc3&v=b8c2508
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
130.211.115.4 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
4.115.211.130.bc.googleusercontent.com
Software
/
Resource Hash
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://www.hackread.com
Date
Mon, 23 Mar 2020 19:23:20 GMT
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
1
Access-Control-Allow-Methods
POST
Content-Type
text/plain; charset=utf-8
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 19:23:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Mon, 23 Mar 2020 19:23:20 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 98B7
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Mon, 23 Mar 2020 18:31:11 GMT
expires
Tue, 23 Mar 2021 18:31:11 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
3129
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
cors
data.ad-score.com/data/
1 B
272 B
XHR
General
Full URL
https://data.ad-score.com/data/cors?pm_st=TnFPeykZAKMXLBvNgTNYTbojkxPoOSCa-EU/fPs9ldVP8Nz4Z037KFkvJ-E0/JOMRgbVrjMg==&pm_ct=dbff17ad8024548e9263c03d&pm_pl=1584991399950&pm_td=398&pid=1000177&en=1&callback=__pm_glbl_vt0lQbFpbsi238UasbY5fxRU._gc4&v=b8c2508
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
130.211.115.4 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
4.115.211.130.bc.googleusercontent.com
Software
/
Resource Hash
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://www.hackread.com
Date
Mon, 23 Mar 2020 19:23:20 GMT
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
1
Access-Control-Allow-Methods
POST
Content-Type
text/plain; charset=utf-8
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gda_r20200316&jk=670523557325424&bg=!paalpr5YAw8WLqVXLH8CAAAAOFIAAAAJmQFczNhv-d8bdoDlNxCHuOGOKMc8uJpGXE-xi--2B8lHoBG5NpBrxxQX7b7YeZg2y19Wgcv8Wp7hjjo3YMK0KdmmkFZJgJzT6Dm59H-l7rNn7izios01blR7-Ve30G2xScaWZ0RKk0jEM4Cd7degdf-dz5j7B9473vuZdXLzKCV-_oASZyh6NTZFZzig0gv5BlBo4wDqbQEvmH_-5o8DiIuhvthbfrzVKq2mNoDTGD-Uk1H3mP4EQKcWHZdJE8ji__jey0ssnGOCd_fGLUyu_YWYgzkFM9FCqwW1g8AiJheEhyTEtMn3mucWhhEPed-v0A5fwmancUkZLH2W261lkkpHbfbLj1VaW02sTAC3t6XI3ZGhis1Vy6qogpyDsn1HxAU_mHcg2iyolTvHiC9bxNahAfw3sF1V4rsFfSerCVi1-mtmcMTftZSh1VbT75a697OMekwKJcrrVDFeSCzb
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Mon, 23 Mar 2020 19:23:20 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
cors
data.ad-score.com/data/
1 B
272 B
XHR
General
Full URL
https://data.ad-score.com/data/cors?pm_st=TnFPeykZAKMXLBvNgTNYTbojkxPoOSCa-EU/fPs9ldVP8Nz4Z037KFkvJ-E0/JOMRgbVrjMg==&pm_ct=dbff17ad8024548e9263c03d&pm_pl=1584991399950&pm_td=497&pid=1000177&en=1&callback=__pm_glbl_vt0lQbFpbsi238UasbY5fxRU._gc5&v=b8c2508
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
130.211.115.4 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
4.115.211.130.bc.googleusercontent.com
Software
/
Resource Hash
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://www.hackread.com
Date
Mon, 23 Mar 2020 19:23:20 GMT
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
1
Access-Control-Allow-Methods
POST
Content-Type
text/plain; charset=utf-8
cors
data.ad-score.com/data/
1 B
272 B
XHR
General
Full URL
https://data.ad-score.com/data/cors?pm_st=TnFPeykZAKMXLBvNgTNYTbojkxPoOSCa-EU/fPs9ldVP8Nz4Z037KFkvJ-E0/JOMRgbVrjMg==&pm_ct=dbff17ad8024548e9263c03d&pm_pl=1584991399950&pm_td=597&pid=1000177&en=1&callback=__pm_glbl_vt0lQbFpbsi238UasbY5fxRU._gc6&v=b8c2508
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
130.211.115.4 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
4.115.211.130.bc.googleusercontent.com
Software
/
Resource Hash
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://www.hackread.com
Date
Mon, 23 Mar 2020 19:23:20 GMT
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
1
Access-Control-Allow-Methods
POST
Content-Type
text/plain; charset=utf-8
cors
data.ad-score.com/data/
1 B
272 B
XHR
General
Full URL
https://data.ad-score.com/data/cors?pm_st=TnFPeykZAKMXLBvNgTNYTbojkxPoOSCa-EU/fPs9ldVP8Nz4Z037KFkvJ-E0/JOMRgbVrjMg==&pm_ct=dbff17ad8024548e9263c03d&pm_pl=1584991399950&pm_td=697&pid=1000177&en=1&callback=__pm_glbl_vt0lQbFpbsi238UasbY5fxRU._gc7&v=b8c2508
Requested by
Host: js.ad-score.com
URL: https://js.ad-score.com/score.min.js?pid=1000177
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
130.211.115.4 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
4.115.211.130.bc.googleusercontent.com
Software
/
Resource Hash
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

Request headers

Referer
https://www.hackread.com/russian-intel-agency-fsb-contractor-hacked/
Origin
https://www.hackread.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://www.hackread.com
Date
Mon, 23 Mar 2020 19:23:20 GMT
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
1
Access-Control-Allow-Methods
POST
Content-Type
text/plain; charset=utf-8

Verdicts & Comments Add Verdict or Comment

126 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| WebFontConfig object| _wpemojiSettings object| webfont object| WebFont object| twemoji object| wp undefined| $ function| jQuery object| cookieconsent number| initStickyMenu object| adsbygoogle object| __twttrll object| twttr object| __twttr object| google_js_reporting_queue number| google_srt object| google_ad_modifications object| google_logging_queue object| ggeac boolean| google_measure_js_timing object| googleToken object| googleIMState function| processGoogleToken object| google_reactive_ads_global_state boolean| _gfp_a_ object| google_sa_queue object| google_sl_win function| google_process_slots boolean| google_apltlad boolean| _gfp_p_ function| google_spfd number| google_lpabyc number| google_unique_id object| google_sv_map object| google_t12n_vars boolean| miptheme_smooth_scrolling number| miptheme_ajaxpagination_timer number| miptheme_sticky_sidebar_margin number| miptheme_parallax_image_height object| mipthemeLocalCache object| wpcf7 object| mashsb undefined| strict object| thirsty_global_vars object| thirstyFunctions object| jQuery112405482910804140362 function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| google_sa_impl object| google_jobrunner object| google_persistent_state_async object| __google_ad_urls number| google_global_correlator number| __google_ad_urls_id object| google_prev_clients object| gaGlobal object| ampInaboxIframes object| ampInaboxPendingMessages object| google_iframe_oncopy boolean| google_osd_loaded boolean| google_onload_fired function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb function| SocialMediaStats function| smooth_scroll function| setCookie function| getCookie object| _photobox function| wNumb function| Cookies function| shareSelectedText object| miptheme_ajax_url function| setVideoHeights object| miptheme_ajax_post_views object| addComment function| gtag object| dataLayer object| google_tag_manager string| GoogleAnalyticsObject function| ga object| google_tag_data object| gaplugins object| gaData object| ak_js object| commentForm undefined| replyRowContainer undefined| children boolean| clean_io_required object| rc_head object| rc_body object| rc2css object| rc2js object| rc2js_beacon_5e790ca75a432 object| rcel object| rcds object| beaconNoScript object| rc_segmented_creatives object| rc_segmented_widgets object| rc_loaded_widgets undefined| rc_chosen_interests number| rc_loader_limit number| rc_loader_runs object| rc_loaded_hashes object| rcsc object| RevContentLoader string| rc_p_uuid number| provider string| do_branding object| Base64 function| rcjq boolean| scrolled boolean| swiped boolean| resized boolean| rc_segments_sent function| Hammer object| __pm_glbl object| __pm_glbl_vt0lQbFpbsi238UasbY5fxRU object| __pm_ads_list string| AdScoreObject function| adScore object| jQuery110201097377715431398 object| GoogleGcLKhOms object| google_image_requests

0 Cookies

4 Console Messages

Source Level URL
Text
console-api log URL: https://www.hackread.com/wp-includes/js/jquery/jquery-migrate.min.js(Line 2)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1
console-api log URL: https://www.hackread.com/wp-content/plugins/mashsharer/assets/js/mashsb.min.js(Line 1)
Message:
not rate limited: 1584991427
console-api log URL: https://js.ad-score.com/score.min.js?pid=1000177(Line 181)
Message:
[object Text]
console-api debug URL: https://js.ad-score.com/score.min.js?pid=1000177(Line 156)
Message:

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

adservice.google.com
adservice.google.de
ajax.googleapis.com
b1sync.zemanta.com
bttrack.com
cdn.revcontent.com
cdn.syndication.twimg.com
cdnjs.cloudflare.com
data.ad-score.com
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
ib.adnxs.com
img.revcontent.com
js.ad-score.com
pagead2.googlesyndication.com
pbs.twimg.com
platform.twitter.com
rtb.mfadsrvr.com
secure.gravatar.com
static.earnify.com
stats.g.doubleclick.net
syndication.twitter.com
tpc.googlesyndication.com
trends.revcontent.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.hackread.com
x.bidswitch.net
104.244.42.200
130.211.115.4
151.139.128.10
192.132.33.46
2001:4860:4802:36::75
2001:4860:4802:38::75
2600:1901:0:fcac::
2606:2800:134:1a0d:1429:742:782:b6
2606:2800:234:46c:e8b:1e2f:2bd:694
2606:4700::6811:4104
2606:4700::6811:870f
2a00:1450:4001:800::2002
2a00:1450:4001:800::2008
2a00:1450:4001:808::2002
2a00:1450:4001:809::2002
2a00:1450:4001:809::200a
2a00:1450:4001:814::200e
2a00:1450:4001:816::2002
2a00:1450:4001:816::200a
2a00:1450:4001:81c::2003
2a00:1450:4001:81d::2002
2a00:1450:4001:821::2001
2a00:1450:400c:c06::9b
2a04:fa87:fffe::c000:4902
3.121.238.160
37.252.172.37
52.200.11.189
52.29.176.117
67.227.194.195
70.42.32.31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