URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Submission: On August 13 via manual from US

Summary

This website contacted 35 IPs in 8 countries across 34 domains to perform 161 HTTP transactions. The main IP is 2a02:26f0:6c00:197::2965, located in Ascension Island and belongs to AKAMAI-ASN1, US. The main domain is www.bgr.in.
TLS certificate: Issued by DigiCert SHA2 Secure Server CA on July 10th 2019. Valid for: a year.
This is the only time www.bgr.in was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
20 2.16.186.65 20940 (AKAMAI-ASN1)
4 2606:4700::68... 13335 (CLOUDFLAR...)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
4 2a02:26f0:134... 20940 (AKAMAI-ASN1)
2 3 2a00:1450:400... 15169 (GOOGLE)
2 6 2.19.43.224 20940 (AKAMAI-ASN1)
1 93.184.220.113 15133 (EDGECAST)
2 2606:2800:234... 15133 (EDGECAST)
1 1 2a03:2880:f20... 32934 (FACEBOOK)
1 2 2a03:2880:f20... 32934 (FACEBOOK)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
29 151.101.14.2 54113 (FASTLY)
4 26 151.101.114.2 54113 (FASTLY)
1 151.101.113.2 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
7 2a00:1450:400... 15169 (GOOGLE)
1 2606:4700:30:... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
2 4 2a03:2880:f10... 32934 (FACEBOOK)
2 2 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
6 2606:4700:10:... 13335 (CLOUDFLAR...)
3 2a03:2880:f00... 32934 (FACEBOOK)
1 5 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
2 5 172.217.22.66 15169 (GOOGLE)
8 52.219.64.66 16509 (AMAZON-02)
1 52.202.120.185 14618 (AMAZON-AES)
2 151.101.13.181 54113 (FASTLY)
5 151.101.114.49 54113 (FASTLY)
2 2 18.194.102.89 16509 (AMAZON-02)
2 2 40.113.136.100 8075 (MICROSOFT...)
2 2 185.29.135.226 30419 (MEDIAMATH...)
2 185.33.223.208 29990 (ASN-APPNEXUS)
12 151.101.14.49 54113 (FASTLY)
2 2 34.251.1.224 16509 (AMAZON-02)
1 1 54.70.1.117 16509 (AMAZON-02)
1 192.132.33.46 18568 (BIDTELLECT)
3 3 52.58.254.133 16509 (AMAZON-02)
2 2 35.205.46.65 15169 (GOOGLE)
1 2 54.194.238.142 16509 (AMAZON-02)
161 35
Apex Domain
Subdomains
Transfer
72 taboola.com
c2.taboola.com
cdn.taboola.com
trc.taboola.com
15.taboola.com
match.taboola.com
images.taboola.com
vidstat.taboola.com
imprammp.taboola.com
convammp.taboola.com
wf.taboola.com
1 MB
21 bgr.in
www.bgr.in
st1.bgr.in
289 KB
8 amazonaws.com
s3.ap-south-1.amazonaws.com
70 KB
8 doubleclick.net
stats.g.doubleclick.net
securepubads.g.doubleclick.net
cm.g.doubleclick.net
102 KB
7 gstatic.com
fonts.gstatic.com
77 KB
6 adgebra.co.in
adgebra.co.in
16 KB
6 scorecardresearch.com
sb.scorecardresearch.com
4 KB
5 google-analytics.com
www.google-analytics.com
35 KB
5 facebook.com
www.facebook.com
staticxx.facebook.com
951 B
4 zee.shopping
zee.shopping
48 KB
4 izooto.com
cdn.izooto.com
34 KB
3 bidswitch.net
x.bidswitch.net
1 KB
3 google.de
www.google.de
adservice.google.de
959 B
3 google.com
www.google.com
adservice.google.com
1 KB
3 googleapis.com
fonts.googleapis.com
ajax.googleapis.com
35 KB
3 instagram.com
platform.instagram.com
www.instagram.com
5 KB
3 crwdcntrl.net
tags.crwdcntrl.net
bcp.crwdcntrl.net
11 KB
2 programattik.com
ads.programattik.com
1 KB
2 adsrvr.org
match.adsrvr.org
893 B
2 adnxs.com
ib.adnxs.com
1 KB
2 mathtag.com
sync.mathtag.com
2 KB
2 powerlinks.com
px.powerlinks.com
1 KB
2 mfadsrvr.com
rtb.mfadsrvr.com
1 KB
2 perfectmarket.com
widget.perfectmarket.com
33 KB
2 facebook.net
connect.facebook.net
62 KB
2 quora.com
a.quora.com
q.quora.com
5 KB
2 twitter.com
platform.twitter.com
93 KB
2 google.co.in
www.google.co.in
cse.google.co.in
2 KB
1 bttrack.com
bttrack.com
380 B
1 storygize.net
www.storygize.net
450 B
1 forkcdn.com
impulse.forkcdn.com
1 KB
1 googletagmanager.com
www.googletagmanager.com
26 KB
1 googletagservices.com
www.googletagservices.com
12 KB
0 googlesyndication.com Failed
tpc.googlesyndication.com Failed
161 34
Domain Requested by
20 st1.bgr.in www.bgr.in
st1.bgr.in
19 images.taboola.com www.bgr.in
19 trc.taboola.com 4 redirects www.bgr.in
cdn.taboola.com
9 vidstat.taboola.com cdn.taboola.com
vidstat.taboola.com
8 s3.ap-south-1.amazonaws.com www.bgr.in
7 fonts.gstatic.com www.bgr.in
cdn.taboola.com
7 cdn.taboola.com www.bgr.in
cdn.taboola.com
6 convammp.taboola.com www.bgr.in
6 adgebra.co.in impulse.forkcdn.com
adgebra.co.in
6 sb.scorecardresearch.com 2 redirects www.bgr.in
cdn.taboola.com
5 www.google-analytics.com 1 redirects zee.shopping
www.bgr.in
www.googletagmanager.com
4 match.taboola.com www.bgr.in
4 www.facebook.com 2 redirects www.bgr.in
connect.facebook.net
4 zee.shopping www.bgr.in
ajax.googleapis.com
4 cdn.izooto.com www.bgr.in
cdn.izooto.com
3 wf.taboola.com vidstat.taboola.com
3 x.bidswitch.net 3 redirects
3 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
3 stats.g.doubleclick.net 2 redirects www.bgr.in
2 bcp.crwdcntrl.net 1 redirects tags.crwdcntrl.net
2 imprammp.taboola.com www.bgr.in
2 ads.programattik.com 2 redirects
2 match.adsrvr.org 2 redirects
2 cm.g.doubleclick.net 2 redirects
2 ib.adnxs.com www.bgr.in
2 sync.mathtag.com 2 redirects
2 px.powerlinks.com 2 redirects
2 rtb.mfadsrvr.com 2 redirects
2 15.taboola.com cdn.taboola.com
2 widget.perfectmarket.com cdn.taboola.com
widget.perfectmarket.com
2 connect.facebook.net www.bgr.in
connect.facebook.net
2 www.google.de www.bgr.in
2 www.google.com 2 redirects
2 fonts.googleapis.com www.bgr.in
2 www.instagram.com 1 redirects www.bgr.in
2 platform.twitter.com www.bgr.in
platform.twitter.com
1 bttrack.com www.bgr.in
1 www.storygize.net 1 redirects
1 q.quora.com www.bgr.in
1 staticxx.facebook.com connect.facebook.net
1 adservice.google.com www.googletagservices.com
1 adservice.google.de www.googletagservices.com
1 ajax.googleapis.com zee.shopping
1 impulse.forkcdn.com www.bgr.in
1 www.googletagmanager.com www.bgr.in
1 a.quora.com www.bgr.in
1 c2.taboola.com www.bgr.in
1 www.googletagservices.com www.bgr.in
1 platform.instagram.com 1 redirects
1 tags.crwdcntrl.net www.bgr.in
1 cse.google.co.in www.bgr.in
1 www.google.co.in 1 redirects
1 www.bgr.in
0 tpc.googlesyndication.com Failed securepubads.g.doubleclick.net
161 54
Subject Issuer Validity Valid
www.zeeentertainment.com
DigiCert SHA2 Secure Server CA
2019-07-10 -
2020-10-08
a year crt.sh
english.cdn.zeenews.com
DigiCert SHA2 Secure Server CA
2019-07-02 -
2020-05-22
a year crt.sh
ssl904715.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-05-06 -
2019-11-12
6 months crt.sh
*.google.com
Google Internet Authority G3
2019-07-29 -
2019-10-21
3 months crt.sh
zee.shopping
Let's Encrypt Authority X3
2019-07-08 -
2019-10-06
3 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-07-29 -
2019-10-27
3 months crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
tags.crwdcntrl.net
DigiCert SHA2 Secure Server CA
2019-03-15 -
2021-04-07
2 years crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2018-11-19 -
2019-11-27
a year crt.sh
*.www.instagram.com
DigiCert SHA2 High Assurance Server CA
2019-07-11 -
2019-10-09
3 months crt.sh
*.googleapis.com
Google Internet Authority G3
2019-07-29 -
2019-10-21
3 months crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-07-30 -
2020-07-25
a year crt.sh
*.quora.com
DigiCert SHA2 Secure Server CA
2018-08-15 -
2019-11-26
a year crt.sh
*.google-analytics.com
Google Internet Authority G3
2019-07-29 -
2019-10-21
3 months crt.sh
sni224477.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-08-01 -
2020-02-07
6 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-06-06 -
2019-09-04
3 months crt.sh
www.google.de
Google Internet Authority G3
2019-07-29 -
2019-10-21
3 months crt.sh
www.adgebra.co.in
Go Daddy Secure Certificate Authority - G2
2019-01-03 -
2020-01-07
a year crt.sh
*.s3.ap-south-1.amazonaws.com
DigiCert Baltimore CA-2 G2
2018-11-08 -
2020-03-10
a year crt.sh
p.ssl.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-05-28 -
2021-02-22
2 years crt.sh
g2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-05-03 -
2019-11-19
7 months crt.sh

1970-01-01 -
1970-01-01
a few seconds crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
*.bttrack.com
Sectigo RSA Domain Validation Secure Server CA
2019-03-19 -
2021-04-13
2 years crt.sh
*.crwdcntrl.net
Go Daddy Secure Certificate Authority - G2
2019-06-13 -
2021-06-28
2 years crt.sh

This page contains 10 frames:

Primary Page: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Frame ID: 10537F39B9332FFE70E6D71CCAF81E1E
Requests: 146 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/page.php?href=https%3A%2F%2Fwww.facebook.com%2FBGRIndia&tabs=timeline&width=489&height=307&small_header=true&adapt_container_width=true&hide_cover=false&show_facepile=true&appId
Frame ID: 371129DEABC8424A2B104B19A243EAEB
Requests: 1 HTTP requests in this frame

Frame: https://cdn.izooto.com/scripts/sak/iz_setcid.html
Frame ID: A64BC7D10D6212C9EA3A799D6B0E40AD
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.0639d67d95b7680840758b6833f06d87.html?origin=https%3A%2F%2Fwww.bgr.in
Frame ID: C9ADECBF0C059606C1CD349D908BF1B5
Requests: 1 HTTP requests in this frame

Frame: https://staticxx.facebook.com/connect/xd_arbiter.php?version=44
Frame ID: 367B1AA3B410C8C636CE331BD475D63B
Requests: 1 HTTP requests in this frame

Frame: https://trc.taboola.com/sg/mediaforcebidder-network/1/rtb-h?taboola_hm=a6b94e8c-f9b0-4b5a-beaf-de356d947a94
Frame ID: C53306D2F39DCF769B0EB2ECE3D4B6F2
Requests: 9 HTTP requests in this frame

Frame: https://imprammp.taboola.com/st?cipid=66291385&ttype=0&cirid=B71B70BEA241554831265909233&cicmp=1994735&cijs=1&dast=V7MuACFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBuIHGcJbTHiDCYtBGS1Wq9FwMhmsFrvhYDIFDmn6jKaDpOE0G4TMi-VpMoiKrrfF7nCaPW-wQ9Pp8Lnu9brf7y7xWe5Ku1_u8n3-Or_fZ3Z53oLL3-rymN7Sl-XvFjo8Xpfl85b5XXeTWzFY6x7Oz1v0d0ssL4fXrbSb_m6F3a00HP12l1v3NB3dCrfmafeZXW7Ry3h6q12ez8Pn8ssBAAAA4AEAaqUd4gcQACACAAAAQAIAAACAIqDi30LgAgAAAAAD4KC0SwNAnEPhHnaT5_e3nI7-AAB4CAABABhQIAEgcL8oAcgAezoBAAAAAAAAAGD5____jxmYN8yVAfB4e78x6AF48AF4EAIAAMgaSmNTwRtEY1slKkgtYgQAAACQm_oPczSpEyqLKgAAgnQrgCsAgAC2RUwi0CzdQYm3MAAAAIGxBXpY_H6zw67xu10GAAAAAAAAAGD2f_aPJtTkDJfm20TYpPYLCACw9gsIAMCmbgAAbwJwQUfQisFgdQkx2cxWg8VkMzsAAACAu____389kJmZjCOLZzEYmXzLwcplGQxmnpHFsVp5jMuFa7U9BxeRHqUPBdg-Dmn6jKaDpOE0G4TMi-VpMoiKrrfF7nCaPfebsMVoNZlslsPZcjEZDEfD0Wh_Ajca4AQNh4PFbrDYLRbDyWIyGiwHCxSIwQQnZDjaTFaj3Wo3WQ4no9FsM9kgRatWs9FmMFzNJrPdbjUcDJejEVK0ZjGbTBaz0XK3GSwno8FwMhwizE0sFsvMtHLLhrvNWrRYWdbChcOzVlgmg9VuNthYRiO36PUxnUYb18a58KJggNdeBBfpRPpyuV0mp8Mt8VkuYonmZJFOZJd9Z2YyjiyexWBk8i0HK5dlMJh5RhbHauUxLheu1b43sVgsM9PKLRvuNmvRYmVZCxcOz1phmQxWu9lgYxmN3KLXx3QabVwb58LfWM1Wu8VgMZjtG6vZarcYLAazfYfO8F19zkbVdSfymJTfaE59kjkNCpfB4p1KTbtx51gQl4RFp8op88ge4uhUZTZ4DAZFLBGcLtKJ6GU8XcQSydMinSiGu5nJsBxtVi6PzeVbeByr0cy3m9lcu-HGNLFMxBKl6SKd6OUu3-ev8_t9ZpfnLbj8rS6P6S19Wf5uocPjdVk-b5nfdTe5FYO17uH8vEV_t8TycnjdSrvp71bY3UrD0W93uXVP09GtcGuedp_Z5Ra9jKe32uX5PHwui_qPDjFczRWz5VyyWs1Fw1UCAAAAAAAAAFjCnHkTAAAAgNNgJpvBcrVcgIh4x12VNPmej8vmguLGjxn05XK7TE6HW-KzHA!&excid=22&tst=1&docw=0
Frame ID: 4CA3645B43116142E26603AD70DE40AD
Requests: 1 HTTP requests in this frame

Frame: https://imprammp.taboola.com/st?cipid=66291385&ttype=0&cirid=839B9ACEC625329787135549389&cicmp=1998295&cijs=1&dast=V7t88CFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBvQHGrhZTpgLDotDm6w2k-VuOJuNlpvlcLSYwoexXCaDWiBhmf2-g4JyenrMLoOo6Hpb7A6n2fMGOzSdDp_rXq_7_e4Sn-WutPvlLt_nr_P7fWaX5y24_K0uj-ktfVn-bqHD43VZPm-Z33U3uRWDte7h_LxFf7fE8nJ43Uq76e9W2N1Kw9Fvd7l1T9PRrXBrnnaf2eUWvYynt9rl-Tx8Lr8cAAAAAB4AoHa2IH4AAQAiAAAAACQAAAAAKAIq_i0ELgAAAAAwAA5KuzQAxDkU7mE3eX5_y-noDwCAhwAQAIABBRIAAveLEoCMsvcTAAAAAAAAAACW_____5iBecNcGQCPvusbgx6ABx-AByEAAICsIR5ZxCH7qykcooLTIkYAAAAAuan_MEeTOqGyqAIAIEi3ArgCAAhgW8Qk-szSHZR4CwMAABAYW6CHxe83O-wav9tlAAAAAAAAAABm_2f_aEJNznBpvk2ETWq_gAAAa7-AAABs6gYA8CYAF3QErRgMVpcQk81sNVhMNrMDAAAAuPv____XA5mZyTiyeBaDkcm3HKxclsFg5hlZHKuVx7hcuFbbc3AR6VH6UIDtCxGW2e87KCinp8fsMoiKrrfF7nCaPQfxQcOwnAyC-U3YYrSaTDbL4Wy5mAyGo-FotD-BGw1wgobDwWI3WOwWi-FkMRkNloMFCsRgghMyHG0mq9FutZssh5PRaLaZbJCiVavZaDMYrmaT2W63Gg6Gy9EIKVqzmE0mi9loudsMlpPRYDgZDhHmJhaLZWZauWXD3WYtWqwsa-HC4VkrLJPBajcbbCyjkVv0-phOo41r41x4UTDAay-Ci3QifbncLpPT4Zb4LBexRHOySCeyy74zMxlHFs9iMDL5loOVyzIYzDwji2O18hiXC9dq35tYLJaZaeWWDXebtWixsqyFC4dnrbBMBqvdbLCxjEZu0etjOo02ro1z4W-sZqvdYrAYzPaN1Wy1WwwWg9m-Q2f4rj5no-q6E3lMym80pz7JnAaFy2DxTqWm3bhzLIhLwqJT5ZR5ZA9xdKoyGzwGgyKWCE4X6UT0Mp4uYonkaZFOFMPdzGRYjjYrl8fm8i08jtVo5tvNbK7dcGOaWCZiidJ0kU70cpfv89f5_T6zy_MWXP5Wl8f0lr4sf7fQ4fG6LJ-3zO-6m9yKwVr3cH7eor9bYnk5vG6l3fR3K-xupeHot7vcuqfp6Fa4NU-7z-xyi17G01vt8nwePpdF_UeHGK7mitlyLlmt5qLhKgEAAAAAAAAALGHOvAkAAADAaTCTzWC5Wi5ARLzjrkqafM_HZXNBcePHDPpyuV0mp8Mt8VkO!&excid=22&tst=1&docw=0
Frame ID: 40BD396729AA63D61EBAC658731502D0
Requests: 1 HTTP requests in this frame

Frame: https://bcp.crwdcntrl.net/5/ct=y/c=12381/rand=341928632/pv=y/int=site%3Abgr.in/int=PageTitle%3AGoogle%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone%20with%20a%20single%20text%20message/int=tag%3AGoogle%2Chacking%2CiOS%2CProject%20Zero%2Csecurity%20vulnerability%2Cvulnerability/int=pageType%3A%20Single/int=category%3ANews/int=language%3AEnglish/int=userDevice%3ADesktop/int=userOS%3AUnknown%20Operating%20System/int=platform%3AWeb/rt=ifr
Frame ID: E82162706A3572A742AE8B1FC39500CF
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/feedback.php?app_id=133005220097303&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D44%23cb%3Df28919b426b8bd8%26domain%3Dwww.bgr.in%26origin%3Dhttps%253A%252F%252Fwww.bgr.in%252Ff28043db50aad1%26relation%3Dparent.parent&container_width=0&height=100&href=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&locale=en_US&sdk=joey&version=v2.10
Frame ID: B4F5A87D809CB035755C4C87BCCA0F19
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • script /\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Overall confidence: 100%
Detected patterns
  • script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

161
Requests

98 %
HTTPS

50 %
IPv6

34
Domains

54
Subdomains

35
IPs

8
Countries

2210 kB
Transfer

5771 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 5
  • https://www.google.co.in/coop/cse/brand?form=cse-search-box&lang=en HTTP 302
  • https://cse.google.co.in/coop/cse/brand?form=cse-search-box&lang=en
Request Chain 18
  • https://platform.instagram.com/en_US/embeds.js HTTP 301
  • https://www.instagram.com/embed.js HTTP 302
  • https://www.instagram.com/static/bundles/es6/EmbedSDK.js/47c7ec92d91e.js
Request Chain 42
  • https://stats.g.doubleclick.net/r/__utm.gif?utmwv=5.7.2dc&utms=1&utmn=2098222609&utmhn=www.bgr.in&utmcs=UTF-8&utmsr=1600x1200&utmvp=1585x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&utmhid=1985639704&utmr=-&utmp=%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&utmht=1565710098661&utmac=UA-21819872-1&utmcc=__utma%3D234886290.1707841348.1565710099.1565710099.1565710099.1%3B%2B__utmz%3D234886290.1565710099.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=59937073&utmredir=3&utmu=qAAAAAAAAAAAAAAAAAAAAAAE~ HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-21819872-1&cid=1707841348.1565710099&jid=59937073&_v=5.7.2dc&z=2098222609 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-21819872-1&cid=1707841348.1565710099&jid=59937073&_v=5.7.2dc&z=2098222609&slf_rd=1&random=335096509
Request Chain 46
  • https://sb.scorecardresearch.com/b?c1=2&c2=9254297&ns__t=1565710098700&ns_c=UTF-8&cv=3.1&c8=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&c7=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=9254297&ns__t=1565710098700&ns_c=UTF-8&cv=3.1&c8=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&c7=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&c9=
Request Chain 82
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1565710105877&ns_c=UTF-8&cv=3.1&c8=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&c7=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1565710105877&ns_c=UTF-8&cv=3.1&c8=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&c7=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&c9=
Request Chain 94
  • https://rtb.mfadsrvr.com/sync?ssp=taboola HTTP 302
  • https://rtb.mfadsrvr.com/ul_cb/sync?ssp=taboola HTTP 302
  • https://trc.taboola.com/sg/mediaforcebidder-network/1/rtb-h?taboola_hm=a6b94e8c-f9b0-4b5a-beaf-de356d947a94
Request Chain 95
  • https://px.powerlinks.com/user/identify?sourceId=d4a7a706-ab0f-11e8-a038-127202fb7690&rurl=https%3A%2F%2Ftrc.taboola.com%2Fsg%2Fpowerlinksdsp-network%2F1%2Frtb-h%2F%3Ftaboola_hm%3D%24%7BUSER%7D HTTP 302
  • https://sync.mathtag.com/sync/img?mt_exid=113&redir=%2F%2Fpx.powerlinks.com%2Fuser%2Fsync%2Fdsps%3FuserId%3D%5BMM_UUID%5D%26sourceId%3Daa4e7548-789b-4df8-a72f-d951a5b206eb%26sync%3D0%26rurl%3Dhttps%25253A%25252F%25252Ftrc.taboola.com%25252Fsg%25252Fpowerlinksdsp-network%25252F1%25252Frtb-h%25252F%25253Ftaboola_hm%25253Dssr8DKTpS9l4d-Zvw8BHxuMNFenzu4micfwgEP2LL5s%2525253D HTTP 302
  • https://sync.mathtag.com/sync/img?mt_exid=113&redir=%2F%2Fpx.powerlinks.com%2Fuser%2Fsync%2Fdsps%3FuserId%3D%5BMM_UUID%5D%26sourceId%3Daa4e7548-789b-4df8-a72f-d951a5b206eb%26sync%3D0%26rurl%3Dhttps%25253A%25252F%25252Ftrc.taboola.com%25252Fsg%25252Fpowerlinksdsp-network%25252F1%25252Frtb-h%25252F%25253Ftaboola_hm%25253Dssr8DKTpS9l4d-Zvw8BHxuMNFenzu4micfwgEP2LL5s%2525253D&mm_bnc&mm_bct&UUID=fa145d52-d623-4000-bb3c-f4d071c237e2 HTTP 302
  • https://px.powerlinks.com/user/sync/dsps?userId=fa145d52-d623-4000-bb3c-f4d071c237e2&sourceId=aa4e7548-789b-4df8-a72f-d951a5b206eb&sync=0&rurl=https%3A%2F%2Ftrc.taboola.com%2Fsg%2Fpowerlinksdsp-network%2F1%2Frtb-h%2F%3Ftaboola_hm%3Dssr8DKTpS9l4d-Zvw8BHxuMNFenzu4micfwgEP2LL5s%253D HTTP 302
  • https://trc.taboola.com/sg/powerlinksdsp-network/1/rtb-h/?taboola_hm=ssr8DKTpS9l4d-Zvw8BHxuMNFenzu4micfwgEP2LL5s%3D
Request Chain 97
  • https://cm.g.doubleclick.net/pixel?google_nid=taboola_dbm&google_cm&google_sc HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=taboola_dbm&google_cm=&google_sc=&google_tc= HTTP 302
  • https://trc.taboola.com/sg/google-network/1/rtb-h/?taboola_hm=CAESEOGBs1f0NuoZFUvlNDbHQ1Q&google_cver=1 HTTP 302
  • https://match.taboola.com/sg/google-network/1/rtb-h?taboola_hm=CAESEOGBs1f0NuoZFUvlNDbHQ1Q&tbid=7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a&query=taboola_hm%3DCAESEOGBs1f0NuoZFUvlNDbHQ1Q%26google_cver%3D1
Request Chain 99
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=054f32o&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=054f32o&ttd_tpi=1 HTTP 302
  • https://trc.taboola.com/sg/thetradedesk-network/1/rtb-h/?taboola_hm=083ffabc-8bc3-4b40-ba47-50e5fc903389 HTTP 302
  • https://match.taboola.com/sg/thetradedesk-network/1/rtb-h?taboola_hm=083ffabc-8bc3-4b40-ba47-50e5fc903389&tbid=16a8e4c8-27eb-4aa8-b523-f31409cfbf9d-tuct44c5c9d&query=taboola_hm%3D083ffabc-8bc3-4b40-ba47-50e5fc903389
Request Chain 100
  • https://www.storygize.net/ccm/4b560cdd-91f9-422b-adb7-e9dff26bc3ad?u=7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a HTTP 302
  • https://trc.taboola.com/sg/storygize-network/1/rtb-h?taboola_hm=906b0437-6b48-45f7-ba0b-9a2c738ce659 HTTP 302
  • https://match.taboola.com/sg/storygize-network/1/rtb-h?taboola_hm=906b0437-6b48-45f7-ba0b-9a2c738ce659&tbid=ac629852-fdae-4568-b105-6a03b70cfa20-tuct44c5ca2&query=taboola_hm%3D906b0437-6b48-45f7-ba0b-9a2c738ce659
Request Chain 102
  • https://x.bidswitch.net/sync?ssp=taboola HTTP 302
  • https://x.bidswitch.net/ul_cb/sync?ssp=taboola HTTP 302
  • https://ads.programattik.com/sync?ssp=bidswitch&bidswitch_ssp_id=taboola HTTP 302
  • https://ads.programattik.com/ul_cb/sync?ssp=bidswitch&bidswitch_ssp_id=taboola HTTP 302
  • https://x.bidswitch.net/sync?dsp_id=156&expires=14&user_id=a5e87a02-93c5-4d96-b799-a44a3f60e930&ssp=taboola HTTP 302
  • https://trc.taboola.com/sg/bidswitch-network/1/rtb-h/?taboola_hm=7f198caf-3fad-49c9-aa9a-6c8c98370f8b HTTP 302
  • https://match.taboola.com/sg/bidswitch-network/1/rtb-h?taboola_hm=7f198caf-3fad-49c9-aa9a-6c8c98370f8b&tbid=16a8e4c8-27eb-4aa8-b523-f31409cfbf9d-tuct44c5c9d&query=taboola_hm%3D7f198caf-3fad-49c9-aa9a-6c8c98370f8b
Request Chain 151
  • https://bcp.crwdcntrl.net/5/c=12381/rand=341928632/pv=y/int=site%3Abgr.in/int=PageTitle%3AGoogle%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone%20with%20a%20single%20text%20message/int=tag%3AGoogle%2Chacking%2CiOS%2CProject%20Zero%2Csecurity%20vulnerability%2Cvulnerability/int=pageType%3A%20Single/int=category%3ANews/int=language%3AEnglish/int=userDevice%3ADesktop/int=userOS%3AUnknown%20Operating%20System/int=platform%3AWeb/rt=ifr HTTP 302
  • https://bcp.crwdcntrl.net/5/ct=y/c=12381/rand=341928632/pv=y/int=site%3Abgr.in/int=PageTitle%3AGoogle%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone%20with%20a%20single%20text%20message/int=tag%3AGoogle%2Chacking%2CiOS%2CProject%20Zero%2Csecurity%20vulnerability%2Cvulnerability/int=pageType%3A%20Single/int=category%3ANews/int=language%3AEnglish/int=userDevice%3ADesktop/int=userOS%3AUnknown%20Operating%20System/int=platform%3AWeb/rt=ifr
Request Chain 155
  • https://www.facebook.com/v2.10/plugins/comments.php?app_id=133005220097303&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D44%23cb%3Df28919b426b8bd8%26domain%3Dwww.bgr.in%26origin%3Dhttps%253A%252F%252Fwww.bgr.in%252Ff28043db50aad1%26relation%3Dparent.parent&container_width=0&height=100&href=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&locale=en_US&sdk=joey&version=v2.10 HTTP 302
  • https://www.facebook.com/plugins/comments.php?app_id=133005220097303&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D44%23cb%3Df28919b426b8bd8%26domain%3Dwww.bgr.in%26origin%3Dhttps%253A%252F%252Fwww.bgr.in%252Ff28043db50aad1%26relation%3Dparent.parent&container_width=0&height=100&href=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&locale=en_US&sdk=joey&version=v2.10 HTTP 302
  • https://www.facebook.com/plugins/feedback.php?app_id=133005220097303&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D44%23cb%3Df28919b426b8bd8%26domain%3Dwww.bgr.in%26origin%3Dhttps%253A%252F%252Fwww.bgr.in%252Ff28043db50aad1%26relation%3Dparent.parent&container_width=0&height=100&href=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&locale=en_US&sdk=joey&version=v2.10
Request Chain 157
  • https://www.google-analytics.com/r/collect?v=1&_v=j78&a=1985639704&t=event&ni=0&_s=1&dl=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&ul=en-us&de=UTF-8&dt=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&ec=Ad%20Impression&ea=AdView&el=Blocked&_u=aQhCAEAB~&jid=2090376314&gjid=866159242&cid=1707841348.1565710099&tid=UA-21819872-1&_gid=72033831.1565710114&_r=1&gtm=2wg874MBRX45&z=791680378 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-21819872-1&cid=1707841348.1565710099&jid=2090376314&_gid=72033831.1565710114&gjid=866159242&_v=j78&z=791680378 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-21819872-1&cid=1707841348.1565710099&jid=2090376314&_v=j78&z=791680378 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-21819872-1&cid=1707841348.1565710099&jid=2090376314&_v=j78&z=791680378&slf_rd=1&random=4090429992

161 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
109 KB
20 KB
Document
General
Full URL
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:197::2965 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
IndiaWeb/10.1.10 /
Resource Hash
9a7b21524bf2e72ea6d573d64db7d5f55ed2a6f3b01cdac282dbfbfde93ba240
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.bgr.in
:scheme
https
:path
/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
navigate
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

status
200
content-type
text/html; charset=UTF-8
geo-info
Akamai set: (EUROP)
link
<https://www.bgr.in/wp-json/>; rel="https://api.w.org/" <https://www.bgr.in/?p=843029>; rel=shortlink
server
IndiaWeb/10.1.10
strict-transport-security
max-age=31536000; includeSubDomains
varcache
CacheMISS
x-frame-options
SAMEORIGIN
x-var-ttl
180.000
x-xss-protection
1; mode=block
vary
Accept-Encoding
content-encoding
gzip
date
Tue, 13 Aug 2019 15:28:18 GMT
content-length
20043
style.min.css
st1.bgr.in/wp-includes/css/dist/block-library/
25 KB
5 KB
Stylesheet
General
Full URL
https://st1.bgr.in/wp-includes/css/dist/block-library/style.min.css?ver=5.0.2
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
57a96eb1ccacae26e452d6e147fb29ca8ca20ce183970a3a4fb5febf8662fcc7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
zRE6ds2prFUQUm3xGGfTAoXdd3xqJpfo
content-encoding
gzip
last-modified
Wed, 02 Jan 2019 10:37:09 GMT
server
AmazonS3
x-amz-request-id
5B3701339E6F68F4
etag
"b9d4015ad4738655273de5ab3738e09e"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=2592000
date
Tue, 13 Aug 2019 15:28:18 GMT
accept-ranges
bytes
content-length
4281
x-amz-id-2
W0rlI6kv9iYtSZvrykd4WJnijcsG4vTewaEvJpdOdAIrcMvFgeolVOvCpSRZuH348VUexapd0lY=
bgr_desktop.css
st1.bgr.in/wp-content/themes/bgr2017/css/
282 KB
26 KB
Stylesheet
General
Full URL
https://st1.bgr.in/wp-content/themes/bgr2017/css/bgr_desktop.css?ver=20190809
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
82320af94992ad5fc295da188c4cc9015211d458d53c1b06db1ae1183257c491

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
K56bL2p4SLy3j9CFNn7YlOkR1Qfrltwu
content-encoding
gzip
last-modified
Fri, 09 Aug 2019 06:11:56 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:48/gname:apache/uname:apache/gid:48/mode:33188/mtime:1565330928/atime:1565330928/md5:76ce4f528438565525f6b9306142b1a9/ctime:1565330928
x-amz-request-id
2ACA95C6B656BB7D
etag
"76ce4f528438565525f6b9306142b1a9"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=2592000
date
Tue, 13 Aug 2019 15:28:18 GMT
accept-ranges
bytes
content-length
25786
x-amz-id-2
O/HhbSqMqAM2k6DiSgpGJ56p63bbT4vlFYOVtD0aQpry7Yw1uvmcX4mQWva0qFpYTIsQb6XrcpM=
jquery-min.1.11.1.js
st1.bgr.in/wp-content/themes/bgr2017/js/
153 KB
44 KB
Script
General
Full URL
https://st1.bgr.in/wp-content/themes/bgr2017/js/jquery-min.1.11.1.js?ver=20190809
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
6336983ad55a3504aa8a7e63863b9ac34ac5d1b27d7184e87bd0b89ccd3ad423

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
VCkDzrwTYoc3sw2pjOiIBl.SgjCRvktR
content-encoding
gzip
last-modified
Mon, 06 Nov 2017 11:56:41 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:48/gname:apache/uname:apache/gid:48/mode:33188/mtime:1509943311/atime:1509943311/md5:19e88ef6c4499bd7a02a98cc0d33b0b4/ctime:1509945112
x-amz-request-id
A5ADBC867DDE72D9
etag
"19e88ef6c4499bd7a02a98cc0d33b0b4"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=2592000
date
Tue, 13 Aug 2019 15:28:18 GMT
accept-ranges
bytes
x-amz-id-2
JEsVhGn8QTuaySBNXbRUtWWmha1d43f945MPCaIgTtVRN2ghY9NY3BX7uCI2kqXyxozrPp4ch8c=
185ab9ebc070b0b242472a9489383866a9255d5f.js
cdn.izooto.com/scripts/
6 KB
2 KB
Script
General
Full URL
https://cdn.izooto.com/scripts/185ab9ebc070b0b242472a9489383866a9255d5f.js
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:d841 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
662ece1bf8dcf71826efff346b4af8d4edb0d192072a07f2c79617d6f99ac056
Security Headers
Name Value
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:18 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Mon, 01 Jul 2019 06:33:47 GMT
server
cloudflare
age
18011
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=10800
cf-bgj
minify
cf-ray
505bb7d19eb5bf28-FRA
x-xss-protection
1; mode=block
expires
Tue, 13 Aug 2019 18:28:18 GMT
bgr_trans_logo.png
st1.bgr.in/wp-content/themes/bgr2017/images/
1 KB
1 KB
Image
General
Full URL
https://st1.bgr.in/wp-content/themes/bgr2017/images/bgr_trans_logo.png
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
Akamai Image Manager /
Resource Hash
d3a2ed9a8fd231da42ae0d8c91df8a9b55c8ff7e0c58cad5b0a4c4aa1e37fbab

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:18 GMT
last-modified
Fri, 31 May 2019 08:29:33 GMT
server
Akamai Image Manager
etag
"62d7c0f437ad7dc1c46e99f83556172f"
content-type
image/webp
status
200
cache-control
public, max-age=2592000
content-length
1066
expires
Fri, 23 Aug 2019 08:29:10 GMT
brand
cse.google.co.in/coop/cse/
Redirect Chain
  • https://www.google.co.in/coop/cse/brand?form=cse-search-box&lang=en
  • https://cse.google.co.in/coop/cse/brand?form=cse-search-box&lang=en
3 KB
1 KB
Script
General
Full URL
https://cse.google.co.in/coop/cse/brand?form=cse-search-box&lang=en
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
pfe /
Resource Hash
77360fce2d4c7f62de8e1e31ceb313bf01fbda439976cebe5436fbb3790492c4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:10:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
pfe
age
1087
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
public, max-age=1800
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
1183
x-xss-protection
0
expires
Tue, 13 Aug 2019 15:40:11 GMT

Redirect headers

date
Tue, 13 Aug 2019 15:28:18 GMT
x-content-type-options
nosniff
server
sffe
status
302
content-type
text/html; charset=UTF-8
location
https://cse.google.co.in/coop/cse/brand?form=cse-search-box&lang=en
cache-control
private
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
268
x-xss-protection
0
logo-header-white.png
st1.bgr.in/wp-content/themes/vip/bgr2012/images/sprite_2x/
2 KB
3 KB
Image
General
Full URL
https://st1.bgr.in/wp-content/themes/vip/bgr2012/images/sprite_2x/logo-header-white.png
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
Akamai Image Manager /
Resource Hash
a9714a3959db6552a23eaba147be505bd3a0ef8f194c2675b3193930d0fc371f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:18 GMT
x-check-cacheable
YES
server
Akamai Image Manager
etag
"419d56092accdfe439eee10434f35282"
x-serial
585
content-type
image/webp
status
200
cache-control
public, max-age=2592000
last-modified
Thu, 09 May 2019 15:25:02 GMT
x-akamai-ssl-client-sid
INnxsXjODubfaCRP3R7vQA==
content-length
2388
expires
Wed, 28 Aug 2019 15:25:11 GMT
initial.js
zee.shopping/js/
6 KB
3 KB
Script
General
Full URL
https://zee.shopping/js/initial.js
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:134::215:4e6b , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
zee.shopping /
Resource Hash
21b308486c4a87bcee1f14738401b37d8230e0c80c2c3082d90ce649da79d664

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
date
Tue, 13 Aug 2019 15:28:18 GMT
content-encoding
gzip
last-modified
Tue, 30 Jul 2019 07:41:12 GMT
server
zee.shopping
status
200
etag
W/"5d3ff498-1995"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=2582160
content-length
2721
expires
Thu, 12 Sep 2019 12:44:18 GMT
dc.js
stats.g.doubleclick.net/
45 KB
17 KB
Script
General
Full URL
https://stats.g.doubleclick.net/dc.js
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c02::9a Brussels, Belgium, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
6181cd98fe270c2826d416574446841f86778bc45a0ab0bdd0c667b4e70fd6e8
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 29 Jul 2019 21:35:27 GMT
server
Golfe2
age
1437
date
Tue, 13 Aug 2019 15:04:21 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
17093
expires
Tue, 13 Aug 2019 17:04:21 GMT
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 13 Aug 2019 15:28:18 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
901
Expires
Wed, 14 Aug 2019 15:28:18 GMT
cc.js
tags.crwdcntrl.net/c/12381/
36 KB
11 KB
Script
General
Full URL
https://tags.crwdcntrl.net/c/12381/cc.js?ns=_cc12381
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
93.184.220.113 London, United Kingdom, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (lcy/1D61) /
Resource Hash
35b6eb2e8d3dce2813dce4c59d2b4511fb96f300d720ee7b385ede38903fdff4

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:18 GMT
content-encoding
gzip
last-modified
Wed, 27 Feb 2019 21:46:44 GMT
server
ECS (lcy/1D61)
etag
"5c770544-8ebb+gzip"
vary
Accept-Encoding
x-cache
HIT
content-type
application/javascript
status
200
cache-control
max-age=86400
content-length
10621
expires
Wed, 14 Aug 2019 15:28:18 GMT
style.css
st1.bgr.in/wp-content/plugins/post-adds-code/css/
390 B
806 B
Stylesheet
General
Full URL
https://st1.bgr.in/wp-content/plugins/post-adds-code/css/style.css?ver=20190809
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ef77bf94d6631e01d1d168ee18c6f8aa388c132ecb12a2873661ccd07939c9ce

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
lQFVoUmKWpsPQPe5u9DuLUzRUpopj14p
last-modified
Thu, 21 Dec 2017 14:29:48 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:0/gname:root/uname:root/gid:0/mode:33188/mtime:1513866580/atime:1513866580/md5:973f9dcfc896c3789bf0733630ce7b57/ctime:1513866580
x-amz-request-id
614BD7AD8A998B3D
etag
"973f9dcfc896c3789bf0733630ce7b57"
content-type
text/css
status
200
cache-control
public, max-age=2592000
date
Tue, 13 Aug 2019 15:28:18 GMT
accept-ranges
bytes
content-length
390
x-amz-id-2
R7aBKZ4rV7Z5EQEM3A6q31OrsKbU062Xo55/5Ij2NWiGBwyeWiWDMbNCkxOA8Lv4Xw73Amh6J3E=
social-share.min.js
st1.bgr.in/wp-content/plugins/iwpl-social-share/v5/js/
26 KB
8 KB
Script
General
Full URL
https://st1.bgr.in/wp-content/plugins/iwpl-social-share/v5/js/social-share.min.js?ver=x-20190809
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
193e3b372671f9baadf915483a2849487ec09bf066a95c5c5e85d888f1bb8e78

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
vrygaN6lJNfK98Hse6A6BrwmOtbGl.yL
content-encoding
gzip
last-modified
Thu, 09 May 2019 09:35:53 GMT
server
AmazonS3
x-amz-request-id
6145AD4077BA175E
etag
"6ab4f835fc16e072968188ed22f93d4c"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=2592000
date
Tue, 13 Aug 2019 15:28:18 GMT
accept-ranges
bytes
content-length
7296
x-amz-id-2
JQdn//LdmcRuR1VUVruHrwlO+v30pDxoW80JwVdZSu9cGzsKFWLTpTw2tgVkaJWgqyvpuW/AXto=
x-amz-meta-s3b-last-modified
20190509T093544Z
bgr_custom.js
st1.bgr.in/wp-content/themes/bgr2017/js/
286 B
716 B
Script
General
Full URL
https://st1.bgr.in/wp-content/themes/bgr2017/js/bgr_custom.js?ver=20190809
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
2e83b5b3713b6f151a6c134b8eef1f74e7a1fec682d44b4dac7d2d388580a4fb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
0WC.yR.OwWdX90yzV_f55wM.v_GWEp7L
last-modified
Mon, 06 Nov 2017 11:56:41 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:48/gname:apache/uname:apache/gid:48/mode:33188/mtime:1509943311/atime:1509943311/md5:f2437ff2e6850c2f7a5c5cc9faaf044b/ctime:1509945112
x-amz-request-id
566E22B75EC11A0B
etag
"f2437ff2e6850c2f7a5c5cc9faaf044b"
content-type
application/javascript
status
200
cache-control
public, max-age=2592000
date
Tue, 13 Aug 2019 15:28:18 GMT
accept-ranges
bytes
content-length
286
x-amz-id-2
nz4G+jHumOKYvs4jiyOXv39ZyK6++5l1D9qly8Ff0AXeHt4MN1pP568hi0X5UrQdJNkyeMhemmQ=
vendor.js
st1.bgr.in/wp-content/themes/bgr2017/js/
81 KB
24 KB
Script
General
Full URL
https://st1.bgr.in/wp-content/themes/bgr2017/js/vendor.js?ver=20190809
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
e6438aae2b5b657ab5c8bc7a169c666b8b3c539ede37b522787ccfc57b62d573

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
JjNMcVqE1B57CgxkRCuST0_tValiYQIA
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 07:02:19 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:0/gname:root/uname:root/gid:0/mode:33188/mtime:1532934133/atime:1532934133/md5:82777e9ef235826a7dd1ad8ad32af8b6/ctime:1532934133
x-amz-request-id
3D1068B0A2EE3B8A
etag
"82777e9ef235826a7dd1ad8ad32af8b6"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=2592000
date
Tue, 13 Aug 2019 15:28:18 GMT
accept-ranges
bytes
content-length
23705
x-amz-id-2
TYhka1ufhcwOrH9YOoa8d50Sb13GWhB9lfyPVkb6nBRaAItXByxfayb/j8/Vm5jjKjjfd4gkLTk=
photogallery-min.js
st1.bgr.in/wp-content/themes/bgr2017/js/
24 KB
7 KB
Script
General
Full URL
https://st1.bgr.in/wp-content/themes/bgr2017/js/photogallery-min.js?ver=20190809
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
0343d28faa7dc4af541a0e7e3f246298f432315285ff9f7efb7141759b06195c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
jkAaDtUP8UiLHzBPFI36iuraxu.04mCn
content-encoding
gzip
last-modified
Mon, 06 Nov 2017 11:56:41 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:48/gname:apache/uname:apache/gid:48/mode:33188/mtime:1509943311/atime:1509943311/md5:e517778a3b1c3cf751af14b964fc7e97/ctime:1509945112
x-amz-request-id
7EFC131F5296D889
etag
"e517778a3b1c3cf751af14b964fc7e97"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=2592000
date
Tue, 13 Aug 2019 15:28:18 GMT
accept-ranges
bytes
content-length
6602
x-amz-id-2
3uGwDOozNdYCNhP+LwqUSnO5PH0T3tqnf9I6AV3y0+K2wSZWbFmlSTgCXkhRcdiBaGu8Hf35/KA=
bj-lazy-load.min.js
st1.bgr.in/wp-content/plugins/bj-lazy-load/js/
2 KB
1 KB
Script
General
Full URL
https://st1.bgr.in/wp-content/plugins/bj-lazy-load/js/bj-lazy-load.min.js?ver=2
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
5bc5fe165e8fab88549d56628bcc4ad463235f7f995c0477fb90fc78698be265

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
_ZP33LfXNZS.5R7ROwjxRhSgMfXbWb5Z
content-encoding
gzip
last-modified
Tue, 19 Feb 2019 09:24:01 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:0/gname:root/uname:root/gid:0/mode:33188/mtime:1550567903/atime:1550567970/md5:4f7d8e4e89b3a30253ab1489c4498423/ctime:1550567970
x-amz-request-id
2D9FBC3C4ACAD36D
etag
"4f7d8e4e89b3a30253ab1489c4498423"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=2592000
date
Tue, 13 Aug 2019 15:28:18 GMT
accept-ranges
bytes
content-length
683
x-amz-id-2
HgIXnWvw8LStvPafBRdtG02SU0gEALHrjBnEzXM3DfXgZ+xvcf7yM/APguTXz9wzxGWk9nrWczs=
widgets.js
platform.twitter.com/
93 KB
93 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40B2) /
Resource Hash
a8907cef9f64bccd7d625c25537cadf6c4d4ba17f7c62e1e029edc706e1a654d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 13 Aug 2019 15:28:18 GMT
Last-Modified
Wed, 24 Jul 2019 23:24:45 GMT
Server
ECS (fcn/40B2)
Etag
"1b95626cf7796551e445933f79466124"
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=1800
X-Cache
HIT
Accept-Ranges
bytes
Content-Type
application/javascript; charset=utf-8
Content-Length
95170
47c7ec92d91e.js
www.instagram.com/static/bundles/es6/EmbedSDK.js/
Redirect Chain
  • https://platform.instagram.com/en_US/embeds.js
  • https://www.instagram.com/embed.js
  • https://www.instagram.com/static/bundles/es6/EmbedSDK.js/47c7ec92d91e.js
15 KB
5 KB
Script
General
Full URL
https://www.instagram.com/static/bundles/es6/EmbedSDK.js/47c7ec92d91e.js
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f206:e5:face:b00c:0:4420 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
8f2e37cf4e314907e37bf11c3205be713c048968afb0af99f791b1f336308a33

Request headers

Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 06 Aug 2019 12:39:35 GMT
x-fb-trip-id
1679558926
status
200
etag
"47c7ec92d91e"
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
edge-control
max-age=1209600, no-transform
cache-control
public,max-age=31536000,immutable
content-encoding
br
content-length
4822

Redirect headers

status
302
date
Tue, 13 Aug 2019 15:28:18 GMT
x-fb-trip-id
1679558926
cache-control
max-age=21600
location
https://www.instagram.com/static/bundles/es6/EmbedSDK.js/47c7ec92d91e.js
content-type
text/html; charset=utf-8
gpt.js
www.googletagservices.com/tag/js/
35 KB
12 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
59209ca1a1449a25337199c5042e7d4f0f76df7713a7a4a713cb703b9c7a8157
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"248 / 839 of 1000 / last-modified: 1565648730"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43,39",quic=":443"; ma=2592000; v="46,43,39"
content-length
12357
x-xss-protection
0
expires
Tue, 13 Aug 2019 15:28:18 GMT
bootstrap.min.css
st1.bgr.in/wp-content/themes/bgr2017/css/vendors/
118 KB
20 KB
Stylesheet
General
Full URL
https://st1.bgr.in/wp-content/themes/bgr2017/css/vendors/bootstrap.min.css
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f75e846cc83bd11432f4b1e21a45f31bc85283d11d372f7b19accd1bf6a2635c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
dL7yipY66XMWvor5nEJIC3Uq1ibCiJGp
content-encoding
gzip
last-modified
Mon, 06 Nov 2017 11:51:11 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:48/gname:apache/uname:apache/gid:48/mode:33188/mtime:1509943311/atime:1509943311/md5:ec3bb52a00e176a7181d454dffaea219/ctime:1509945112
x-amz-request-id
B2FFE9EEA9FB346F
etag
"ec3bb52a00e176a7181d454dffaea219"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=2592000
date
Tue, 13 Aug 2019 15:28:18 GMT
accept-ranges
bytes
content-length
19740
x-amz-id-2
IS1K97ywafWUwFKSWcuEVBLdT6qDnkq/ZBdXEB3BtWPGjpdw7htw9M4lxBbiAe98b3BSnsXxCfc=
font-awesome.min.css
st1.bgr.in/wp-content/themes/bgr2017/css/vendors/
28 KB
7 KB
Stylesheet
General
Full URL
https://st1.bgr.in/wp-content/themes/bgr2017/css/vendors/font-awesome.min.css
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
008a1d103902f15fdb1c191fcb1ce8954330e7b8de43d09abb08555ba609f420

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
O6i2VP75WbJCl.taljcA9bY_1SxLZxfC
content-encoding
gzip
last-modified
Mon, 06 Nov 2017 11:51:11 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:48/gname:apache/uname:apache/gid:48/mode:33188/mtime:1509943311/atime:1509943311/md5:4083f5d376eb849a458cc790b53ba080/ctime:1509945112
x-amz-request-id
4168F11A1FCBF534
etag
"4083f5d376eb849a458cc790b53ba080"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=2592000
date
Tue, 13 Aug 2019 15:28:18 GMT
accept-ranges
bytes
content-length
6662
x-amz-id-2
AAQCiVaWlBsL2VLslAWpRHQGcMnXdv+63snsHWII27W1hKKTf69FAGNoEi3V40X0NMWsl1G0r60=
css
fonts.googleapis.com/
14 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto+Slab:300,400,700|Roboto:300,400,700
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
304b25133a3a95c8b74118dc2f35ffa2d7196ecebb56a61c53b4693036f5a5a4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Tue, 13 Aug 2019 15:28:18 GMT
server
ESF
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
status
200
date
Tue, 13 Aug 2019 15:28:18 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
x-xss-protection
0
expires
Tue, 13 Aug 2019 15:28:18 GMT
css
fonts.googleapis.com/
3 KB
649 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Eczar|Roboto
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
b870f5d5d9c314440747d332c3e17d28d43c13629b8ad6445df55768d8638842
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Tue, 13 Aug 2019 15:28:18 GMT
server
ESF
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
status
200
date
Tue, 13 Aug 2019 15:28:18 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
x-xss-protection
0
expires
Tue, 13 Aug 2019 15:28:18 GMT
newsroom.js
c2.taboola.com/nr/zeemedia-bgr/
57 KB
16 KB
Script
General
Full URL
https://c2.taboola.com/nr/zeemedia-bgr/newsroom.js
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6e2f7e668346bb1df51efd4ca416040a6470feb9dbfb2d93bf7b537429ad8f8c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
null
content-encoding
gzip
etag
"ddd292b7a5e4716829305762fddace1b"
age
78
x-cache
HIT
status
200
content-length
16099
x-amz-id-2
w+AguhlFwP8QB5Y5T+AtOBxDPpos9N+K945CKItUwnsC2q9A2M/qyMWhHrrHaKP+twJbRDvanVE=
x-served-by
cache-fra19140-FRA
last-modified
Wed, 31 Jul 2019 09:58:18 GMT
server
AmazonS3
x-timer
S1565710114.949304,VS0,VE0
date
Tue, 13 Aug 2019 15:28:33 GMT
vary
Accept-Encoding
x-amz-request-id
B0C178347C8010BC
via
1.1 varnish
cache-control
max-age=14400
accept-ranges
bytes
content-type
application/javascript
x-cache-hits
1
izooto.4088.min.js
cdn.izooto.com/scripts/sdk/
3 KB
2 KB
Script
General
Full URL
https://cdn.izooto.com/scripts/sdk/izooto.4088.min.js
Requested by
Host: cdn.izooto.com
URL: https://cdn.izooto.com/scripts/185ab9ebc070b0b242472a9489383866a9255d5f.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:d841 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
752e13840e59c82543912fe0bf982a0db00432e612adc33880021997ce358e32
Security Headers
Name Value
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:18 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 02 Feb 2018 11:11:35 GMT
server
cloudflare
age
445025
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=10800
cf-ray
505bb7d3a9d1bf28-FRA
x-xss-protection
1; mode=block
expires
Tue, 13 Aug 2019 18:28:18 GMT
loader.js
cdn.taboola.com/libtrc/zeemedia-bgr/
178 KB
23 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/zeemedia-bgr/loader.js
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
42f31e05dce9e198754dc83980ada63fb356ed11ee43113f1e53c55b4a0ccaa9

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
cI1ITZNdgNFC98kjbjZh9GRbkkMA.m2D
content-encoding
gzip
etag
"221cefe04e6baa260c0e39a005a5a442"
age
7
x-cache
HIT
status
200
content-length
23491
x-amz-id-2
54PyG1GCNmNQ7rKEG/X9Li5m9OPYs2caoWeb+OrCgky/zHh5SnZYKn+CXlekE6WrUhe8VzxzxlM=
x-served-by
cache-hhn4083-HHN
last-modified
Mon, 12 Aug 2019 08:20:20 GMT
server
AmazonS3
x-timer
S1565710106.760588,VS0,VE0
date
Tue, 13 Aug 2019 15:28:25 GMT
vary
Accept-Encoding
x-amz-request-id
82F194B4583DDF34
via
1.1 varnish
cache-control
private,max-age=14401
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
59
x-cache-hits
1
qevents.js
a.quora.com/
11 KB
4 KB
Script
General
Full URL
https://a.quora.com/qevents.js
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.113.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
bc8f028bc9cf52473a5950065ffbfec78b928fa5d01feeb85f57bd685442b854

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
pgDa9kc8qtkAn9MEyH9qaqyrC653nHan
content-encoding
gzip
etag
"bef10a8274525e30ae5d4b917056fd85"
age
7053
x-cache
HIT
status
200
content-length
3703
x-amz-id-2
DvR/djcxYemcVq8rzq48w5uQU9JYGhiuh0KMnMpQPi2vZ1GNzaZkpNTGG/+ty68RSTFgk2+kl4o=
x-served-by
cache-hhn4075-HHN
last-modified
Fri, 24 May 2019 02:19:28 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
atime:1558664366/ctime:1558664365/gid:1000000/gname:employee/md5:bef10a8274525e30ae5d4b917056fd85/mode:33188/mtime:1149709104/uid:1000230/uname:xiao
x-timer
S1565710100.860454,VS0,VE0
date
Tue, 13 Aug 2019 15:28:19 GMT
vary
Accept-Encoding
x-amz-request-id
1BFCAAC6D1105F1B
via
1.1 varnish
cache-control
max-age=7200
accept-ranges
bytes
content-type
binary/octet-stream
x-cache-hits
3358
gtm.js
www.googletagmanager.com/
75 KB
26 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-MBRX45
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
545dfa84175d4b55178556a3544463f015351d6e2b5ec67e616e43d94bbcb7fe
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:18 GMT
content-encoding
br
last-modified
Tue, 13 Aug 2019 15:00:00 GMT
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
26745
x-xss-protection
0
expires
Tue, 13 Aug 2019 15:28:18 GMT
KFOlCnqEu92Fr1MmWUlfBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v20/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOlCnqEu92Fr1MmWUlfBBc4AMP6lQ.woff2
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0d9fd7ccabde9b202de45ee6b65878ce9594975d8e8810b0878d3f3fa3637d0e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://fonts.googleapis.com/css?family=Roboto+Slab:300,400,700|Roboto:300,400,700
Origin
https://www.bgr.in
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 12 Aug 2019 22:53:54 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:58 GMT
server
sffe
age
59664
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
11020
x-xss-protection
0
expires
Tue, 11 Aug 2020 22:53:54 GMT
fontawesome-webfont.woff2
st1.bgr.in/wp-content/themes/bgr2017/css/fonts/
70 KB
71 KB
Font
General
Full URL
https://st1.bgr.in/wp-content/themes/bgr2017/css/fonts/fontawesome-webfont.woff2?v=4.6.3
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
7dacf83f51179de8d7980a513e67ab3a08f2c6272bb5946df8fd77c0d1763b73

Request headers

Sec-Fetch-Mode
cors
Referer
https://st1.bgr.in/wp-content/themes/bgr2017/css/vendors/font-awesome.min.css
Origin
https://www.bgr.in
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
d88.u9PcEj8gBMTgDaktUkwBq2XM5fUP
content-encoding
gzip
etag
"e6cf7c6ec7c2d6f670ae9d762604cb0b"
x-amz-request-id
C93AE5C70CC23B9F
status
200
vary
Accept-Encoding
x-amz-id-2
7q0e9cp8yexeSrP7jBeOQXY45B/kBt/EBbdk//PO75DhtZvfKUMswi0XP5howTvh35rDCCIO0sA=
last-modified
Mon, 06 Nov 2017 11:51:10 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:48/gname:apache/uname:apache/gid:48/mode:33188/mtime:1509943311/atime:1509943311/md5:e6cf7c6ec7c2d6f670ae9d762604cb0b/ctime:1509945112
date
Tue, 13 Aug 2019 15:28:19 GMT
access-control-max-age
3000
access-control-allow-methods
GET
content-type
text/css
access-control-allow-origin
*
accept-ranges
bytes
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://fonts.googleapis.com/css?family=Roboto+Slab:300,400,700|Roboto:300,400,700
Origin
https://www.bgr.in
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 24 Jul 2019 01:24:47 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:50 GMT
server
sffe
age
1778611
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
11016
x-xss-protection
0
expires
Thu, 23 Jul 2020 01:24:47 GMT
sprit-icon.png
st1.bgr.in/wp-content/themes/bgr2017/images/
8 KB
9 KB
Image
General
Full URL
https://st1.bgr.in/wp-content/themes/bgr2017/images/sprit-icon.png?20180112
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
Akamai Image Manager /
Resource Hash
342c66d070a5418fa7fac5bafc3f7eca145c13ac9d3fb9b922dc87e144eb4ccd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://st1.bgr.in/wp-content/themes/bgr2017/css/bgr_desktop.css?ver=20190809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:18 GMT
x-check-cacheable
YES
server
Akamai Image Manager
etag
"dc6c8180d2e6a71454203e5970a12a6f"
x-serial
41
content-type
image/webp
status
200
cache-control
public, max-age=2592000
last-modified
Fri, 24 May 2019 18:29:07 GMT
x-akamai-ssl-client-sid
YHEoGYMHqfUtAYBcpNe71g==
content-length
8584
expires
Fri, 16 Aug 2019 18:32:50 GMT
generic.js
impulse.forkcdn.com/pub/bgr/bgr/
2 KB
1 KB
Script
General
Full URL
https://impulse.forkcdn.com/pub/bgr/bgr/generic.js
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:89bc , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / forkcdn
Resource Hash
dddc8e1b05c8c4a6d4b3b0dc97be711f605702daa597e4c800958e8946d265d8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:18 GMT
content-encoding
br
etag
W/"5d3ae809-955"
cf-cache-status
HIT
last-modified
Fri, 26 Jul 2019 11:46:17 GMT
server
cloudflare
age
1063953
x-powered-by
forkcdn
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=2678400
cf-ray
505bb7d43bf89ac8-FRA
expires
Fri, 13 Sep 2019 15:28:18 GMT
truncated
/
35 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a3479b45d477eb8429f4be8a396050d90f894559a72068ec3593ec43f586d138

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
truncated
/
42 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/gif
white-dot.png
st1.bgr.in/wp-content/themes/bgr2017/images/
108 B
297 B
Image
General
Full URL
https://st1.bgr.in/wp-content/themes/bgr2017/images/white-dot.png
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
Akamai Image Manager /
Resource Hash
09bd409aa9fe871169a86f3cd449f925c42a7406e63fef19d9baf5be013a9984

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://st1.bgr.in/wp-content/themes/bgr2017/css/bgr_desktop.css?ver=20190809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:18 GMT
last-modified
Sun, 26 May 2019 02:14:31 GMT
server
Akamai Image Manager
etag
"cc853876d8e5ba31bc62fa66e3789639"
content-type
image/webp
status
200
cache-control
public, max-age=2592000
content-length
108
expires
Sun, 18 Aug 2019 02:17:38 GMT
BngRUXZYTXPIvIBgJJSb6u92w7CGwR2oefDo.woff2
fonts.gstatic.com/s/robotoslab/v9/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v9/BngRUXZYTXPIvIBgJJSb6u92w7CGwR2oefDo.woff2
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
4901c9453014d8e210b2f62189f68c2d7964543517e1fc8447924de7d542058a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://fonts.googleapis.com/css?family=Roboto+Slab:300,400,700|Roboto:300,400,700
Origin
https://www.bgr.in
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 12 Aug 2019 21:10:55 GMT
x-content-type-options
nosniff
last-modified
Mon, 22 Jul 2019 19:27:03 GMT
server
sffe
age
65843
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
11388
x-xss-protection
0
expires
Tue, 11 Aug 2020 21:10:55 GMT
BngMUXZYTXPIvIBgJJSb6ufN5qWr4xCC.woff2
fonts.gstatic.com/s/robotoslab/v9/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v9/BngMUXZYTXPIvIBgJJSb6ufN5qWr4xCC.woff2
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c68d891f07355e5d0807b4a4f18ac8f16f6e9088277be3134c7efa570022ab2d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://fonts.googleapis.com/css?family=Roboto+Slab:300,400,700|Roboto:300,400,700
Origin
https://www.bgr.in
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 22 Jul 2019 19:38:25 GMT
x-content-type-options
nosniff
last-modified
Mon, 22 Jul 2019 19:19:23 GMT
server
sffe
age
1885793
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
11272
x-xss-protection
0
expires
Tue, 21 Jul 2020 19:38:25 GMT
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.7.1/
92 KB
33 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/1.7.1/jquery.min.js
Requested by
Host: zee.shopping
URL: https://zee.shopping/js/initial.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
88171413fc76dda23ab32baa17b11e4fff89141c633ece737852445f1ba6c1bd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 19 Jun 2019 19:40:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
4736878
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
33333
x-xss-protection
0
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 18 Jun 2020 19:40:20 GMT
izooto.js
cdn.izooto.com/scripts/sdk/
113 KB
30 KB
Script
General
Full URL
https://cdn.izooto.com/scripts/sdk/izooto.js
Requested by
Host: cdn.izooto.com
URL: https://cdn.izooto.com/scripts/sdk/izooto.4088.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:d841 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
46d413635b6d4811b931921e7ce8ed963fe94d3ace2bf3f9161632ad68dcba4c
Security Headers
Name Value
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:18 GMT
content-encoding
br
cf-cache-status
HIT
age
349155
cf-polished
origSize=116030
status
200
last-modified
Fri, 09 Aug 2019 14:28:13 GMT
x-xss-protection
1; mode=block
cf-bgj
minify
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=10800
cf-ray
505bb7d44acfbf28-FRA
expires
Tue, 13 Aug 2019 18:28:18 GMT
page.php
www.facebook.com/plugins/ Frame 3711
0
0
Document
General
Full URL
https://www.facebook.com/plugins/page.php?href=https%3A%2F%2Fwww.facebook.com%2FBGRIndia&tabs=timeline&width=489&height=307&small_header=true&adapt_container_width=true&hide_cover=false&show_facepile=true&appId
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f106:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/page.php?href=https%3A%2F%2Fwww.facebook.com%2FBGRIndia&tabs=timeline&width=489&height=307&small_header=true&adapt_container_width=true&hide_cover=false&show_facepile=true&appId
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
timing-allow-origin
*
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
content-type
text/html; charset="utf-8"
x-fb-debug
qFi8GXihgyyD/im+MZCpNFsexygey4k27EsUkcJ9nyg6JJEJfc1tO7UVEfo9aL5FmvX1/gacejmYCRCnC5L6DQ==
date
Tue, 13 Aug 2019 15:28:18 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/__utm.gif?utmwv=5.7.2dc&utms=1&utmn=2098222609&utmhn=www.bgr.in&utmcs=UTF-8&utmsr=1600x1200&utmvp=1585x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Google%E...
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-21819872-1&cid=1707841348.1565710099&jid=59937073&_v=5.7.2dc&z=2098222609
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-21819872-1&cid=1707841348.1565710099&jid=59937073&_v=5.7.2dc&z=2098222609&slf_rd=1&random=335096509
42 B
374 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-21819872-1&cid=1707841348.1565710099&jid=59937073&_v=5.7.2dc&z=2098222609&slf_rd=1&random=335096509
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:18 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:18 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-21819872-1&cid=1707841348.1565710099&jid=59937073&_v=5.7.2dc&z=2098222609&slf_rd=1&random=335096509
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
iz_setcid.html
cdn.izooto.com/scripts/sak/ Frame A64B
0
0
Document
General
Full URL
https://cdn.izooto.com/scripts/sak/iz_setcid.html
Requested by
Host: cdn.izooto.com
URL: https://cdn.izooto.com/scripts/sdk/izooto.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:d841 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
Security Headers
Name Value
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
cdn.izooto.com
:scheme
https
:path
/scripts/sak/iz_setcid.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
accept-encoding
gzip, deflate, br
cookie
__cfduid=db7e4f9ce2c8c59e9536d20dda78206891565710098
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/

Response headers

status
200
date
Tue, 13 Aug 2019 15:28:18 GMT
content-type
text/html; charset=UTF-8
last-modified
Mon, 18 Mar 2019 12:37:28 GMT
x-xss-protection
1; mode=block
cf-cache-status
HIT
age
701401
expires
Fri, 13 Sep 2019 15:28:18 GMT
cache-control
public, max-age=2678400
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
server
cloudflare
cf-ray
505bb7d4dba1bf28-FRA
content-encoding
br
afph.js
adgebra.co.in/afph/
495 B
403 B
Script
General
Full URL
https://adgebra.co.in/afph/afph.js
Requested by
Host: impulse.forkcdn.com
URL: https://impulse.forkcdn.com/pub/bgr/bgr/generic.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:3120 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
faa104ac2a57ff6717c92388e73bf95bfcfd27946f67c0f7257476b331c30ed1

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:18 GMT
content-encoding
gzip
last-modified
Thu, 14 Feb 2019 14:13:30 GMT
server
cloudflare
etag
W/"495-1550153610000"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
cache-control
max-age=7200
cf-ray
505bb7d51874dfcf-FRA
expires
Tue, 13 Aug 2019 17:28:18 GMT
afpf.js
adgebra.co.in/afpf/
397 B
649 B
Script
General
Full URL
https://adgebra.co.in/afpf/afpf.js?p1=4074&p2=0&p3=2&p4=2~2!prf-new-bgr.in&p5=
Requested by
Host: impulse.forkcdn.com
URL: https://impulse.forkcdn.com/pub/bgr/bgr/generic.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:3120 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
71d4fed3f7bd6880fd5d7566c1150a92ba258f26cd72a62668188babd58ea470

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:18 GMT
content-encoding
gzip
last-modified
Wed, 18 Apr 2018 07:40:28 GMT
server
cloudflare
etag
W/"397-1524037228000"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
cache-control
max-age=7200
cf-ray
505bb7d51875dfcf-FRA
expires
Tue, 13 Aug 2019 17:28:18 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=9254297&ns__t=1565710098700&ns_c=UTF-8&cv=3.1&c8=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&c7=http...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=9254297&ns__t=1565710098700&ns_c=UTF-8&cv=3.1&c8=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&c7=htt...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=9254297&ns__t=1565710098700&ns_c=UTF-8&cv=3.1&c8=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&c7=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&c9=
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 13 Aug 2019 15:28:18 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=9254297&ns__t=1565710098700&ns_c=UTF-8&cv=3.1&c8=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&c7=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&c9=
Pragma
no-cache
Date
Tue, 13 Aug 2019 15:28:18 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
sdk.js
connect.facebook.net/en_US/
3 KB
2 KB
Script
General
Full URL
https://connect.facebook.net/en_US/sdk.js
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f006:21:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
0d524a134ffc023a5118e982d07878aa28d8cc699906fbd03583a769b7d8bfed
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
zjgGwJbGEwrbjkwMWiRk1w==
status
200
content-length
1778
etag
"ff1df7c7c2dc01a1918f2fe890407eb8"
x-fb-debug
pVlAqcoRKhYTvw8D+ILZFmqyQqdTvz3qa92b6aZG3cie8U5F/cK9w+yNN344kV/9Pjl/ARdAl6GMS1HYlh6RYw==
x-fb-trip-id
194532234
x-fb-content-md5
b14fb78b31a342d78634d95c662e2fb6
x-frame-options
DENY
date
Tue, 13 Aug 2019 15:28:18 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=1200,stale-while-revalidate=3600
timing-allow-origin
*
expires
Tue, 13 Aug 2019 15:44:31 GMT
share-social-v4.png
st1.bgr.in/wp-content/themes/bgr2017/images/
8 KB
8 KB
Image
General
Full URL
https://st1.bgr.in/wp-content/themes/bgr2017/images/share-social-v4.png?20180112
Requested by
Host: st1.bgr.in
URL: https://st1.bgr.in/wp-content/themes/bgr2017/js/jquery-min.1.11.1.js?ver=20190809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
Akamai Image Manager /
Resource Hash
03ea7b4b6a06eb5977e9f9b87a1534dc07aaec1c45fa8c68c0cd78ae47a57e1b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://st1.bgr.in/wp-content/themes/bgr2017/css/bgr_desktop.css?ver=20190809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:18 GMT
last-modified
Sat, 08 Jun 2019 17:43:17 GMT
server
Akamai Image Manager
etag
"d425e58c6996df21ac9548b5d59a2d7d"
content-type
image/webp
status
200
cache-control
public, max-age=2592000
content-length
8230
expires
Sat, 31 Aug 2019 17:44:25 GMT
analytics.js
www.google-analytics.com/
43 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: zee.shopping
URL: https://zee.shopping/js/initial.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
cec3748d0c3da4700300d5424aaea375b03550b0ee8b3dd38e242c4022261446
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 29 Jul 2019 21:35:27 GMT
server
Golfe2
age
607
date
Tue, 13 Aug 2019 15:18:11 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
17724
expires
Tue, 13 Aug 2019 17:18:11 GMT
widget.css
zee.shopping/css/
2 KB
848 B
Stylesheet
General
Full URL
https://zee.shopping/css/widget.css
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.7.1/jquery.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:134::215:4e6b , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
zee.shopping /
Resource Hash
c4310d38c602c798b5c79c7235b58fb098d2ff9dfcf6691bd8f8d7ea37ed9616

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
date
Tue, 13 Aug 2019 15:28:18 GMT
content-encoding
gzip
last-modified
Tue, 23 Jul 2019 09:59:16 GMT
server
zee.shopping
status
200
etag
W/"5d36da74-791"
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
public, max-age=2582595
content-length
642
expires
Thu, 12 Sep 2019 12:51:33 GMT
getWidget
zee.shopping/api/widget/
2 KB
812 B
XHR
General
Full URL
https://zee.shopping/api/widget/getWidget
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.7.1/jquery.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:134::215:4e6b , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
zee.shopping /
Resource Hash
37b0040278a0d489b2afc64faf33d8e1831bbc9941ad7a6d8cc65ac9a72c452d

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
cors
Content-Type
application/x-www-form-urlencoded

Response headers

date
Tue, 13 Aug 2019 15:28:19 GMT
content-encoding
gzip
server
zee.shopping
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PATCH, PUT, DELETE, OPTIONS
content-type
text/html; charset=UTF-8
access-control-allow-origin
*
x-ratelimit-remaining
5976
cache-control
no-cache, private
x-ratelimit-limit
6000
access-control-allow-headers
Origin, Content-Type, X-Auth-Token
content-length
533
page-loading2.gif
zee.shopping/img/
43 KB
43 KB
Image
General
Full URL
https://zee.shopping/img/page-loading2.gif
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:134::215:4e6b , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
zee.shopping /
Resource Hash
9bf2a356170d19a8345c5ddc26b1b0df7e5e7fac8da8a27e2d9d61c66949839a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
date
Tue, 13 Aug 2019 15:28:18 GMT
last-modified
Tue, 19 Feb 2019 08:12:57 GMT
server
zee.shopping
etag
"5c6bba89-ab82"
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
public, max-age=1296000
accept-ranges
bytes
content-length
43906
expires
Wed, 28 Aug 2019 15:28:18 GMT
integrator.js
adservice.google.de/adsid/
109 B
476 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.bgr.in
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 13 Aug 2019 15:28:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43,39",quic=":443"; ma=2592000; v="46,43,39"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
476 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.bgr.in
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 13 Aug 2019 15:28:18 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43,39",quic=":443"; ma=2592000; v="46,43,39"
content-length
104
x-xss-protection
0
pubads_impl_2019080801.js
securepubads.g.doubleclick.net/gpt/
158 KB
58 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019080801.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
sffe /
Resource Hash
dbc8d0bf25102c9e472c0ad2be7c307fbbb7c0a4c5951acfdeb1790af720cd0b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 08 Aug 2019 13:06:01 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
59576
x-xss-protection
0
expires
Tue, 13 Aug 2019 15:28:19 GMT
widget_iframe.0639d67d95b7680840758b6833f06d87.html
platform.twitter.com/widgets/ Frame C9AD
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.0639d67d95b7680840758b6833f06d87.html?origin=https%3A%2F%2Fwww.bgr.in
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40B5) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Tue, 13 Aug 2019 15:28:18 GMT
Etag
"7d3f6ed140174a20e7c8be261a70a863"
Last-Modified
Wed, 24 Jul 2019 23:23:20 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40B5)
X-Cache
HIT
Content-Length
15194
sdk.js
connect.facebook.net/en_US/
199 KB
59 KB
Script
General
Full URL
https://connect.facebook.net/en_US/sdk.js?hash=a2ba1fe1df5c336b5e61eff98921b9d4&ua=modern_es6
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/sdk.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f006:21:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
330a1d701ade5ab5a08a6ce6091fcdb90b42cb87301c98f5b7ca44a09960325b
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Origin
https://www.bgr.in
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
i9mYfmf/ZDQjQqxYTFdaRQ==
status
200
content-length
60227
etag
"15ea0aa2df1c0f7ab479d5e084461df4"
x-fb-debug
JYRHJ8fraAX9zW9pKJIqSRP7RD47gyws/uQi1xFd75OcOtFpJBKraJJcferaID0TQOglU5LpoqPW7Pf24QzM8Q==
x-fb-trip-id
194532234
x-fb-content-md5
540eb54e4122009f9a0476f5e67a6133
x-frame-options
DENY
date
Tue, 13 Aug 2019 15:28:18 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=31536000,stale-while-revalidate=3600,immutable
timing-allow-origin
*
expires
Wed, 12 Aug 2020 14:36:30 GMT
collect
www.google-analytics.com/r/
35 B
124 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j78&a=1985639704&t=pageview&_s=1&dl=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&ul=en-us&de=UTF-8&dt=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_utma=234886290.1707841348.1565710099.1565710099.1565710099.1&_utmz=234886290.1565710099.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)&_utmht=1565710098868&_u=IQBCAEAB~&jid=1500482709&gjid=2016337339&cid=1707841348.1565710099&tid=UA-127955151-1&_gid=1898451010.1565710099&_r=1&z=2000989494
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:18 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
196 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j78&a=1985639704&t=event&ni=1&_s=2&dl=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&ul=en-us&de=UTF-8&dt=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&ec=Impression-BGR&ea=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&el=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&_utma=234886290.1707841348.1565710099.1565710099.1565710099.1&_utmz=234886290.1565710099.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)&_utmht=1565710098873&_u=IQBCAEAB~&jid=&gjid=&cid=1707841348.1565710099&tid=UA-127955151-1&_gid=1898451010.1565710099&z=2029238342
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 12 Aug 2019 23:55:03 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
55995
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
afpfChild.js
adgebra.co.in/afpf/
41 KB
11 KB
Script
General
Full URL
https://adgebra.co.in/afpf/afpfChild.js?hrId=2019081317
Requested by
Host: adgebra.co.in
URL: https://adgebra.co.in/afpf/afpf.js?p1=4074&p2=0&p3=2&p4=2~2!prf-new-bgr.in&p5=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:3120 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
dd30b98cba6ec6f009726c4b09cd19b7c66320b3d37b6087f7e4e92a9614e393

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:19 GMT
content-encoding
gzip
last-modified
Mon, 08 Jul 2019 09:25:40 GMT
server
cloudflare
etag
W/"42302-1562577940000"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
cache-control
max-age=7200
cf-ray
505bb7d64d42dfcf-FRA
expires
Tue, 13 Aug 2019 17:28:19 GMT
afphChild.js
adgebra.co.in/afph/
5 KB
2 KB
Script
General
Full URL
https://adgebra.co.in/afph/afphChild.js?hrId=2019081317
Requested by
Host: adgebra.co.in
URL: https://adgebra.co.in/afph/afph.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:3120 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
bd68764c8d9fd96f0b84a2344ce5e8912296ddcc4a8156dc3e1c6860bf3bf750

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:19 GMT
content-encoding
gzip
last-modified
Tue, 13 Aug 2019 13:58:03 GMT
server
cloudflare
etag
W/"5108-1565704683000"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
cache-control
max-age=7200
cf-ray
505bb7d65d65dfcf-FRA
expires
Tue, 13 Aug 2019 17:28:19 GMT
xd_arbiter.php
staticxx.facebook.com/connect/ Frame 367B
0
0
Document
General
Full URL
https://staticxx.facebook.com/connect/xd_arbiter.php?version=44
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/sdk.js?hash=a2ba1fe1df5c336b5e61eff98921b9d4&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f006:21:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
staticxx.facebook.com
:scheme
https
:path
/connect/xd_arbiter.php?version=44
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/

Response headers

status
200
content-type
text/html; charset=utf-8
expires
Fri, 07 Aug 2020 17:19:36 GMT
strict-transport-security
max-age=15552000; preload
content-encoding
br
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
cache-control
public,max-age=31536000,immutable
x-fb-debug
rISaU5OPcbs7LbUMsm+qnleI8tK6av07nmLNQsy2E1t61cb2U80ySU8yuibLj7tvdSbBekPkN3rRGGIdb1+ltA==
content-length
11515
x-fb-trip-id
194532234
date
Tue, 13 Aug 2019 15:28:18 GMT
GetImageDetails
adgebra.co.in/Adg_Analytics/
2 KB
1 KB
XHR
General
Full URL
https://adgebra.co.in/Adg_Analytics/GetImageDetails?docurl=https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/&rand=15
Requested by
Host: adgebra.co.in
URL: https://adgebra.co.in/afph/afphChild.js?hrId=2019081317
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:3120 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d56b92d47410c4053d86584937af73515f43921e6797ef70015d5cee988abcf6

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

date
Tue, 13 Aug 2019 15:28:19 GMT
content-encoding
gzip
server
cloudflare
status
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json;charset=UTF-8
access-control-allow-origin
https://www.bgr.in
cache-control
no-cache
access-control-allow-credentials
true
cf-ray
505bb7d7c848dfcb-FRA
expires
Tue, 13 Aug 2019 15:28:18 GMT
site
adgebra.co.in/afpf/
0
186 B
XHR
General
Full URL
https://adgebra.co.in/afpf/site?p1=4074&p2=19081317&p3=Phone%2C%20iOS%2C%20Google%20Project%20Zero%2C%20iOS%20vulnerabilities&p4=prf-new-bgr.in&pixel=4074
Requested by
Host: adgebra.co.in
URL: https://adgebra.co.in/afpf/afpfChild.js?hrId=2019081317
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:3120 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
public
date
Tue, 13 Aug 2019 15:28:19 GMT
content-encoding
gzip
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
status
200
content-type
text/html;charset=UTF-8
access-control-allow-origin
https://www.bgr.in
cache-control
no-cache, public, no-cache
access-control-allow-credentials
true
cf-ray
505bb7d79a31dfcf-FRA
expires
Tue, 13 Aug 2019 15:28:18 GMT
ads
securepubads.g.doubleclick.net/gampad/
2 KB
818 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3568113801035789&correlator=455881919912893&output=ldjh&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&eid=21064247%2C21064321%2C21064102%2C21064323&vrg=2019080801&guci=1.2.0.0.2.2.0.0&plat=1%3A32776%2C2%3A16809992%2C8%3A134250504&sc=1&sfv=1-0-35&ecs=20190813&iu_parts=11440465%2CBGR_Web%2CBGR_AS_ATF_970x90%2CBGR_AS_ATF_300x250%2CBGR_AS_BTF_1_300x250%2CBGR_AS_BTF_2_300x250%2CBGR_AS_LHS_160x600%2CBGR_AS_RHS_160x600%2CBGR_AS_OOP_1x1&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F3%2C%2F0%2F1%2F4%2C%2F0%2F1%2F5%2C%2F0%2F1%2F6%2C%2F0%2F1%2F7%2C%2F0%2F1%2F8&prev_iu_szs=970x66%7C970x250%7C728x90%7C970x90%2C300x250%2C300x250%2C300x250%2C160x600%7C120x600%2C160x600%7C120x600%2C1x1&prev_scp=Section%3Dnews%7CSection%3Dnews%7CSection%3Dnews%7CSection%3Dnews%7CSection%3Dnews%7CSection%3Dnews%7CSection%3Dnews&cookie_enabled=1&bc=31&abxe=1&lmt=1565710099&dt=1565710099334&dlt=1565710098138&idt=1179&frm=20&biw=1585&bih=1200&oid=3&adxs=308%2C988%2C988%2C988%2C0%2C1425%2C0&adys=61%2C376%2C2079%2C3587%2C62%2C62%2C5143&adks=4278798440%2C4017949879%2C1648686745%2C3670575713%2C1975348422%2C3658702017%2C4001662234&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7&ifi=1&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&dssz=62&icsg=721554505736&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=992x66%7C330x250%7C330x250%7C330x250%7C160x-1%7C160x-1%7C1585x51&msz=970x66%7C300x250%7C300x250%7C300x-1%7C160x-1%7C160x-1%7C1585x1&blev=1&bisch=1&ga_vid=1707841348.1565710099&ga_sid=1565710099&ga_hid=1985639704&ga_fc=true&fws=0%2C0%2C0%2C0%2C512%2C512%2C0&ohw=0%2C0%2C0%2C0%2C0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019080801.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
dcb90deaba75023d94d6062765ac5d2b9da11726e884519b703d7e9864e0e953
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:19 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
285
x-xss-protection
0
google-lineitem-id
-2,-2,-2,-2,-2,-2,-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2,-2,-2,-2,-2,-2,-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.bgr.in
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2019080801.js
securepubads.g.doubleclick.net/gpt/
66 KB
25 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019080801.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019080801.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
sffe /
Resource Hash
5a71ed7e2814d4c4ee366471671d531f71b36a63c7118c88aa58e54fbba21b18
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 08 Aug 2019 13:06:01 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
25145
x-xss-protection
0
expires
Tue, 13 Aug 2019 15:28:19 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-35/html/
0
0

390366_small_1.jpg
s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/product_images/small/
19 KB
20 KB
Image
General
Full URL
https://s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/product_images/small/390366_small_1.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.219.64.66 Mumbai, India, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3.ap-south-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
f9ef62c172b65897e52191bf68852f04509a920f300edfe6700e576af621c45d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 13 Aug 2019 15:28:22 GMT
Last-Modified
Thu, 08 Aug 2019 13:07:12 GMT
Server
AmazonS3
x-amz-request-id
C5BA94EBC5D4184C
ETag
"f36ccd2d38bccb494702570cf7f82899"
Content-Type
image/jpeg
Cache-Control
max-age=604800
Accept-Ranges
bytes
Content-Length
19744
x-amz-id-2
0asmTA7sf8tD0cVDq86zbTkzlUetK4MUmz0nvJkhyKObxKIJSTMeiNexEyek/xQh1ikgU/8+LaM=
zonama.png
s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/store_images/
2 KB
2 KB
Image
General
Full URL
https://s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/store_images/zonama.png
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.219.64.66 Mumbai, India, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3.ap-south-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
788f23269e610db7770b9658b4dc41a3da1450c8509599b6faf179650fdc981f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 13 Aug 2019 15:28:22 GMT
Last-Modified
Thu, 20 Jun 2019 11:27:55 GMT
Server
AmazonS3
x-amz-request-id
148D30DF1E272E8C
ETag
"1f626ec63853c49bec4cc44e0e0a2585"
Content-Type
binary/octet-stream
Cache-Control
max-age=604800
Accept-Ranges
bytes
Content-Length
1717
x-amz-id-2
L3uTiWSwfPQxBc/73rY2sp39WSY8YVZaMpyj3FVvYon/W3TvPIhD2z/wm8vjwHeRyWLAQ/0kRxo=
382012_small_1.jpg
s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/product_images/small/
9 KB
9 KB
Image
General
Full URL
https://s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/product_images/small/382012_small_1.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.219.64.66 Mumbai, India, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3.ap-south-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
e68427c08bd9e04b9eb31898c254cadf05f272fa276c2a8354a78f60b6c46e35

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 13 Aug 2019 15:28:22 GMT
Last-Modified
Tue, 06 Aug 2019 19:31:05 GMT
Server
AmazonS3
x-amz-request-id
2E524E6E6E022838
ETag
"8203e7ae6b30549f72acb85567f40488"
Content-Type
image/jpeg
Cache-Control
max-age=604800
Accept-Ranges
bytes
Content-Length
9137
x-amz-id-2
HnA17QK1BA/vMu0EZKr3FZFPYuP+oUB3JKUTCPsLrexg3CGWCviRkUAoVvMAWy9b3VFKE5GMvOY=
kartflip_2__e0bc5c3e-5ba0-4d30-a787-624969940303.png
s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/store_images/
3 KB
4 KB
Image
General
Full URL
https://s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/store_images/kartflip_2__e0bc5c3e-5ba0-4d30-a787-624969940303.png
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.219.64.66 Mumbai, India, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3.ap-south-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
c9720fddf133557f4d63cf938fd199bb333ffbf8ae16d551b685cdf28e9bb90d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 13 Aug 2019 15:28:22 GMT
Last-Modified
Thu, 20 Jun 2019 11:27:54 GMT
Server
AmazonS3
x-amz-request-id
AC8D15A0DE73CF1F
ETag
"f60bde4ba1acb86157bbd41ff846cdfc"
Content-Type
image/jpeg
Cache-Control
max-age=604800
Accept-Ranges
bytes
Content-Length
3463
x-amz-id-2
a1KytBlchRnvZ4vFeXatdhziZyfAg3//sRBI3OAy/omTnPrCC3eIWFN3L0euGgNJBZYAzBsocfg=
377757_small_1.jpg
s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/product_images/small/
8 KB
8 KB
Image
General
Full URL
https://s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/product_images/small/377757_small_1.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.219.64.66 Mumbai, India, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3.ap-south-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
4e34e3a46c1d454a02551729f59779424a3d6affbf2c19479b378741f2ed7952

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 13 Aug 2019 15:28:23 GMT
Last-Modified
Tue, 06 Aug 2019 19:00:07 GMT
Server
AmazonS3
x-amz-request-id
6D5E3134E55B2E06
ETag
"6a57eba371d5838ddef2bdd84c28cf62"
Content-Type
image/jpeg
Cache-Control
max-age=604800
Accept-Ranges
bytes
Content-Length
8195
x-amz-id-2
CEBxYyB0C35QQiHtbZR68w0HVBmPKWzAKGrq4ihqPWKubfcn7rW5qxpGS+Bf1LMqHEqnjQdLudQ=
390399_small_1.jpg
s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/product_images/small/
15 KB
16 KB
Image
General
Full URL
https://s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/product_images/small/390399_small_1.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.219.64.66 Mumbai, India, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3.ap-south-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
ac0194cfb8f4f0e497c4c68b17943588dd3e90b0ff29b78ce123116654494319

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 13 Aug 2019 15:28:23 GMT
Last-Modified
Thu, 08 Aug 2019 13:07:28 GMT
Server
AmazonS3
x-amz-request-id
6484428E9A642E62
ETag
"5f64634ee10d067b0f51c3b97bde247e"
Content-Type
image/jpeg
Cache-Control
max-age=604800
Accept-Ranges
bytes
Content-Length
15691
x-amz-id-2
ZWmJILJSfqGXv0VJp+T5j0M79p8ZuNs5tZ2fPHFIFideQUrlJCL/r0khwWlWsgKFoiaOpRkjggs=
download_2__e93e35f3-e29f-4e1b-939e-e7480514d45a.png
s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/store_images/
3 KB
3 KB
Image
General
Full URL
https://s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/store_images/download_2__e93e35f3-e29f-4e1b-939e-e7480514d45a.png
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.219.64.66 Mumbai, India, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3.ap-south-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
79ee192dd4061e6684a3b9f83d4c21b305f550e0830eaa4ac5ddfd9c5a00953a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 13 Aug 2019 15:28:22 GMT
Last-Modified
Thu, 20 Jun 2019 11:27:54 GMT
Server
AmazonS3
x-amz-request-id
A4D0EE99BB90430D
ETag
"317e70012051b2cc2cc152f454abd211"
Content-Type
image/jpeg
Cache-Control
max-age=604800
Accept-Ranges
bytes
Content-Length
2877
x-amz-id-2
2q30FkedR76OUXQHTgGT8jl87zmMoLLQsmae68XCOKlF45/zzB+wi56C/JuSVVARAhlQe9sVsN0=
378135_small_1.jpg
s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/product_images/small/
7 KB
7 KB
Image
General
Full URL
https://s3.ap-south-1.amazonaws.com/zee-shopping/smartprice/static/product_images/small/378135_small_1.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.219.64.66 Mumbai, India, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3.ap-south-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
30b5eb9bdd7d8b446d1c46af92d6384ed1c2bbc47799ca342ea88a46a801d647

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 13 Aug 2019 15:28:21 GMT
Last-Modified
Tue, 06 Aug 2019 19:02:31 GMT
Server
AmazonS3
x-amz-request-id
EC8F627DC4AB2B09
ETag
"f3710d6df45787dd0d821d79cc2edd48"
Content-Type
image/jpeg
Cache-Control
max-age=604800
Accept-Ranges
bytes
Content-Length
7275
x-amz-id-2
XjEVpuQDnbINkETcSltGGCo3YjzUTbH+dU1s7DX/0zFss9thLZLaNHmemIwUijXTVNUazC8BW0A=
pixel
q.quora.com/_/ad/ebb23553371c4b7eb49439797cc63b99/
43 B
457 B
Image
General
Full URL
https://q.quora.com/_/ad/ebb23553371c4b7eb49439797cc63b99/pixel?j=1&u=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&tag=ViewContent&ts=1565710099883
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.120.185 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-120-185.compute-1.amazonaws.com
Software
nginx /
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 13 Aug 2019 15:28:20 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
X-Q-Stat
81,dd1d8ecfc58f1f1fd43070b0b8f6a634,10.0.0.96,26672,185.169.255.48,,24512409168,1,1565710100.567,0.002,,.,0,0,0.000,0.000,-,0,0,304,219,109,10,26847,,,,,,,
Content-Type
image/gif
load.js
widget.perfectmarket.com/zeemedia-bgr/
3 KB
2 KB
Script
General
Full URL
https://widget.perfectmarket.com/zeemedia-bgr/load.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/zeemedia-bgr/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.13.181 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
76c3a15b988e017f65db3f761354c52cc9a89cf5bca15689c5c7c21f6efa64b0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
ohE.cjT8hyhPf3hCEgnn3bWTwg44blbo
content-encoding
gzip
etag
"c7211067baf03892f27c259abcbaeff4"
age
154
x-cache
HIT, MISS
status
200
content-length
1180
x-amz-id-2
ONDLnhl6kDskbMpwj2dX2hJZ/RqO5XZ11ZFrzmm8nKck6kdpWW34HKYSUxTiZu0aykbNYQDymCs=
x-served-by
cache-lax8635-LAX, cache-fra19131-FRA
last-modified
Mon, 01 Jul 2019 11:16:22 GMT
server
AmazonS3
x-timer
S1565710106.931234,VS0,VE147
date
Tue, 13 Aug 2019 15:28:26 GMT
vary
Accept-Encoding,,
x-amz-request-id
95F1BA72C4B082DC
via
1.1 varnish, 1.1 varnish
cache-control
max-age=300
accept-ranges
bytes
content-type
text/plain
x-cache-hits
1, 0
impl.370-46-RELEASE.js
cdn.taboola.com/libtrc/
392 KB
111 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/zeemedia-bgr/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
43f8bf248dbd5137c91d070c4c1bb0124d7302009bf53815ee1b0a929f9e13fe

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
heYD.7G0M87IBWjlPwcttH___syRjKRr
content-encoding
gzip
etag
"8b3f2fe803060cbe0c74647f7fc83752"
age
8
x-cache
HIT
status
200
x-amz-replication-status
COMPLETED
content-length
113247
x-amz-id-2
7eSZ/z0QYVC+dRSeMkzQ/NKs95PJNgjr57OVLrxPQXq+HSGWfznisqIXq4Ug5VYJZ1gfZ/VyEWo=
x-served-by
cache-hhn4083-HHN
last-modified
Mon, 12 Aug 2019 12:12:44 GMT
server
AmazonS3
x-timer
S1565710106.849709,VS0,VE0
date
Tue, 13 Aug 2019 15:28:25 GMT
vary
Accept-Encoding
x-amz-request-id
93744EBF5E625968
via
1.1 varnish
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
51
x-cache-hits
80
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/zeemedia-bgr/loader.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 13 Aug 2019 15:28:25 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
901
Expires
Wed, 14 Aug 2019 15:28:25 GMT
debug
trc.taboola.com/zeemedia-bgr/log/2/
0
71 B
Image
General
Full URL
https://trc.taboola.com/zeemedia-bgr/log/2/debug?tim=17:28:25.834&type=usage&id=1294&msg=%5Bloader.js%20-%20usage%5D%20checkModeVisibilityConstraints
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:25 GMT
via
1.1 varnish
server
Varnish
x-timer
S1565710106.852649,VS0,VE0
x-served-by
cache-hhn4083-HHN
x-cache
HIT
content-type
status
204
cache-control
no-store
accept-ranges
bytes
retry-after
0
x-cache-hits
0
debug
trc.taboola.com/zeemedia-bgr/log/2/
0
51 B
Image
General
Full URL
https://trc.taboola.com/zeemedia-bgr/log/2/debug?tim=17:28:25.834&type=usage&id=2605&msg=%5Bloader.js%20-%20usage%5D%20checkModeVisibilityConstraints
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:25 GMT
via
1.1 varnish
server
Varnish
x-timer
S1565710106.852668,VS0,VE0
x-served-by
cache-hhn4083-HHN
x-cache
HIT
content-type
status
204
cache-control
no-store
accept-ranges
bytes
retry-after
0
x-cache-hits
0
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1565710105877&ns_c=UTF-8&cv=3.1&c8=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%...
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1565710105877&ns_c=UTF-8&cv=3.1&c8=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1565710105877&ns_c=UTF-8&cv=3.1&c8=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&c7=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&c9=
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 13 Aug 2019 15:28:25 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1565710105877&ns_c=UTF-8&cv=3.1&c8=Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone&c7=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&c9=
Pragma
no-cache
Date
Tue, 13 Aug 2019 15:28:25 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v18/
10 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
4352380f92ce7f9a4a4a23306b992bed10055dbfffe90987cc72083e583fc280
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Origin
https://www.bgr.in
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 12 Aug 2019 19:48:32 GMT
x-content-type-options
nosniff
last-modified
Mon, 16 Oct 2017 17:32:51 GMT
server
sffe
age
70794
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
10748
x-xss-protection
0
expires
Tue, 11 Aug 2020 19:48:32 GMT
BngRUXZYTXPIvIBgJJSb6u92w7CGwR2oefDo.woff2
fonts.gstatic.com/s/robotoslab/v7/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v7/BngRUXZYTXPIvIBgJJSb6u92w7CGwR2oefDo.woff2
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c055f4fc89b73bc480ac07d607782cb3482fc98cbec6f89135ff76ce5512280
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Origin
https://www.bgr.in
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 02 Jun 2019 12:45:25 GMT
x-content-type-options
nosniff
last-modified
Wed, 11 Oct 2017 18:32:29 GMT
server
sffe
age
6230581
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
11096
x-xss-protection
0
expires
Mon, 01 Jun 2020 12:45:25 GMT
BngMUXZYTXPIvIBgJJSb6ufN5qWr4xCC.woff2
fonts.gstatic.com/s/robotoslab/v7/
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v7/BngMUXZYTXPIvIBgJJSb6ufN5qWr4xCC.woff2
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
11f18af740f9727666190b83a8999d30ade3421e0148bf1b1586eaaad25dd781
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Origin
https://www.bgr.in
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 03 Jun 2019 07:43:26 GMT
x-content-type-options
nosniff
last-modified
Wed, 11 Oct 2017 18:31:41 GMT
server
sffe
age
6162300
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
10988
x-xss-protection
0
expires
Tue, 02 Jun 2020 07:43:26 GMT
json
trc.taboola.com/zeemedia-bgr/trc/3/
31 KB
11 KB
Script
General
Full URL
https://trc.taboola.com/zeemedia-bgr/trc/3/json?tim=17%3A28%3A26.023&data=%7B%22id%22%3A665%2C%22ii%22%3A%22%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%22%2C%22it%22%3A%22text%22%2C%22sd%22%3Anull%2C%22ui%22%3Anull%2C%22uifp%22%3Anull%2C%22vi%22%3A1565710105994%2C%22cv%22%3A%22370-46-RELEASE%22%2C%22uiv%22%3A%22default%22%2C%22u%22%3A%22https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F%22%2C%22bv%22%3A%220%22%2C%22ul%22%3A%5B%22en-US%22%5D%2C%22cmps%22%3A3%2C%22btv%22%3A%220%22%2C%22cos%22%3A%224g%22%2C%22bad%22%3A-1%2C%22sw%22%3A1600%2C%22sh%22%3A1200%2C%22bw%22%3A1600%2C%22r%22%3A%5B%7B%22li%22%3A%22rbox-t2m%22%2C%22s%22%3A1%2C%22uim%22%3A%22thumbs-feed-01%3Aabp%3D0%22%2C%22uip%22%3A%22Below%20Article%20Thumbnails%22%2C%22orig_uip%22%3A%22Below%20Article%20Thumbnails%22%2C%22cd%22%3A3593.625%2C%22mw%22%3A650%7D%2C%7B%22li%22%3A%22rbox-t2m%22%2C%22s%22%3A10%2C%22uim%22%3A%22alternating-thumbnails-rr%3Aabp%3D0%22%2C%22uip%22%3A%22Right%20Rail%20Hybrid%20Thumbnails%22%2C%22orig_uip%22%3A%22Right%20Rail%20Hybrid%20Thumbnails%22%2C%22cd%22%3A4367.140625%2C%22mw%22%3A330%7D%5D%2C%22cb%22%3A%22TRC.callbacks.recommendations_1%22%2C%22lt%22%3A%22deflated%22%7D
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
248c20c5877a3a3f30bc227f03a1b61dcceb8522a866655918ab616933ccf360

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:26 GMT
content-encoding
gzip
server
nginx
x-timer
S1565710106.039072,VS0,VE608
status
200
x-served-by
cache-hhn4083-HHN
vary
Accept-Encoding
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
*
access-control-allow-credentials
true
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
via
1.1 varnish
x-cache-hits
0
pmk-201901003.2.js
widget.perfectmarket.com/zeemedia-bgr/
116 KB
32 KB
Script
General
Full URL
https://widget.perfectmarket.com/zeemedia-bgr/pmk-201901003.2.js
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/zeemedia-bgr/load.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.13.181 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e8c157c3989bdb8fd3ff955d1da9f7870426ca7d0bd21cf064461b1758089c0f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
dtlIm8Jxk8tAmuSxyR41am6ihTTij9g7
content-encoding
gzip
etag
"5c382712f7ea619222c286baff8b4e57"
age
1416012
x-cache
HIT, HIT
status
200
content-length
32077
x-amz-id-2
rStDn902Cj+qCsgtRj92dJ+e7RvCdYeGEdH4zPKsOmwPFsIbByT1ODunhXUJOKuHqMRXE4R5WNg=
x-served-by
cache-lax8621-LAX, cache-fra19131-FRA
last-modified
Mon, 01 Jul 2019 11:16:22 GMT
server
AmazonS3
x-timer
S1565710106.116140,VS0,VE0
date
Tue, 13 Aug 2019 15:28:26 GMT
vary
Accept-Encoding,,
x-amz-request-id
FE543BE14F9FB454
via
1.1 varnish, 1.1 varnish
cache-control
max-age=31536000
accept-ranges
bytes
content-type
text/javascript
x-cache-hits
1, 2
tb
15.taboola.com/
21 KB
21 KB
Script
General
Full URL
https://15.taboola.com/tb?oid=15&pubnm=zeemedia-bgr&unitType=226&tbloc=&pageType=text&pstn=Right%20Rail%20Hybrid%20Thumbnails&uuip=&cisrf=&cirf=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&encoded=1&uid=7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a&variant=-100|123650123&callback=TRC.videoTagCallbacks.videoCallback1&cb=1565710106692&tagid=&cntry=GB&platform=1&sesid=3fd8db310dd790ee200f3db15ec89a55&itemid=/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message&viewid=1565710105994&geolat=&geoing=&deviceifa=&appid=&sd=v2_3fd8db310dd790ee200f3db15ec89a55_7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a_1565710106_1565710106_CNawjgYQjuNHGIr74NzILSABKAEwTTin8g1A8I0QSJSLGlC8tTJYAGAA&ri=187fd0943eecfe7ac154f77ff578c4b2&appname=&cdb=&gdprApplies=&rid=&sii=3056240166484561157
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
3b7f9632ec0a9dfe70738c5d87b45046f1aa1efdaf008d407abe1eb27e11b462

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:27 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1565710108.798635,VS0,VE24
machineid
1449
x-cache
MISS
content-type
text/html;charset=ISO-8859-1
status
200
expires
Sat, 26 Jul 1997 05:00:00 GMT
cache-control
no-cache,must-revalidate,no-store,max-age=0,s-maxage=0
x-cache-hits
0
accept-ranges
bytes
x-served-by
cache-hhn4032-HHN
userx.370-46-RELEASE.es6.js
cdn.taboola.com/libtrc/
22 KB
8 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/userx.370-46-RELEASE.es6.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/zeemedia-bgr/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
42195e72fe7f3f2fd529a2823888d3d3b9f883bf4f699be5a3ce4c6a899b449d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
g4WmEgZm5igl_I5qZAXz4rCjc0vsXLir
content-encoding
gzip
etag
"9a276bdd7a2cd7ccb6fc9951206537ef"
age
98
x-cache
HIT
status
200
x-amz-replication-status
PENDING
content-length
7623
x-amz-id-2
nMnH4y7FfybzOULAcfGmDeFKyVESa+kV02X6ahHo7qLA/y1HuX6dArifYvwdoauiLWzD4ahHKlk=
x-served-by
cache-hhn4083-HHN
last-modified
Mon, 12 Aug 2019 12:13:08 GMT
server
AmazonS3
x-timer
S1565710107.708549,VS0,VE0
date
Tue, 13 Aug 2019 15:28:26 GMT
vary
Accept-Encoding
x-amz-request-id
B13F42F8A11206D3
via
1.1 varnish
cache-control
private,max-age=14400
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
72
x-cache-hits
204
tb
15.taboola.com/
26 KB
26 KB
Script
General
Full URL
https://15.taboola.com/tb?oid=15&pubnm=zeemedia-bgr&unitType=244&tbloc=&pageType=text&pstn=Below%20Article%20Thumbnails&uuip=Feed%20-%20Below%20Article%20Thumbnails&cisrf=&cirf=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&encoded=1&uid=7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a&variant=-100|123650123&callback=TRC.videoTagCallbacks.videoCallback2&cb=1565710106693&tagid=&cntry=GB&platform=1&sesid=3fd8db310dd790ee200f3db15ec89a55&itemid=/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message&viewid=1565710105994&geolat=&geoing=&deviceifa=&appid=&sd=v2_3fd8db310dd790ee200f3db15ec89a55_7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a_1565710106_1565710106_CNawjgYQjuNHGIr74NzILSABKAEwTTin8g1A8I0QSJSLGlC8tTJYAGAA&ri=187fd0943eecfe7ac154f77ff578c4b2&appname=&cdb=&gdprApplies=&rid=&sii=3056240166484561157
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
018fb0f205eb13d6d83b7d4eb3603345dddf57cde7d74ab166f7e348f1226956

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:27 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1565710108.798636,VS0,VE24
machineid
1447
x-cache
MISS
content-type
text/html;charset=ISO-8859-1
status
200
expires
Sat, 26 Jul 1997 05:00:00 GMT
cache-control
no-cache,must-revalidate,no-store,max-age=0,s-maxage=0
x-cache-hits
0
accept-ranges
bytes
x-served-by
cache-hhn4032-HHN
feed-card-placeholder.370-46-RELEASE.es6.js
cdn.taboola.com/libtrc/
5 KB
1 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/feed-card-placeholder.370-46-RELEASE.es6.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/zeemedia-bgr/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a7cd29bd9def4a654001555b4bf82e6a86dc25304e596a34ada3d6e47687f54f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
ohHBmCfNwUAGy.RyK1H2xAoJBkWT4_HL
content-encoding
gzip
etag
"6ba2866ee0b8842281b6c1b270317927"
age
108
x-cache
HIT
status
200
x-amz-replication-status
PENDING
content-length
1287
x-amz-id-2
glANaW1+ooP7mFoRw1y8WBEWGkAt36ClDC1PxiUBUMCR6MOQbrZOILWtI2FepALmu6J60Wy9qE8=
x-served-by
cache-hhn4083-HHN
last-modified
Mon, 12 Aug 2019 12:13:02 GMT
server
AmazonS3
x-timer
S1565710107.710319,VS0,VE0
date
Tue, 13 Aug 2019 15:28:26 GMT
vary
Accept-Encoding
x-amz-request-id
A5B43C92122C9EA5
via
1.1 varnish
cache-control
private,max-age=14400
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
72
x-cache-hits
391
f89e1763-220d-4e09-ba69-9e040548fb7a.svg
cdn.taboola.com/static/f8/
4 KB
2 KB
Image
General
Full URL
https://cdn.taboola.com/static/f8/f89e1763-220d-4e09-ba69-9e040548fb7a.svg
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
39b076e4bb4fab9b8a142499cf6155f8c128464974691a04de7e764f71b72618

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
cMrDKn.emLmm9kiiOOF64ulDT4DRy6LK
content-encoding
gzip
etag
"b8b410e4b18d45aa2f3d9bc09cd335fb"
age
35
via
1.1 varnish
x-cache
HIT
status
200
x-amz-replication-status
COMPLETED
content-length
1758
x-amz-id-2
BJjvIW2YJ7usoISd69SZPX/6NTPTN5noFXlNaXdIJQu2pelq78Hs6M+JZpk4HG5GauXRsDVaLmk=
x-served-by
cache-hhn4083-HHN
last-modified
Wed, 07 Feb 2018 11:15:52 GMT
server
AmazonS3
x-timer
S1565710107.712689,VS0,VE0
date
Tue, 13 Aug 2019 15:28:26 GMT
vary
Accept-Encoding
access-control-allow-methods
GET
x-amz-request-id
420723098F930AB9
access-control-allow-origin
*
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
image/svg+xml
access-control-allow-headers
*
abp
72
x-cache-hits
76
bgrlogo.png
cdn.taboola.com/static/impl/png/
22 KB
23 KB
Image
General
Full URL
http://cdn.taboola.com/static/impl/png/bgrlogo.png
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
HTTP/1.1
Security
, ,
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a57fb7684d28a3f4fb8bd8859620b8bf03d4c4cf9e90fd6e7108c5b32e9ec72c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
9JOBSBgMUR3WM8Jcgb7QFvccy6oYx.pY
Via
1.1 varnish
ETag
"d79e5491f05c2c0198f95abc472d68f6"
Age
23409
X-Cache
HIT
x-amz-replication-status
COMPLETED
Connection
keep-alive
Content-Length
22570
x-amz-id-2
0mKfLtCb9daG4oi7bdhnJ0iB1w8NcChv5sYRQP/SSikVITOE28JFTVWU3gm2pCLorRLBbIVERDw=
X-Served-By
cache-hhn4044-HHN
Last-Modified
Thu, 27 Jun 2019 12:01:56 GMT
Server
AmazonS3
X-Timer
S1565710110.803382,VS0,VE0
Date
Tue, 13 Aug 2019 15:28:29 GMT
x-amz-request-id
2BC09E978E470F28
Cache-Control
private,max-age=31536000
Accept-Ranges
bytes
Content-Type
image/png
abp
72
X-Cache-Hits
1
rtb-h
trc.taboola.com/sg/mediaforcebidder-network/1/ Frame C533
Redirect Chain
  • https://rtb.mfadsrvr.com/sync?ssp=taboola
  • https://rtb.mfadsrvr.com/ul_cb/sync?ssp=taboola
  • https://trc.taboola.com/sg/mediaforcebidder-network/1/rtb-h?taboola_hm=a6b94e8c-f9b0-4b5a-beaf-de356d947a94
0
224 B
Image
General
Full URL
https://trc.taboola.com/sg/mediaforcebidder-network/1/rtb-h?taboola_hm=a6b94e8c-f9b0-4b5a-beaf-de356d947a94
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:34 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710114.033466,VS0,VE22
x-cache
MISS
status
204
x-cache-hits
0
accept-ranges
bytes
x-served-by
cache-hhn4083-HHN

Redirect headers

Location
//trc.taboola.com/sg/mediaforcebidder-network/1/rtb-h?taboola_hm=a6b94e8c-f9b0-4b5a-beaf-de356d947a94
Date
Tue, 13 Aug 2019 15:28:33 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
0
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
/
trc.taboola.com/sg/powerlinksdsp-network/1/rtb-h/ Frame C533
Redirect Chain
  • https://px.powerlinks.com/user/identify?sourceId=d4a7a706-ab0f-11e8-a038-127202fb7690&rurl=https%3A%2F%2Ftrc.taboola.com%2Fsg%2Fpowerlinksdsp-network%2F1%2Frtb-h%2F%3Ftaboola_hm%3D%24%7BUSER%7D
  • https://sync.mathtag.com/sync/img?mt_exid=113&redir=%2F%2Fpx.powerlinks.com%2Fuser%2Fsync%2Fdsps%3FuserId%3D%5BMM_UUID%5D%26sourceId%3Daa4e7548-789b-4df8-a72f-d951a5b206eb%26sync%3D0%26rurl%3Dhttps...
  • https://sync.mathtag.com/sync/img?mt_exid=113&redir=%2F%2Fpx.powerlinks.com%2Fuser%2Fsync%2Fdsps%3FuserId%3D%5BMM_UUID%5D%26sourceId%3Daa4e7548-789b-4df8-a72f-d951a5b206eb%26sync%3D0%26rurl%3Dhttps...
  • https://px.powerlinks.com/user/sync/dsps?userId=fa145d52-d623-4000-bb3c-f4d071c237e2&sourceId=aa4e7548-789b-4df8-a72f-d951a5b206eb&sync=0&rurl=https%3A%2F%2Ftrc.taboola.com%2Fsg%2Fpowerlinksdsp-net...
  • https://trc.taboola.com/sg/powerlinksdsp-network/1/rtb-h/?taboola_hm=ssr8DKTpS9l4d-Zvw8BHxuMNFenzu4micfwgEP2LL5s%3D
45 B
110 B
Image
General
Full URL
https://trc.taboola.com/sg/powerlinksdsp-network/1/rtb-h/?taboola_hm=ssr8DKTpS9l4d-Zvw8BHxuMNFenzu4micfwgEP2LL5s%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
dc111a70984a9eda00752b06277113029ef288f1125c31eff2477413e15e8aa4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:34 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710114.483573,VS0,VE20
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
x-served-by
cache-hhn4083-HHN

Redirect headers

Location
https://trc.taboola.com/sg/powerlinksdsp-network/1/rtb-h/?taboola_hm=ssr8DKTpS9l4d-Zvw8BHxuMNFenzu4micfwgEP2LL5s%3D
Date
Tue, 13 Aug 2019 15:28:34 GMT
Server
nginx
Connection
close
Etag
"ssr8DKTpS9l4d-Zvw8BHxuMNFenzu4micfwgEP2LL5s="
Content-Length
0
getuidnb
ib.adnxs.com/ Frame C533
43 B
692 B
Image
General
Full URL
https://ib.adnxs.com/getuidnb?https://trc.taboola.com/sg/appnexus-network/1/rtb-h/?taboola_hm=$UID
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.208 , Netherlands, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
311.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
4b5b6b15c6255109e06720cce42a06d3aead8b7874423d9c52cb0303212c25ef
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 13 Aug 2019 15:28:35 GMT
X-Proxy-Origin
185.169.255.48; 185.169.255.48; 311.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.68:80
AN-X-Request-Uuid
c715a201-6025-44ac-839f-9b8cc288974e
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
rtb-h
match.taboola.com/sg/google-network/1/ Frame C533
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=taboola_dbm&google_cm&google_sc
  • https://cm.g.doubleclick.net/pixel?google_nid=taboola_dbm&google_cm=&google_sc=&google_tc=
  • https://trc.taboola.com/sg/google-network/1/rtb-h/?taboola_hm=CAESEOGBs1f0NuoZFUvlNDbHQ1Q&google_cver=1
  • https://match.taboola.com/sg/google-network/1/rtb-h?taboola_hm=CAESEOGBs1f0NuoZFUvlNDbHQ1Q&tbid=7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a&query=taboola_hm%3DCAESEOGBs1f0NuoZFUvlNDbHQ1Q%26goo...
0
154 B
Image
General
Full URL
https://match.taboola.com/sg/google-network/1/rtb-h?taboola_hm=CAESEOGBs1f0NuoZFUvlNDbHQ1Q&tbid=7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a&query=taboola_hm%3DCAESEOGBs1f0NuoZFUvlNDbHQ1Q%26google_cver%3D1
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:26 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1565710107.969258,VS0,VE20
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-fra19121-FRA

Redirect headers

date
Tue, 13 Aug 2019 15:28:26 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710107.831432,VS0,VE20
x-served-by
cache-hhn4083-HHN
status
302
x-cache
MISS
location
https://match.taboola.com/sg/google-network/1/rtb-h?taboola_hm=CAESEOGBs1f0NuoZFUvlNDbHQ1Q&tbid=7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a&query=taboola_hm%3DCAESEOGBs1f0NuoZFUvlNDbHQ1Q%26google_cver%3D1
accept-ranges
bytes
content-length
0
x-cache-hits
0
getuidnb
ib.adnxs.com/ Frame C533
43 B
693 B
Image
General
Full URL
https://ib.adnxs.com/getuidnb?https://trc.taboola.com/sg/nca-appnexus-network/1/rtb-h/?taboola_hm=$UID
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.208 , Netherlands, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
311.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
4b5b6b15c6255109e06720cce42a06d3aead8b7874423d9c52cb0303212c25ef
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 13 Aug 2019 15:28:35 GMT
X-Proxy-Origin
185.169.255.48; 185.169.255.48; 311.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.222.241:80
AN-X-Request-Uuid
932b6be0-dedf-4ba9-affd-2dd09944bd68
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
rtb-h
match.taboola.com/sg/thetradedesk-network/1/ Frame C533
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=054f32o&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=054f32o&ttd_tpi=1
  • https://trc.taboola.com/sg/thetradedesk-network/1/rtb-h/?taboola_hm=083ffabc-8bc3-4b40-ba47-50e5fc903389
  • https://match.taboola.com/sg/thetradedesk-network/1/rtb-h?taboola_hm=083ffabc-8bc3-4b40-ba47-50e5fc903389&tbid=16a8e4c8-27eb-4aa8-b523-f31409cfbf9d-tuct44c5c9d&query=taboola_hm%3D083ffabc-8bc3-4b40...
0
77 B
Image
General
Full URL
https://match.taboola.com/sg/thetradedesk-network/1/rtb-h?taboola_hm=083ffabc-8bc3-4b40-ba47-50e5fc903389&tbid=16a8e4c8-27eb-4aa8-b523-f31409cfbf9d-tuct44c5c9d&query=taboola_hm%3D083ffabc-8bc3-4b40-ba47-50e5fc903389
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:31 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1565710111.284344,VS0,VE15
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-fra19121-FRA

Redirect headers

date
Tue, 13 Aug 2019 15:28:31 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710111.224355,VS0,VE20
x-served-by
cache-hhn4083-HHN
status
302
x-cache
MISS
location
https://match.taboola.com/sg/thetradedesk-network/1/rtb-h?taboola_hm=083ffabc-8bc3-4b40-ba47-50e5fc903389&tbid=16a8e4c8-27eb-4aa8-b523-f31409cfbf9d-tuct44c5c9d&query=taboola_hm%3D083ffabc-8bc3-4b40-ba47-50e5fc903389
accept-ranges
bytes
content-length
0
x-cache-hits
0
rtb-h
match.taboola.com/sg/storygize-network/1/ Frame C533
Redirect Chain
  • https://www.storygize.net/ccm/4b560cdd-91f9-422b-adb7-e9dff26bc3ad?u=7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a
  • https://trc.taboola.com/sg/storygize-network/1/rtb-h?taboola_hm=906b0437-6b48-45f7-ba0b-9a2c738ce659
  • https://match.taboola.com/sg/storygize-network/1/rtb-h?taboola_hm=906b0437-6b48-45f7-ba0b-9a2c738ce659&tbid=ac629852-fdae-4568-b105-6a03b70cfa20-tuct44c5ca2&query=taboola_hm%3D906b0437-6b48-45f7-ba...
0
76 B
Image
General
Full URL
https://match.taboola.com/sg/storygize-network/1/rtb-h?taboola_hm=906b0437-6b48-45f7-ba0b-9a2c738ce659&tbid=ac629852-fdae-4568-b105-6a03b70cfa20-tuct44c5ca2&query=taboola_hm%3D906b0437-6b48-45f7-ba0b-9a2c738ce659
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:35 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1565710115.077820,VS0,VE20
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-fra19121-FRA

Redirect headers

date
Tue, 13 Aug 2019 15:28:35 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710115.012387,VS0,VE21
x-served-by
cache-hhn4083-HHN
status
302
x-cache
MISS
location
https://match.taboola.com/sg/storygize-network/1/rtb-h?taboola_hm=906b0437-6b48-45f7-ba0b-9a2c738ce659&tbid=ac629852-fdae-4568-b105-6a03b70cfa20-tuct44c5ca2&query=taboola_hm%3D906b0437-6b48-45f7-ba0b-9a2c738ce659
accept-ranges
bytes
content-length
0
x-cache-hits
0
cookiesync
bttrack.com/pixel/ Frame C533
35 B
380 B
Image
General
Full URL
https://bttrack.com/pixel/cookiesync?source=14b8c562-d12b-418b-b680-ad517d5839ec
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
192.132.33.46 , United States, ASN18568 (BIDTELLECT - Bidtellect Inc., US),
Reverse DNS
46.bidtellect.com
Software
Microsoft-IIS/8.5 /
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

X-ServerName
Track002-dc3
Pragma
no-cache
Date
Tue, 13 Aug 2019 15:28:28 GMT
X-AspNetMvc-Version
5.2
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
P3P
CP="CAO DSP COR ADMo DEVo PSAo PSDo HISo IVAo IVDo OUR IND OTC"
Cache-Control
private,no-cache
Content-Type
image/gif
Content-Length
35
Expires
-1
rtb-h
match.taboola.com/sg/bidswitch-network/1/ Frame C533
Redirect Chain
  • https://x.bidswitch.net/sync?ssp=taboola
  • https://x.bidswitch.net/ul_cb/sync?ssp=taboola
  • https://ads.programattik.com/sync?ssp=bidswitch&bidswitch_ssp_id=taboola
  • https://ads.programattik.com/ul_cb/sync?ssp=bidswitch&bidswitch_ssp_id=taboola
  • https://x.bidswitch.net/sync?dsp_id=156&expires=14&user_id=a5e87a02-93c5-4d96-b799-a44a3f60e930&ssp=taboola
  • https://trc.taboola.com/sg/bidswitch-network/1/rtb-h/?taboola_hm=7f198caf-3fad-49c9-aa9a-6c8c98370f8b
  • https://match.taboola.com/sg/bidswitch-network/1/rtb-h?taboola_hm=7f198caf-3fad-49c9-aa9a-6c8c98370f8b&tbid=16a8e4c8-27eb-4aa8-b523-f31409cfbf9d-tuct44c5c9d&query=taboola_hm%3D7f198caf-3fad-49c9-aa...
0
77 B
Image
General
Full URL
https://match.taboola.com/sg/bidswitch-network/1/rtb-h?taboola_hm=7f198caf-3fad-49c9-aa9a-6c8c98370f8b&tbid=16a8e4c8-27eb-4aa8-b523-f31409cfbf9d-tuct44c5c9d&query=taboola_hm%3D7f198caf-3fad-49c9-aa9a-6c8c98370f8b
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1565710110.726567,VS0,VE20
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-fra19121-FRA

Redirect headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710110.664511,VS0,VE22
x-served-by
cache-hhn4083-HHN
status
302
x-cache
MISS
location
https://match.taboola.com/sg/bidswitch-network/1/rtb-h?taboola_hm=7f198caf-3fad-49c9-aa9a-6c8c98370f8b&tbid=16a8e4c8-27eb-4aa8-b523-f31409cfbf9d-tuct44c5c9d&query=taboola_hm%3D7f198caf-3fad-49c9-aa9a-6c8c98370f8b
accept-ranges
bytes
content-length
0
x-cache-hits
0
social
trc.taboola.com/zeemedia-bgr/log/3/
0
250 B
Image
General
Full URL
https://trc.taboola.com/zeemedia-bgr/log/3/social?route=AM:AM:v&ri=187fd0943eecfe7ac154f77ff578c4b2&sd=v2_3fd8db310dd790ee200f3db15ec89a55_7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a_1565710106_1565710106_CNawjgYQjuNHGIr74NzILSABKAEwTTin8g1A8I0QSJSLGlC8tTJYAGAA&ui=7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a&pi=/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message&wi=3056240166484561157&pt=text&vi=1565710105994&st=social-available&d=%7B%22data%22%3A%5B%7B%22i%22%3A%22ctx%22%2C%22ism%22%3Afalse%2C%22srx%22%3A1600%2C%22sry%22%3A1200%2C%22pd%22%3Anull%2C%22tpl%22%3A%22%22%2C%22url%22%3A%22https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F%22%2C%22rref%22%3A%22%22%2C%22sref%22%3A%22_sessionPending_%22%2C%22hdl%22%3A%22Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone%20with%20a%20single%20text%20message%22%2C%22sec%22%3A%22News%22%2C%22aut%22%3A%5B%22Staff%22%5D%2C%22img%22%3A%22https%3A%2F%2Fst1.bgr.in%2Fwp-content%2Fuploads%2F2017%2F06%2Fapple-ios-apps-stock-image.jpg%22%2C%22v%22%3A15%2C%22ui%22%3A%22%22%2C%22ut%22%3A%22%22%2C%22pw%22%3A%22%22%7D%5D%7D&tim=17%3A28%3A26.727&id=2841&llvl=1&cv=370-46-RELEASE&
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710109.310114,VS0,VE20
x-served-by
cache-hhn4083-HHN
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
*
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
available
trc.taboola.com/zeemedia-bgr/log/3/
0
251 B
XHR
General
Full URL
https://trc.taboola.com/zeemedia-bgr/log/3/available?route=AM%3AAM%3Av
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:26 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710107.748699,VS0,VE20
x-served-by
cache-hhn4083-HHN
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
https://www.bgr.in
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
1f43958ca045807b3098c786c4b63803.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
12 KB
12 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/1f43958ca045807b3098c786c4b63803.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
c2eca4441978c90b46b089d2613a36dc8de48edb07a066edf2aa59c630b8bd20

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
3000603
edge-cache-tag
387998399422382680679137878655400461055,386049105073207345796117033061845157211,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Thu, 11 Jul 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/1f43958ca045807b3098c786c4b63803.jpg
content-length
12154
x-served-by
cache-fra19146-FRA, cache-fra19154-FRA
last-modified
Mon, 10 Jun 2019 08:15:11 GMT
server
cloudinary
x-timer
S1565710110.699754,VS0,VE1
etag
"f540117ed54528318196fe0dc876dd6c"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 1
6d404c84957d28525d71cfd48535f593.
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//storage.googleapis.com/caw-uploads/
15 KB
16 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//storage.googleapis.com/caw-uploads/6d404c84957d28525d71cfd48535f593.
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
46c9d9f3deebb456a9a56786fe24bc40c7ef2c15290bf28d46e96d7f554a0ade

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
622124
edge-cache-tag
629971159070989343146092341165894614702,386049105073207345796117033061845157211,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Wed, 04 Sep 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//storage.googleapis.com/caw-uploads/6d404c84957d28525d71cfd48535f593.
content-length
15578
x-served-by
cache-fra19122-FRA, cache-fra19154-FRA
last-modified
Sun, 04 Aug 2019 15:09:39 GMT
server
cloudinary
x-timer
S1565710110.775496,VS0,VE1
etag
"2d98bad56c20a0461fb2e19367996094"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
201906271700079201_birthcert.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//assets.1010010010.com/ad_images/img/
55 KB
55 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//assets.1010010010.com/ad_images/img/201906271700079201_birthcert.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
7de84d9a939cb81b0909b76af96a3862562811252a3c6082ce1b28bf58aae2ae

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
2383172
edge-cache-tag
516714403944199811404806462690498596545,386049105073207345796117033061845157211,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Mon, 29 Jul 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//assets.1010010010.com/ad_images/img/201906271700079201_birthcert.jpg
content-length
56158
x-served-by
cache-fra19170-FRA, cache-fra19154-FRA
last-modified
Fri, 28 Jun 2019 20:18:04 GMT
server
cloudinary
x-timer
S1565710110.775728,VS0,VE2
etag
"6fa498f04371f5bb2c0806b7ada4e289"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
WhatsApp-1.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/08/
32 KB
33 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/08/WhatsApp-1.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
d13340efb3013e39ba434a28e6e55640b50df1632d5916b1b22b7d4be5feba99

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
30269
edge-cache-tag
458865202872941148628407606977899553398,386049105073207345796117033061845157211,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Fri, 13 Sep 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/08/WhatsApp-1.jpg
content-length
33237
x-served-by
cache-fra19124-FRA, cache-fra19154-FRA
last-modified
Tue, 13 Aug 2019 04:58:29 GMT
server
cloudinary
x-timer
S1565710110.775726,VS0,VE2
etag
"7ade5d6db01d81cb653d02df45ef1169"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
Game-for-peace.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/05/
20 KB
21 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/05/Game-for-peace.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
d5b01bb2b78f3d0093a8d12c43dddc7ac3d9c13e0d1c7db477a9dbdce47702a5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
99200
edge-cache-tag
350028678107433973801997023293678827952,386049105073207345796117033061845157211,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sat, 24 Aug 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/05/Game-for-peace.jpg
content-length
20910
x-served-by
cache-fra19182-FRA, cache-fra19154-FRA
last-modified
Wed, 24 Jul 2019 16:57:20 GMT
server
cloudinary
x-timer
S1565710110.775710,VS0,VE2
etag
"31cb4a237abf304bffccf2a07ad8d01a"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
tcl-android-9-smart-tv.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/07/
17 KB
18 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/07/tcl-android-9-smart-tv.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
acc88a63237ff36dbb5217dfd90f4ee103a9db00f295d869dd083652d31c8ed0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
612311
edge-cache-tag
505485841140407596504268709770342375966,386049105073207345796117033061845157211,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Fri, 16 Aug 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/07/tcl-android-9-smart-tv.jpg
content-length
17894
x-served-by
cache-fra19147-FRA, cache-fra19154-FRA
last-modified
Tue, 16 Jul 2019 12:15:00 GMT
server
cloudinary
x-timer
S1565710110.775747,VS0,VE1
etag
"dfc19d22c59aa82c309595fbd6aa4ea8"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
Vivo-S1-launch-amazon-india.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/08/
21 KB
21 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/08/Vivo-S1-launch-amazon-india.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
41269dd592040d510dd539664e45446d739b800f02ba3a96e4e82a2ef82a7582

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
528370
edge-cache-tag
606078201176612925074775944741807346337,386049105073207345796117033061845157211,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sat, 07 Sep 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/08/Vivo-S1-launch-amazon-india.jpg
content-length
21186
x-served-by
cache-fra19134-FRA, cache-fra19154-FRA
last-modified
Wed, 07 Aug 2019 03:37:45 GMT
server
cloudinary
x-timer
S1565710110.775686,VS0,VE1
etag
"bf6b5854ebd3f0b9bfe86d4910f72e32"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 1
Motorola-One-Action.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/08/
16 KB
17 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/08/Motorola-One-Action.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
aee2dbbe688d775dbddcb471a17cc4f978bc11fc8d404d4c8a031b1a28b3e58f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
254987
edge-cache-tag
364414989363643636217845021533456483082,386049105073207345796117033061845157211,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sat, 07 Sep 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/08/Motorola-One-Action.jpg
content-length
16812
x-served-by
cache-fra19183-FRA, cache-fra19154-FRA
last-modified
Wed, 07 Aug 2019 14:11:33 GMT
server
cloudinary
x-timer
S1565710110.775724,VS0,VE0
etag
"2441e34ef3758479ce89c2e6d8da700b"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
Huawei-Y9-Prime-2019.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/05/
16 KB
17 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/05/Huawei-Y9-Prime-2019.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
0fd49e5f77b6fed75e9bff730c13dbded94d448b72733be1230ab8326928332b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
1047434
edge-cache-tag
338382137855682842866484368738986569565,386049105073207345796117033061845157211,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Mon, 19 Aug 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/05/Huawei-Y9-Prime-2019.jpg
content-length
16445
x-served-by
cache-fra19157-FRA, cache-fra19154-FRA
last-modified
Fri, 19 Jul 2019 13:32:19 GMT
server
cloudinary
x-timer
S1565710110.775751,VS0,VE0
etag
"4e949c4954c6af70b8b3395db2537405"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
realme-5-launch-teaser.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/08/
16 KB
17 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/08/realme-5-launch-teaser.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
5bc7946dc4368c32c2422e5bd4574508243489dd27f12588dee5d88e5eff270c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
92263
edge-cache-tag
308409405689398421095572325599633437584,386049105073207345796117033061845157211,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Thu, 12 Sep 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_267%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/08/realme-5-launch-teaser.jpg
content-length
16660
x-served-by
cache-fra19165-FRA, cache-fra19154-FRA
last-modified
Mon, 12 Aug 2019 04:20:35 GMT
server
cloudinary
x-timer
S1565710110.775747,VS0,VE0
etag
"690a4d3eea4398b395c468b0f11b630e"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
available
trc.taboola.com/zeemedia-bgr/log/3/
0
55 B
XHR
General
Full URL
https://trc.taboola.com/zeemedia-bgr/log/3/available?route=AM%3AAM%3Av
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:26 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710107.753673,VS0,VE20
x-served-by
cache-hhn4083-HHN
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
https://www.bgr.in
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
available
trc.taboola.com/zeemedia-bgr/log/3/
0
117 B
XHR
General
Full URL
https://trc.taboola.com/zeemedia-bgr/log/3/available?route=AM%3AAM%3Av
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:26 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710107.786071,VS0,VE20
x-served-by
cache-hhn4083-HHN
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
https://www.bgr.in
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
available
trc.taboola.com/zeemedia-bgr/log/3/
0
55 B
XHR
General
Full URL
https://trc.taboola.com/zeemedia-bgr/log/3/available?route=AM%3AAM%3Av
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:26 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710107.786285,VS0,VE27
x-served-by
cache-hhn4083-HHN
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
https://www.bgr.in
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
before-and-after-photos-1-taboola.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_390%2Cw_780%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//s3.amazonaws.com/boredom-therapy-image-bucket/img2/
31 KB
31 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_390%2Cw_780%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//s3.amazonaws.com/boredom-therapy-image-bucket/img2/before-and-after-photos-1-taboola.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
e58485cf9afef33844d21f2a1ea4b81ad9a6782221c01d1da8436b68f418afdb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
2859639
edge-cache-tag
381034242475585623403948544998000885563,356737923103245843458775926512817796149,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sun, 14 Jul 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_390%2Cw_780%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//s3.amazonaws.com/boredom-therapy-image-bucket/img2/before-and-after-photos-1-taboola.jpg
content-length
31614
x-served-by
cache-fra19182-FRA, cache-fra19154-FRA
last-modified
Thu, 13 Jun 2019 02:40:08 GMT
server
cloudinary
x-timer
S1565710110.808772,VS0,VE1
etag
"7203fa9381184c2a2a83219e5d64bf8d"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 1
available
trc.taboola.com/zeemedia-bgr/log/3/
0
55 B
XHR
General
Full URL
https://trc.taboola.com/zeemedia-bgr/log/3/available?route=AM%3AAM%3Av
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:26 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710107.786272,VS0,VE21
x-served-by
cache-hhn4083-HHN
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
https://www.bgr.in
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
792bbdedb116343880b67a7338699ec3.
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_390%2Cw_780%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//storage.googleapis.com/caw-uploads/
32 KB
33 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_390%2Cw_780%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//storage.googleapis.com/caw-uploads/792bbdedb116343880b67a7338699ec3.
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
89e6fbac6190c680199d1d32ccb863d446cf39c26dcd8e7028fb6627a1fd67e9

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
56877
edge-cache-tag
623255903804373804737430383836995131629,356737923103245843458775926512817796149,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Fri, 23 Aug 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_390%2Cw_780%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//storage.googleapis.com/caw-uploads/792bbdedb116343880b67a7338699ec3.
content-length
33225
x-served-by
cache-fra19134-FRA, cache-fra19154-FRA
last-modified
Tue, 23 Jul 2019 21:49:50 GMT
server
cloudinary
x-timer
S1565710110.808760,VS0,VE2
etag
"d913ad8ce454b336b6556889ad9db810"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
8e1d9b7c546278946c8221ae4f3cf7a13165601545041415.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//cdn.amomama.com/
32 KB
33 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//cdn.amomama.com/8e1d9b7c546278946c8221ae4f3cf7a13165601545041415.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
130284b51a23e4a700aa6e63c5f5f13c80213315a4a2314afcf63a03691fbc69

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
1803342
edge-cache-tag
536370819611367874997869610987047261955,507842782944220752304688722208192589828,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Thu, 25 Jul 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//cdn.amomama.com/8e1d9b7c546278946c8221ae4f3cf7a13165601545041415.jpg
content-length
33197
x-served-by
cache-fra19167-FRA, cache-fra19154-FRA
last-modified
Mon, 24 Jun 2019 20:13:12 GMT
server
cloudinary
x-timer
S1565710110.808756,VS0,VE1
etag
"4d1df7e0eebc65ec3ab4cb6633c977af"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
77487c060128634a5b804728404e1407.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
20 KB
21 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/77487c060128634a5b804728404e1407.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
0ee2b37e0b5266504878ba4ee753f81ad0438658f14dbd2603528810823240a8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish
age
2379666
x-cache
HIT
status
200
expiration
expiry-date="Sat, 27 Jul 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/77487c060128634a5b804728404e1407.jpg
content-length
20706
x-served-by
cache-fra19154-FRA
last-modified
Wed, 26 Jun 2019 01:58:19 GMT
server
cloudinary
x-timer
S1565710110.808740,VS0,VE0
etag
"6b18d0598b4f2c92badc967f0ee32b55"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
2
available
trc.taboola.com/zeemedia-bgr/log/3/
0
55 B
XHR
General
Full URL
https://trc.taboola.com/zeemedia-bgr/log/3/available?route=AM%3AAM%3Av
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:26 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710107.786381,VS0,VE20
x-served-by
cache-hhn4083-HHN
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
https://www.bgr.in
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
available
trc.taboola.com/zeemedia-bgr/log/3/
0
54 B
XHR
General
Full URL
https://trc.taboola.com/zeemedia-bgr/log/3/available?route=AM%3AAM%3Av
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:26 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710107.791002,VS0,VE20
x-served-by
cache-hhn4083-HHN
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
https://www.bgr.in
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
realme-x-review-bgr-1.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/07/
21 KB
21 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/07/realme-x-review-bgr-1.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
c114b9da5b9c248d8207b3931b28326756cc267eb6fb3996902fe3c42c44e733

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
36359
edge-cache-tag
510912685098435269220695986591557745942,507842782944220752304688722208192589828,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sat, 24 Aug 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/07/realme-x-review-bgr-1.jpg
content-length
21293
x-served-by
cache-fra19178-FRA, cache-fra19154-FRA
last-modified
Wed, 24 Jul 2019 07:26:41 GMT
server
cloudinary
x-timer
S1565710110.808952,VS0,VE0
etag
"0a6ff130e0954077549b7ff51930bd4a"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
JVC-HD-TV.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/07/
17 KB
17 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/07/JVC-HD-TV.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
235123dfbcfd931580933e224e03aa3e5c0cd2b976a7d2ba5170ad3b494e9a1c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
539031
edge-cache-tag
351399456184265834961057790767372977252,507842782944220752304688722208192589828,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Thu, 22 Aug 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bgr.in/wp-content/uploads/2019/07/JVC-HD-TV.jpg
content-length
17119
x-served-by
cache-fra19173-FRA, cache-fra19154-FRA
last-modified
Mon, 22 Jul 2019 12:31:43 GMT
server
cloudinary
x-timer
S1565710110.809438,VS0,VE0
etag
"9d82f0ca05775fa974d438d0a9c58fe4"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
d1e4cd9a69240258f94a9b6ab0f9e7a3.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_390%2Cw_780%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
42 KB
42 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_390%2Cw_780%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/d1e4cd9a69240258f94a9b6ab0f9e7a3.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
8d77613ee9daddff91ac6494fa13167fe55e557a8ccce0b0b6b6c041dd24beb7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
514128
edge-cache-tag
576269725321615378048244718132672615265,356737923103245843458775926512817796149,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sat, 07 Sep 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_390%2Cw_780%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/d1e4cd9a69240258f94a9b6ab0f9e7a3.jpg
content-length
42807
x-served-by
cache-fra19177-FRA, cache-fra19154-FRA
last-modified
Wed, 07 Aug 2019 16:02:32 GMT
server
cloudinary
x-timer
S1565710110.808929,VS0,VE1
etag
"80c5be036317568d1701917d8d488cc3"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
97181-vis.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//cdn.zeebiz.com/sites/default/files/2019/08/06/
35 KB
35 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//cdn.zeebiz.com/sites/default/files/2019/08/06/97181-vis.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
0325c281e600cb9e65e1b65aee6e3d66a5333d6f536664e291bf869816fbdbb2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
293128
edge-cache-tag
455973699747175351774177713016430991044,507842782944220752304688722208192589828,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Fri, 06 Sep 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//cdn.zeebiz.com/sites/default/files/2019/08/06/97181-vis.jpg
content-length
35845
x-served-by
cache-fra19168-FRA, cache-fra19154-FRA
last-modified
Tue, 06 Aug 2019 09:59:22 GMT
server
cloudinary
x-timer
S1565710110.808921,VS0,VE1
etag
"10d4900604119743d8b950e7dd97db1c"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
suhana-khan-movie-poster.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bollywoodlife.com/wp-content/uploads/2019/08/
11 KB
12 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bollywoodlife.com/wp-content/uploads/2019/08/suhana-khan-movie-poster.jpg
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
fc3209a0283793f22a25cfabb6c5f6401354b0ab275b7c1b349dfa7b9a72a883

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish, 1.1 varnish
age
443806
edge-cache-tag
338131000563995328856782995486900863518,507842782944220752304688722208192589828,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sat, 07 Sep 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_223%2Cw_400%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//st1.bollywoodlife.com/wp-content/uploads/2019/08/suhana-khan-movie-poster.jpg
content-length
11413
x-served-by
cache-fra19132-FRA, cache-fra19154-FRA
last-modified
Wed, 07 Aug 2019 14:24:51 GMT
server
cloudinary
x-timer
S1565710110.808910,VS0,VE1
etag
"8636f19fd955ec9531aab3db696a5175"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
f539211219b796ffbb49949997c764f0.png
cdn.taboola.com/libtrc/static/thumbnails/
254 B
620 B
Image
General
Full URL
https://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f68019eb4b4e5933301d4ee75969e0cb94ed8333bf514630fa749eb9c3e483c9

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
hL.cyLD7Q4TL5ceY.7JQwF9m5IYI8mkC
via
1.1 varnish
etag
"dfa7b52c86e56bd67fa4002f6ed19854"
age
41
x-cache
HIT
status
200
x-amz-replication-status
COMPLETED
content-length
254
x-amz-id-2
grODyaFUyHwi27S6u2hd746yPHwUf+y1im5Wn93DxT7wozhn8KMFUP712WAAG3eD1t2rnF4k3Bs=
x-served-by
cache-hhn4083-HHN
last-modified
Wed, 24 Jun 2015 07:14:11 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:0/gname:root/uname:root/gid:0/mode:33188/mtime:1377415166/atime:1435052450/md5:dfa7b52c86e56bd67fa4002f6ed19854/ctime:1422381567
x-timer
S1565710107.791042,VS0,VE0
date
Tue, 13 Aug 2019 15:28:26 GMT
x-amz-request-id
29D722C296265892
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
image/png
abp
72
x-cache-hits
59
creative_js.js
vidstat.taboola.com/vpaid/units/14_12_0/creatives/
4 KB
2 KB
Script
General
Full URL
https://vidstat.taboola.com/vpaid/units/14_12_0/creatives/creative_js.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.370-46-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
10eba73b3641332bde05fa8d6223e7017ac5207673602247c35f358ea89e3092

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 a436b6df4b0d1bd189edf722b5d2a523.cloudfront.net (CloudFront), 1.1 varnish
age
2367131
x-amz-meta-mtime
1499351521
x-cache
Hit from cloudfront, HIT
status
200
x-amz-meta-mode
33188
content-encoding
gzip
content-length
1827
x-served-by
cache-fra19154-FRA
last-modified
Wed, 06 Sep 2017 08:46:00 GMT
server
AmazonS3
x-timer
S1565710110.808938,VS0,VE0
etag
"0df6cb700db4e2c8b3b7dcb734e91cb0"
x-amz-meta-uid
0
vary
Accept-Encoding
x-amz-meta-gid
0
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA50
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
Bz1oMGf3im0GdaDR1lpP366TMdyCBt5NXOq1IlamWrJqJW2zqe6XsA==
x-cache-hits
3334048
st
imprammp.taboola.com/ Frame 4CA3
0
0
Document
General
Full URL
https://imprammp.taboola.com/st?cipid=66291385&ttype=0&cirid=B71B70BEA241554831265909233&cicmp=1994735&cijs=1&dast=V7MuACFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBuIHGcJbTHiDCYtBGS1Wq9FwMhmsFrvhYDIFDmn6jKaDpOE0G4TMi-VpMoiKrrfF7nCaPW-wQ9Pp8Lnu9brf7y7xWe5Ku1_u8n3-Or_fZ3Z53oLL3-rymN7Sl-XvFjo8Xpfl85b5XXeTWzFY6x7Oz1v0d0ssL4fXrbSb_m6F3a00HP12l1v3NB3dCrfmafeZXW7Ry3h6q12ez8Pn8ssBAAAA4AEAaqUd4gcQACACAAAAQAIAAACAIqDi30LgAgAAAAAD4KC0SwNAnEPhHnaT5_e3nI7-AAB4CAABABhQIAEgcL8oAcgAezoBAAAAAAAAAGD5____jxmYN8yVAfB4e78x6AF48AF4EAIAAMgaSmNTwRtEY1slKkgtYgQAAACQm_oPczSpEyqLKgAAgnQrgCsAgAC2RUwi0CzdQYm3MAAAAIGxBXpY_H6zw67xu10GAAAAAAAAAGD2f_aPJtTkDJfm20TYpPYLCACw9gsIAMCmbgAAbwJwQUfQisFgdQkx2cxWg8VkMzsAAACAu____389kJmZjCOLZzEYmXzLwcplGQxmnpHFsVp5jMuFa7U9BxeRHqUPBdg-Dmn6jKaDpOE0G4TMi-VpMoiKrrfF7nCaPfebsMVoNZlslsPZcjEZDEfD0Wh_Ajca4AQNh4PFbrDYLRbDyWIyGiwHCxSIwQQnZDjaTFaj3Wo3WQ4no9FsM9kgRatWs9FmMFzNJrPdbjUcDJejEVK0ZjGbTBaz0XK3GSwno8FwMhwizE0sFsvMtHLLhrvNWrRYWdbChcOzVlgmg9VuNthYRiO36PUxnUYb18a58KJggNdeBBfpRPpyuV0mp8Mt8VkuYonmZJFOZJd9Z2YyjiyexWBk8i0HK5dlMJh5RhbHauUxLheu1b43sVgsM9PKLRvuNmvRYmVZCxcOz1phmQxWu9lgYxmN3KLXx3QabVwb58LfWM1Wu8VgMZjtG6vZarcYLAazfYfO8F19zkbVdSfymJTfaE59kjkNCpfB4p1KTbtx51gQl4RFp8op88ge4uhUZTZ4DAZFLBGcLtKJ6GU8XcQSydMinSiGu5nJsBxtVi6PzeVbeByr0cy3m9lcu-HGNLFMxBKl6SKd6OUu3-ev8_t9ZpfnLbj8rS6P6S19Wf5uocPjdVk-b5nfdTe5FYO17uH8vEV_t8TycnjdSrvp71bY3UrD0W93uXVP09GtcGuedp_Z5Ra9jKe32uX5PHwui_qPDjFczRWz5VyyWs1Fw1UCAAAAAAAAAFjCnHkTAAAAgNNgJpvBcrVcgIh4x12VNPmej8vmguLGjxn05XK7TE6HW-KzHA!&excid=22&tst=1&docw=0
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash

Request headers

:method
GET
:authority
imprammp.taboola.com
:scheme
https
:path
/st?cipid=66291385&ttype=0&cirid=B71B70BEA241554831265909233&cicmp=1994735&cijs=1&dast=V7MuACFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBuIHGcJbTHiDCYtBGS1Wq9FwMhmsFrvhYDIFDmn6jKaDpOE0G4TMi-VpMoiKrrfF7nCaPW-wQ9Pp8Lnu9brf7y7xWe5Ku1_u8n3-Or_fZ3Z53oLL3-rymN7Sl-XvFjo8Xpfl85b5XXeTWzFY6x7Oz1v0d0ssL4fXrbSb_m6F3a00HP12l1v3NB3dCrfmafeZXW7Ry3h6q12ez8Pn8ssBAAAA4AEAaqUd4gcQACACAAAAQAIAAACAIqDi30LgAgAAAAAD4KC0SwNAnEPhHnaT5_e3nI7-AAB4CAABABhQIAEgcL8oAcgAezoBAAAAAAAAAGD5____jxmYN8yVAfB4e78x6AF48AF4EAIAAMgaSmNTwRtEY1slKkgtYgQAAACQm_oPczSpEyqLKgAAgnQrgCsAgAC2RUwi0CzdQYm3MAAAAIGxBXpY_H6zw67xu10GAAAAAAAAAGD2f_aPJtTkDJfm20TYpPYLCACw9gsIAMCmbgAAbwJwQUfQisFgdQkx2cxWg8VkMzsAAACAu____389kJmZjCOLZzEYmXzLwcplGQxmnpHFsVp5jMuFa7U9BxeRHqUPBdg-Dmn6jKaDpOE0G4TMi-VpMoiKrrfF7nCaPfebsMVoNZlslsPZcjEZDEfD0Wh_Ajca4AQNh4PFbrDYLRbDyWIyGiwHCxSIwQQnZDjaTFaj3Wo3WQ4no9FsM9kgRatWs9FmMFzNJrPdbjUcDJejEVK0ZjGbTBaz0XK3GSwno8FwMhwizE0sFsvMtHLLhrvNWrRYWdbChcOzVlgmg9VuNthYRiO36PUxnUYb18a58KJggNdeBBfpRPpyuV0mp8Mt8VkuYonmZJFOZJd9Z2YyjiyexWBk8i0HK5dlMJh5RhbHauUxLheu1b43sVgsM9PKLRvuNmvRYmVZCxcOz1phmQxWu9lgYxmN3KLXx3QabVwb58LfWM1Wu8VgMZjtG6vZarcYLAazfYfO8F19zkbVdSfymJTfaE59kjkNCpfB4p1KTbtx51gQl4RFp8op88ge4uhUZTZ4DAZFLBGcLtKJ6GU8XcQSydMinSiGu5nJsBxtVi6PzeVbeByr0cy3m9lcu-HGNLFMxBKl6SKd6OUu3-ev8_t9ZpfnLbj8rS6P6S19Wf5uocPjdVk-b5nfdTe5FYO17uH8vEV_t8TycnjdSrvp71bY3UrD0W93uXVP09GtcGuedp_Z5Ra9jKe32uX5PHwui_qPDjFczRWz5VyyWs1Fw1UCAAAAAAAAAFjCnHkTAAAAgNNgJpvBcrVcgIh4x12VNPmej8vmguLGjxn05XK7TE6HW-KzHA!&excid=22&tst=1&docw=0
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
accept-encoding
gzip, deflate, br
cookie
t_gid=16a8e4c8-27eb-4aa8-b523-f31409cfbf9d-tuct44c5c9d
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/

Response headers

status
200
server
nginx/1.13.12
content-type
text/html;charset=ISO-8859-1
accept-ranges
bytes
date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish
x-served-by
cache-fra19121-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1565710110.939626,VS0,VE28
cmTagWIDGET_ITEM.js
vidstat.taboola.com/vpaid/units/23_7_5/infra/
656 KB
159 KB
Script
General
Full URL
https://vidstat.taboola.com/vpaid/units/23_7_5/infra/cmTagWIDGET_ITEM.js
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/14_12_0/creatives/creative_js.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
0c56c221be528483184256edd4ef72030575a9ad23883b7de3d4bb660016eba0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 aac86dd0bb06b97ef178f97d0c65ee5f.cloudfront.net (CloudFront), 1.1 varnish
age
468489
x-amz-meta-mtime
1565183321
x-cache
Miss from cloudfront, HIT
status
200
x-amz-meta-mode
33188
content-encoding
gzip
content-length
162911
x-served-by
cache-fra19154-FRA
last-modified
Wed, 07 Aug 2019 13:08:56 GMT
server
AmazonS3
x-timer
S1565710110.938689,VS0,VE0
etag
"ab387709ddcf685476dbd8b5206a258f"
x-amz-meta-uid
0
vary
Accept-Encoding
x-amz-meta-gid
0
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA50
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
EPDd8xFtaZRvR5AolpVV9caztUXGY6D6Q6_bDIbkm0PJCA9YOo0oaA==
x-cache-hits
103828
cmOsUnit.css
vidstat.taboola.com/vpaid/units/23_7_5/assets/css/
34 KB
6 KB
Stylesheet
General
Full URL
https://vidstat.taboola.com/vpaid/units/23_7_5/assets/css/cmOsUnit.css
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/14_12_0/creatives/creative_js.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
d414d33904b7f1f70da24215298772bbe90ded3c70d5a9f96ec8eeac147181cb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 c76a5a41a8483a9e5dcccdfeb87a16ca.cloudfront.net (CloudFront), 1.1 varnish
age
468492
x-amz-meta-mtime
1565183317
x-cache
Miss from cloudfront, HIT
status
200
x-amz-meta-mode
33188
content-encoding
gzip
content-length
6203
x-served-by
cache-fra19154-FRA
last-modified
Wed, 07 Aug 2019 13:08:47 GMT
server
AmazonS3
x-timer
S1565710110.938669,VS0,VE0
etag
"70512ef817c4d36415176901f3ccd7ac"
x-amz-meta-uid
0
vary
Accept-Encoding
x-amz-meta-gid
0
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA50
accept-ranges
bytes
content-type
text/css
x-amz-cf-id
xiP2XxqPi4Dq7Zh8mw_LLPBJJ8tr8IzbhxUSylwDrd7d3bR2yGtI6g==
x-cache-hits
392789
st
imprammp.taboola.com/ Frame 40BD
0
0
Document
General
Full URL
https://imprammp.taboola.com/st?cipid=66291385&ttype=0&cirid=839B9ACEC625329787135549389&cicmp=1998295&cijs=1&dast=V7t88CFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBvQHGrhZTpgLDotDm6w2k-VuOJuNlpvlcLSYwoexXCaDWiBhmf2-g4JyenrMLoOo6Hpb7A6n2fMGOzSdDp_rXq_7_e4Sn-WutPvlLt_nr_P7fWaX5y24_K0uj-ktfVn-bqHD43VZPm-Z33U3uRWDte7h_LxFf7fE8nJ43Uq76e9W2N1Kw9Fvd7l1T9PRrXBrnnaf2eUWvYynt9rl-Tx8Lr8cAAAAAB4AoHa2IH4AAQAiAAAAACQAAAAAKAIq_i0ELgAAAAAwAA5KuzQAxDkU7mE3eX5_y-noDwCAhwAQAIABBRIAAveLEoCMsvcTAAAAAAAAAACW_____5iBecNcGQCPvusbgx6ABx-AByEAAICsIR5ZxCH7qykcooLTIkYAAAAAuan_MEeTOqGyqAIAIEi3ArgCAAhgW8Qk-szSHZR4CwMAABAYW6CHxe83O-wav9tlAAAAAAAAAABm_2f_aEJNznBpvk2ETWq_gAAAa7-AAABs6gYA8CYAF3QErRgMVpcQk81sNVhMNrMDAAAAuPv____XA5mZyTiyeBaDkcm3HKxclsFg5hlZHKuVx7hcuFbbc3AR6VH6UIDtCxGW2e87KCinp8fsMoiKrrfF7nCaPQfxQcOwnAyC-U3YYrSaTDbL4Wy5mAyGo-FotD-BGw1wgobDwWI3WOwWi-FkMRkNloMFCsRgghMyHG0mq9FutZssh5PRaLaZbJCiVavZaDMYrmaT2W63Gg6Gy9EIKVqzmE0mi9loudsMlpPRYDgZDhHmJhaLZWZauWXD3WYtWqwsa-HC4VkrLJPBajcbbCyjkVv0-phOo41r41x4UTDAay-Ci3QifbncLpPT4Zb4LBexRHOySCeyy74zMxlHFs9iMDL5loOVyzIYzDwji2O18hiXC9dq35tYLJaZaeWWDXebtWixsqyFC4dnrbBMBqvdbLCxjEZu0etjOo02ro1z4W-sZqvdYrAYzPaN1Wy1WwwWg9m-Q2f4rj5no-q6E3lMym80pz7JnAaFy2DxTqWm3bhzLIhLwqJT5ZR5ZA9xdKoyGzwGgyKWCE4X6UT0Mp4uYonkaZFOFMPdzGRYjjYrl8fm8i08jtVo5tvNbK7dcGOaWCZiidJ0kU70cpfv89f5_T6zy_MWXP5Wl8f0lr4sf7fQ4fG6LJ-3zO-6m9yKwVr3cH7eor9bYnk5vG6l3fR3K-xupeHot7vcuqfp6Fa4NU-7z-xyi17G01vt8nwePpdF_UeHGK7mitlyLlmt5qLhKgEAAAAAAAAALGHOvAkAAADAaTCTzWC5Wi5ARLzjrkqafM_HZXNBcePHDPpyuV0mp8Mt8VkO!&excid=22&tst=1&docw=0
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash

Request headers

:method
GET
:authority
imprammp.taboola.com
:scheme
https
:path
/st?cipid=66291385&ttype=0&cirid=839B9ACEC625329787135549389&cicmp=1998295&cijs=1&dast=V7t88CFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBvQHGrhZTpgLDotDm6w2k-VuOJuNlpvlcLSYwoexXCaDWiBhmf2-g4JyenrMLoOo6Hpb7A6n2fMGOzSdDp_rXq_7_e4Sn-WutPvlLt_nr_P7fWaX5y24_K0uj-ktfVn-bqHD43VZPm-Z33U3uRWDte7h_LxFf7fE8nJ43Uq76e9W2N1Kw9Fvd7l1T9PRrXBrnnaf2eUWvYynt9rl-Tx8Lr8cAAAAAB4AoHa2IH4AAQAiAAAAACQAAAAAKAIq_i0ELgAAAAAwAA5KuzQAxDkU7mE3eX5_y-noDwCAhwAQAIABBRIAAveLEoCMsvcTAAAAAAAAAACW_____5iBecNcGQCPvusbgx6ABx-AByEAAICsIR5ZxCH7qykcooLTIkYAAAAAuan_MEeTOqGyqAIAIEi3ArgCAAhgW8Qk-szSHZR4CwMAABAYW6CHxe83O-wav9tlAAAAAAAAAABm_2f_aEJNznBpvk2ETWq_gAAAa7-AAABs6gYA8CYAF3QErRgMVpcQk81sNVhMNrMDAAAAuPv____XA5mZyTiyeBaDkcm3HKxclsFg5hlZHKuVx7hcuFbbc3AR6VH6UIDtCxGW2e87KCinp8fsMoiKrrfF7nCaPQfxQcOwnAyC-U3YYrSaTDbL4Wy5mAyGo-FotD-BGw1wgobDwWI3WOwWi-FkMRkNloMFCsRgghMyHG0mq9FutZssh5PRaLaZbJCiVavZaDMYrmaT2W63Gg6Gy9EIKVqzmE0mi9loudsMlpPRYDgZDhHmJhaLZWZauWXD3WYtWqwsa-HC4VkrLJPBajcbbCyjkVv0-phOo41r41x4UTDAay-Ci3QifbncLpPT4Zb4LBexRHOySCeyy74zMxlHFs9iMDL5loOVyzIYzDwji2O18hiXC9dq35tYLJaZaeWWDXebtWixsqyFC4dnrbBMBqvdbLCxjEZu0etjOo02ro1z4W-sZqvdYrAYzPaN1Wy1WwwWg9m-Q2f4rj5no-q6E3lMym80pz7JnAaFy2DxTqWm3bhzLIhLwqJT5ZR5ZA9xdKoyGzwGgyKWCE4X6UT0Mp4uYonkaZFOFMPdzGRYjjYrl8fm8i08jtVo5tvNbK7dcGOaWCZiidJ0kU70cpfv89f5_T6zy_MWXP5Wl8f0lr4sf7fQ4fG6LJ-3zO-6m9yKwVr3cH7eor9bYnk5vG6l3fR3K-xupeHot7vcuqfp6Fa4NU-7z-xyi17G01vt8nwePpdF_UeHGK7mitlyLlmt5qLhKgEAAAAAAAAALGHOvAkAAADAaTCTzWC5Wi5ARLzjrkqafM_HZXNBcePHDPpyuV0mp8Mt8VkO!&excid=22&tst=1&docw=0
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
accept-encoding
gzip, deflate, br
cookie
t_gid=16a8e4c8-27eb-4aa8-b523-f31409cfbf9d-tuct44c5c9d
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/

Response headers

status
200
server
nginx/1.13.12
content-type
text/html;charset=ISO-8859-1
accept-ranges
bytes
date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 varnish
x-served-by
cache-fra19121-FRA
x-cache
MISS
x-cache-hits
0
x-timer
S1565710110.942224,VS0,VE15
cmTagFEED_MANAGER.js
vidstat.taboola.com/vpaid/units/23_7_5/infra/
722 KB
172 KB
Script
General
Full URL
https://vidstat.taboola.com/vpaid/units/23_7_5/infra/cmTagFEED_MANAGER.js
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/14_12_0/creatives/creative_js.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b795c73cc68137d306c9ac0862981e535eb54997e09f3bbb0143e7f93fc1cc86

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:29 GMT
via
1.1 8cd0e1b054d4e5083057646da4909e74.cloudfront.net (CloudFront), 1.1 varnish
age
468491
x-amz-meta-mtime
1565183321
x-cache
Miss from cloudfront, HIT
status
200
x-amz-meta-mode
33188
content-encoding
gzip
content-length
175814
x-served-by
cache-fra19154-FRA
last-modified
Wed, 07 Aug 2019 13:08:51 GMT
server
AmazonS3
x-timer
S1565710110.942022,VS0,VE0
etag
"5dc3162bfce5d539db248fb1b3ba2cef"
x-amz-meta-uid
0
vary
Accept-Encoding
x-amz-meta-gid
0
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA50
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
eTpAQE8NS3Ld8mGSD5kQxK7aHYX7JLXlUvPzYVptsMm0-l-GT3Zo-A==
x-cache-hits
279424
PMS.js
vidstat.taboola.com/PMS/2.2.1/
51 KB
16 KB
Script
General
Full URL
https://vidstat.taboola.com/PMS/2.2.1/PMS.js
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/23_7_5/infra/cmTagWIDGET_ITEM.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a9e402d2d19f1057cdea09b2152d8cfd35664182564595e19bb83916c1f00201

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:30 GMT
via
1.1 017ee4b2e5ba6b7a7dd1443f39b6e832.cloudfront.net (CloudFront), 1.1 varnish
age
2252718
x-amz-meta-mtime
1542789750
x-cache
Hit from cloudfront, HIT
status
200
x-amz-meta-mode
33188
content-encoding
gzip
content-length
15795
x-served-by
cache-fra19154-FRA
last-modified
Wed, 21 Nov 2018 08:42:31 GMT
server
AmazonS3
x-timer
S1565710110.034545,VS0,VE0
etag
"57a7ebef371550a9ab54a2f0f82547af"
x-amz-meta-uid
0
vary
Accept-Encoding
x-amz-meta-gid
0
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA50
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
SczBu2Yh0LTrpeXWALssK59tK7NIitglIZSKpr5cH1uZ-W1sa3hfRA==
x-cache-hits
456379
oppsula.js
vidstat.taboola.com/oppsula/1.3.6/
15 KB
5 KB
Script
General
Full URL
https://vidstat.taboola.com/oppsula/1.3.6/oppsula.js
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/23_7_5/infra/cmTagWIDGET_ITEM.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6eeaa330e79de82579d573d85b1e62ee0017782c71406518af6b366b78c7981e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:30 GMT
via
1.1 f96185b1d69d6f85635bc2b5554da639.cloudfront.net (CloudFront), 1.1 varnish
age
2367131
x-cache
Hit from cloudfront, HIT
status
200
content-encoding
gzip
content-length
5174
x-served-by
cache-fra19154-FRA
last-modified
Sun, 24 Feb 2019 08:54:20 GMT
server
AmazonS3
x-timer
S1565710110.135784,VS0,VE0
etag
"9eef55ccd492389cc88aa5285cade680"
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA50
accept-ranges
bytes
x-amz-cf-id
uhaJsUkg4hXF1IiWZjxakv-aTXNBKcYYS7Jfn2_5QjDWGhm5qnKWew==
x-cache-hits
2895030
OvaMediaPlayer.js
vidstat.taboola.com/vpaid/vPlayer/player/v10.3.2/
614 KB
159 KB
Script
General
Full URL
https://vidstat.taboola.com/vpaid/vPlayer/player/v10.3.2/OvaMediaPlayer.js
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/23_7_5/infra/cmTagWIDGET_ITEM.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4b111ccc74780f840f33e0ca6e09e833013c4a6310900cc04b929ff8ed0854fc

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:30 GMT
via
1.1 170fdbe261f5e85186a08817806feba2.cloudfront.net (CloudFront), 1.1 varnish
age
464172
x-amz-meta-mtime
1565245892
x-cache
Miss from cloudfront, HIT
status
200
x-amz-meta-mode
33188
content-encoding
gzip
content-length
162102
x-served-by
cache-fra19154-FRA
last-modified
Thu, 08 Aug 2019 06:31:33 GMT
server
AmazonS3
x-timer
S1565710110.142152,VS0,VE0
etag
"cd5b9cff1854cfba96a0a5b2470175e3"
x-amz-meta-uid
0
vary
Accept-Encoding
x-amz-meta-gid
0
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA56
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
_FHkKhyFeGpBvmRO-F_mcJWgevNzO5Hp498eMLPMeA2AhKrUOUcswQ==
x-cache-hits
494958
st
convammp.taboola.com/
0
77 B
Image
General
Full URL
https://convammp.taboola.com/st?cijs=convusmp&ttype=45&cisd=convusmp&cipid=66291385&crid=5254125&dast=V7N-oCFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBuIHG8JbTHiDCYtBGS1Wq9Fws5jMVsvBcrLZDCFDeIsJbzBhMSijxWo1Gk4mg9ViNxxMpsAhTZ_RdJA0nGaDkHmxPE0GUdH1ttgdTrPnDXZoOh0-171e9_vdJT7LXWn3y12-z1_n9_vMLs9bcPlbXR7TW_qy_N1Ch8frsnzeMr_rbnIrBmvdw_l5i_5uieXl8LqVdtPfrbC7lYaj3-5y656mo1vh1jztPrPLLXoZT2-1y_N5-Fx-OQAAAAA8AECttEP8AAIARAAAAABIAAAAAFAEVPxbCFwAAAAAYAAclHZpAIhzKNzDbvL8_pbT0R8AAA8BIAAAAwokAATuFyUAGWBPJwAAAAAAAAAALP____8xA_OGuTIAHm_vPQAPPgAPRAWpRYwAAAAAclP_YY4mdUJlUQUAQJBuBXAFABDAtohJBBoGAAAgMLZAD4vfb3bYNX63ywAAAAAAAAAAzP7P_tGEmpzh0nybCJvUfgEBANZ-AQEA2NQNAOBNAC7oCFoxGKwuISab2WqwmGxmBwAAAHD3____rwcyM5NxZPEsBiOTbzlYuSyDwcwzsjhWK49xuXCttufgItKj9KEA28chTZ_RdJA0nGaDkHmxPE0GUdH1ttgdTrPnfhO2GK0mk81yOFsuJoPhaDga7U_gRgOcoOFwsNgNFrvFYjhZTEaD5WCBAjGY4IQMR5vJarRb7SbL4WQ0mm0mG6Ro1Wo22gyGq9lkttuthoPhcjRCitYsZpPJYjZa7jaD5WQ0GE6GQ4S5icVimZlWbtlwt1mLFivLWrhweNYKy2Sw2s0GG8to5Ba9PqbTaOPaOBdeFAzw2ovgIp1IXy63y-R0uCU-y0Us0Zws0onssu_MTMaRxbMYjEy-5WDlsgwGM8_I4litPMblwrXa9yYWi2VmWrllw91mLVqsLGvhwuFZKyyTwWo3G2wso5Fb9PqYTqONa-Nc-Bur2Wq3GCwGs31jNVvtFoPFYLbv0Bm-q8_ZqLruRB6T8hvNqU8yp0HhMli8U6lpN-4cC-KSsOhUOWUe2UMcnarMBo_BoIglgtNFOhG9jKeLWCJ5WqQTxXA3MxmWo83K5bG5fAuPYzWa-XYzm2s33JgmlolYojRdpBO93OX7_HV-v8_s8rwFl7_V5TG9pS_L3y10eLwuy-ct87vuJrdisNY9nJ-36O-WWF4Or1tpN_3dCrtbaTj67S637mk6uhVuzdPuM7vcopfx9Fa7PJ-Hz2VR_9Ehhqu5YracS1aruWi4SgAAAAAAAAAAS5gzbwIAAABwGsxkM1iulgsQEe-4q5Im3_Nx2VxQ3Pgxg75cbpfJ6XBLfJYD!&cmcv=&pix=31589837&cb=1565710110113&uv=2375&abt=arhr_vD!expl_vA!pqp1_vC!sac5_vB&ft=0&unm=WIDGET_ITEM
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:30 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1565710110.152497,VS0,VE15
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-fra19121-FRA
st
convammp.taboola.com/
0
53 B
Image
General
Full URL
https://convammp.taboola.com/st?cijs=convusmp&ttype=72&cisd=convusmp&cipid=66291385&crid=5254125&dast=V7N-oCFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBuIHG8JbTHiDCYtBGS1Wq9Fws5jMVsvBcrLZDCFDeIsJbzBhMSijxWo1Gk4mg9ViNxxMpsAhTZ_RdJA0nGaDkHmxPE0GUdH1ttgdTrPnDXZoOh0-171e9_vdJT7LXWn3y12-z1_n9_vMLs9bcPlbXR7TW_qy_N1Ch8frsnzeMr_rbnIrBmvdw_l5i_5uieXl8LqVdtPfrbC7lYaj3-5y656mo1vh1jztPrPLLXoZT2-1y_N5-Fx-OQAAAAA8AECttEP8AAIARAAAAABIAAAAAFAEVPxbCFwAAAAAYAAclHZpAIhzKNzDbvL8_pbT0R8AAA8BIAAAAwokAATuFyUAGWBPJwAAAAAAAAAALP____8xA_OGuTIAHm_vPQAPPgAPRAWpRYwAAAAAclP_YY4mdUJlUQUAQJBuBXAFABDAtohJBBoGAAAgMLZAD4vfb3bYNX63ywAAAAAAAAAAzP7P_tGEmpzh0nybCJvUfgEBANZ-AQEA2NQNAOBNAC7oCFoxGKwuISab2WqwmGxmBwAAAHD3____rwcyM5NxZPEsBiOTbzlYuSyDwcwzsjhWK49xuXCttufgItKj9KEA28chTZ_RdJA0nGaDkHmxPE0GUdH1ttgdTrPnfhO2GK0mk81yOFsuJoPhaDga7U_gRgOcoOFwsNgNFrvFYjhZTEaD5WCBAjGY4IQMR5vJarRb7SbL4WQ0mm0mG6Ro1Wo22gyGq9lkttuthoPhcjRCitYsZpPJYjZa7jaD5WQ0GE6GQ4S5icVimZlWbtlwt1mLFivLWrhweNYKy2Sw2s0GG8to5Ba9PqbTaOPaOBdeFAzw2ovgIp1IXy63y-R0uCU-y0Us0Zws0onssu_MTMaRxbMYjEy-5WDlsgwGM8_I4litPMblwrXa9yYWi2VmWrllw91mLVqsLGvhwuFZKyyTwWo3G2wso5Fb9PqYTqONa-Nc-Bur2Wq3GCwGs31jNVvtFoPFYLbv0Bm-q8_ZqLruRB6T8hvNqU8yp0HhMli8U6lpN-4cC-KSsOhUOWUe2UMcnarMBo_BoIglgtNFOhG9jKeLWCJ5WqQTxXA3MxmWo83K5bG5fAuPYzWa-XYzm2s33JgmlolYojRdpBO93OX7_HV-v8_s8rwFl7_V5TG9pS_L3y10eLwuy-ct87vuJrdisNY9nJ-36O-WWF4Or1tpN_3dCrtbaTj67S637mk6uhVuzdPuM7vcopfx9Fa7PJ-Hz2VR_9Ehhqu5YracS1aruWi4SgAAAAAAAAAAS5gzbwIAAABwGsxkM1iulgsQEe-4q5Im3_Nx2VxQ3Pgxg75cbpfJ6XBLfJYD!&cmcv=&pix=&cb=1565710110129&uv=2375&abt=arhr_vD!expl_vA!pqp1_vC!sac5_vB&ft=0&unm=WIDGET_ITEM
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:30 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1565710110.173580,VS0,VE14
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-fra19121-FRA
content14_10_18m.js
vidstat.taboola.com/
37 KB
8 KB
Script
General
Full URL
https://vidstat.taboola.com/content14_10_18m.js
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/units/23_7_5/infra/cmTagFEED_MANAGER.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ab8bbbaf028510d8b119cce741f0c2cc94816dcc113d83cac81a6aade6a76fa9

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:30 GMT
via
1.1 3ccfbae98f5816b531634c1e82e45259.cloudfront.net (CloudFront), 1.1 varnish
age
2431275
x-cache
Hit from cloudfront, HIT
status
200
content-encoding
gzip
content-length
7638
x-served-by
cache-fra19154-FRA
last-modified
Sun, 14 Oct 2018 13:31:31 GMT
server
AmazonS3
x-timer
S1565710110.206179,VS0,VE0
etag
"d8d81221ec6e604811ce469d899c9c8b"
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA50
accept-ranges
bytes
x-amz-cf-id
Vs4TubaGEnCgigh3kN5-OJytJd-a8QzTxQCNFZg0hh5KVFK_O_tI7g==
x-cache-hits
2195568
st
convammp.taboola.com/
0
52 B
Image
General
Full URL
https://convammp.taboola.com/st?cijs=convusmp&ttype=45&cisd=convusmp&cipid=66291385&crid=5258075&dast=V7DQcCFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBvQHG7hZTpgLDotDm6w2k-VuuFtsVqvRcjNcDkEDN8sJc8FhcWiT1Way3A1ns9FysxyOFlP4MJbLZFALJCyz33dQUE5Pj9llEBVdb4vd4TR73mCHptPhc93rdb_fXeKz3JV2v9zl-_x1fr_P7PK8BZe_1eUxvaUvy98tdHi8LsvnLfO77ia3YrDWPZyft-jvllheDq9baTf93Qq7W2k4-u0ut-5pOroVbs3T7jO73KKX8fRWuzyfh8_llwMAAADAAwDUzhbEDyAAQAQAAACABAAAAABFQMW_hcAFAAAAAAbAQWmXBoA4h8I97CbP7285Hf0BAPAQAAIAMKBAAkDgflECkFH2fgIAAAAAAAAAwPL___8fMzBvmCsD4NF33QPw4APwQFRwWsQIAAAAIDf1H-ZoUidUFlUAAATpVgBXAAABbIuYRJ9hAAAAAmML9LD4_WaHXeN3uwwAAAAAAAAAwOz_7B9NqMkZLs23ibBJ7RcQAGDtFxAAgE3dAADeBOCCjqAVg8HqEmKyma0Gi8lmdgAAAAB3_____3ogMzMZRxbPYjAy-ZaDlcsyGMw8I4tjtfIYlwvXansOLiI9Sh8KsH0hwjL7fQcF5fT0mF0GUdH1ttgdTrPnID5oGJaTQTC_CVuMVpPJZjmcLReTwXA0HI32J3CjAU7QcDhY7AaL3WIxnCwmo8FysECBGExwQoajzWQ12q12k-VwMhrNNpMNUrRqNRttBsPVbDLb7VbDwXA5GiFFaxazyWQxGy13m8FyMhoMJ8MhwtzEYrHMTCu3bLjbrEWLlWUtXDg8a4VlMljtZoONZTRyi14f02m0cW2cCy8KBnjtRXCRTqQvl9tlcjrcEp_lIpZoThbpRHbZd2Ym48jiWQxGJt9ysHJZBoOZZ2RxrFYe43LhWu17E4vFMjOt3LLhbrMWLVaWtXDh8KwVlslgtZsNNpbRyC16fUyn0ca1cS78jdVstVsMFoPZvrGarXaLwWIw23foDN_V52xUXXcij0n5jebUJ5nToHAZLN6p1LQbd44FcUlYdKqcMo_sIY5OVWaDx2BQxBLB6SKdiF7G00UskTwt0oliuJuZDMvRZuXy2Fy-hcexGs18u5nNtRtuTBPLRCxRmi7SiV7u8n3-Or_fZ3Z53oLL3-rymN7Sl-XvFjo8Xpfl85b5XXeTWzFY6x7Oz1v0d0ssL4fXrbSb_m6F3a00HP12l1v3NB3dCrfmafeZXW7Ry3h6q12ez8Pnsqj_6BDD1VwxW84lq9VcNFwlAAAAAAAAAIAlzJk3AQAAADgNZrIZLFfLBYiId9xVSZPv-bhsLihu_JhBXy63y-R0uCU-ywE!&cmcv=&pix=31589837&cb=1565710110163&uv=2375&abt=arhr_vD!expl_vA!mxpps2_vB!pqp1_vC!sac5_vB!ufm_vC&ft=0&unm=FEED_MANAGER
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:30 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1565710110.225916,VS0,VE14
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-fra19121-FRA
st
convammp.taboola.com/
0
52 B
Image
General
Full URL
https://convammp.taboola.com/st?cijs=convusmp&ttype=72&cisd=convusmp&cipid=66291385&crid=5258075&dast=V7DQcCFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBvQHG7hZTpgLDotDm6w2k-VuuFtsVqvRcjNcDkEDN8sJc8FhcWiT1Way3A1ns9FysxyOFlP4MJbLZFALJCyz33dQUE5Pj9llEBVdb4vd4TR73mCHptPhc93rdb_fXeKz3JV2v9zl-_x1fr_P7PK8BZe_1eUxvaUvy98tdHi8LsvnLfO77ia3YrDWPZyft-jvllheDq9baTf93Qq7W2k4-u0ut-5pOroVbs3T7jO73KKX8fRWuzyfh8_llwMAAADAAwDUzhbEDyAAQAQAAACABAAAAABFQMW_hcAFAAAAAAbAQWmXBoA4h8I97CbP7285Hf0BAPAQAAIAMKBAAkDgflECkFH2fgIAAAAAAAAAwPL___8fMzBvmCsD4NF33QPw4APwQFRwWsQIAAAAIDf1H-ZoUidUFlUAAATpVgBXAAABbIuYRJ9hAAAAAmML9LD4_WaHXeN3uwwAAAAAAAAAwOz_7B9NqMkZLs23ibBJ7RcQAGDtFxAAgE3dAADeBOCCjqAVg8HqEmKyma0Gi8lmdgAAAAB3_____3ogMzMZRxbPYjAy-ZaDlcsyGMw8I4tjtfIYlwvXansOLiI9Sh8KsH0hwjL7fQcF5fT0mF0GUdH1ttgdTrPnID5oGJaTQTC_CVuMVpPJZjmcLReTwXA0HI32J3CjAU7QcDhY7AaL3WIxnCwmo8FysECBGExwQoajzWQ12q12k-VwMhrNNpMNUrRqNRttBsPVbDLb7VbDwXA5GiFFaxazyWQxGy13m8FyMhoMJ8MhwtzEYrHMTCu3bLjbrEWLlWUtXDg8a4VlMljtZoONZTRyi14f02m0cW2cCy8KBnjtRXCRTqQvl9tlcjrcEp_lIpZoThbpRHbZd2Ym48jiWQxGJt9ysHJZBoOZZ2RxrFYe43LhWu17E4vFMjOt3LLhbrMWLVaWtXDh8KwVlslgtZsNNpbRyC16fUyn0ca1cS78jdVstVsMFoPZvrGarXaLwWIw23foDN_V52xUXXcij0n5jebUJ5nToHAZLN6p1LQbd44FcUlYdKqcMo_sIY5OVWaDx2BQxBLB6SKdiF7G00UskTwt0oliuJuZDMvRZuXy2Fy-hcexGs18u5nNtRtuTBPLRCxRmi7SiV7u8n3-Or_fZ3Z53oLL3-rymN7Sl-XvFjo8Xpfl85b5XXeTWzFY6x7Oz1v0d0ssL4fXrbSb_m6F3a00HP12l1v3NB3dCrfmafeZXW7Ry3h6q12ez8Pnsqj_6BDD1VwxW84lq9VcNFwlAAAAAAAAAIAlzJk3AQAAADgNZrIZLFfLBYiId9xVSZPv-bhsLihu_JhBXy63y-R0uCU-ywE!&cmcv=&pix=&cb=1565710110201&uv=2375&abt=arhr_vD!expl_vA!mxpps2_vB!pqp1_vC!sac5_vB!ufm_vC&ft=0&unm=FEED_MANAGER
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:30 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1565710110.230614,VS0,VE15
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-fra19121-FRA
player.css
vidstat.taboola.com/vpaid/vPlayer/player/v10.3.2/assets/
14 KB
3 KB
Stylesheet
General
Full URL
https://vidstat.taboola.com/vpaid/vPlayer/player/v10.3.2/assets/player.css
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.3.2/OvaMediaPlayer.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3e519113583c968dd0daa3a70249fc54df7114ba2595bfe1644d2320e6d25aa5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:30 GMT
via
1.1 fab3f75b4ee7d58be154b12ee77e06eb.cloudfront.net (CloudFront), 1.1 varnish
age
464172
x-amz-meta-mtime
1565245893
x-cache
Miss from cloudfront, HIT
status
200
x-amz-meta-mode
33188
content-encoding
gzip
content-length
2419
x-served-by
cache-fra19154-FRA
last-modified
Thu, 08 Aug 2019 06:31:35 GMT
server
AmazonS3
x-timer
S1565710110.278775,VS0,VE0
etag
"d905122fc8955e89d4478cba21f53f32"
x-amz-meta-uid
0
vary
Accept-Encoding
x-amz-meta-gid
0
cache-control
public, max-age=2592000
x-amz-cf-pop
FRA56
accept-ranges
bytes
content-type
text/css
x-amz-cf-id
cvdTeNg8EViqmQvZmPz1HmuunV_Px8SMMlf0Xw0rxeezwItPM0qXzQ==
x-cache-hits
470753
st
convammp.taboola.com/
0
53 B
Image
General
Full URL
https://convammp.taboola.com/st?cijs=convusmp&ttype=81&cisd=convusmp&cipid=66291385&crid=5254125&dast=V7N-oCFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBuIHG8JbTHiDCYtBGS1Wq9Fws5jMVsvBcrLZDCFDeIsJbzBhMSijxWo1Gk4mg9ViNxxMpsAhTZ_RdJA0nGaDkHmxPE0GUdH1ttgdTrPnDXZoOh0-171e9_vdJT7LXWn3y12-z1_n9_vMLs9bcPlbXR7TW_qy_N1Ch8frsnzeMr_rbnIrBmvdw_l5i_5uieXl8LqVdtPfrbC7lYaj3-5y656mo1vh1jztPrPLLXoZT2-1y_N5-Fx-OQAAAAA8AECttEP8AAIARAAAAABIAAAAAFAEVPxbCFwAAAAAYAAclHZpAIhzKNzDbvL8_pbT0R8AAA8BIAAAAwokAATuFyUAGWBPJwAAAAAAAAAALP____8xA_OGuTIAHm_vPQAPPgAPRAWpRYwAAAAAclP_YY4mdUJlUQUAQJBuBXAFABDAtohJBBoGAAAgMLZAD4vfb3bYNX63ywAAAAAAAAAAzP7P_tGEmpzh0nybCJvUfgEBANZ-AQEA2NQNAOBNAC7oCFoxGKwuISab2WqwmGxmBwAAAHD3____rwcyM5NxZPEsBiOTbzlYuSyDwcwzsjhWK49xuXCttufgItKj9KEA28chTZ_RdJA0nGaDkHmxPE0GUdH1ttgdTrPnfhO2GK0mk81yOFsuJoPhaDga7U_gRgOcoOFwsNgNFrvFYjhZTEaD5WCBAjGY4IQMR5vJarRb7SbL4WQ0mm0mG6Ro1Wo22gyGq9lkttuthoPhcjRCitYsZpPJYjZa7jaD5WQ0GE6GQ4S5icVimZlWbtlwt1mLFivLWrhweNYKy2Sw2s0GG8to5Ba9PqbTaOPaOBdeFAzw2ovgIp1IXy63y-R0uCU-y0Us0Zws0onssu_MTMaRxbMYjEy-5WDlsgwGM8_I4litPMblwrXa9yYWi2VmWrllw91mLVqsLGvhwuFZKyyTwWo3G2wso5Fb9PqYTqONa-Nc-Bur2Wq3GCwGs31jNVvtFoPFYLbv0Bm-q8_ZqLruRB6T8hvNqU8yp0HhMli8U6lpN-4cC-KSsOhUOWUe2UMcnarMBo_BoIglgtNFOhG9jKeLWCJ5WqQTxXA3MxmWo83K5bG5fAuPYzWa-XYzm2s33JgmlolYojRdpBO93OX7_HV-v8_s8rwFl7_V5TG9pS_L3y10eLwuy-ct87vuJrdisNY9nJ-36O-WWF4Or1tpN_3dCrtbaTj67S637mk6uhVuzdPuM7vcopfx9Fa7PJ-Hz2VR_9Ehhqu5YracS1aruWi4SgAAAAAAAAAAS5gzbwIAAABwGsxkM1iulgsQEe-4q5Im3_Nx2VxQ3Pgxg75cbpfJ6XBLfJYD!&cmcv=&uv=2375&unm=WIDGET_ITEM&cb=1565710110255&abt=arhr_vD!expl_vA!pqp1_vC!sac5_vB&baseReportD=taboola.com&dataCenter=am&
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:30 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1565710110.285246,VS0,VE14
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-fra19121-FRA
st
convammp.taboola.com/
0
53 B
Image
General
Full URL
https://convammp.taboola.com/st?cijs=convusmp&ttype=81&cisd=convusmp&cipid=66291385&crid=5258075&dast=V7DQcCFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBvQHG7hZTpgLDotDm6w2k-VuuFtsVqvRcjNcDkEDN8sJc8FhcWiT1Way3A1ns9FysxyOFlP4MJbLZFALJCyz33dQUE5Pj9llEBVdb4vd4TR73mCHptPhc93rdb_fXeKz3JV2v9zl-_x1fr_P7PK8BZe_1eUxvaUvy98tdHi8LsvnLfO77ia3YrDWPZyft-jvllheDq9baTf93Qq7W2k4-u0ut-5pOroVbs3T7jO73KKX8fRWuzyfh8_llwMAAADAAwDUzhbEDyAAQAQAAACABAAAAABFQMW_hcAFAAAAAAbAQWmXBoA4h8I97CbP7285Hf0BAPAQAAIAMKBAAkDgflECkFH2fgIAAAAAAAAAwPL___8fMzBvmCsD4NF33QPw4APwQFRwWsQIAAAAIDf1H-ZoUidUFlUAAATpVgBXAAABbIuYRJ9hAAAAAmML9LD4_WaHXeN3uwwAAAAAAAAAwOz_7B9NqMkZLs23ibBJ7RcQAGDtFxAAgE3dAADeBOCCjqAVg8HqEmKyma0Gi8lmdgAAAAB3_____3ogMzMZRxbPYjAy-ZaDlcsyGMw8I4tjtfIYlwvXansOLiI9Sh8KsH0hwjL7fQcF5fT0mF0GUdH1ttgdTrPnID5oGJaTQTC_CVuMVpPJZjmcLReTwXA0HI32J3CjAU7QcDhY7AaL3WIxnCwmo8FysECBGExwQoajzWQ12q12k-VwMhrNNpMNUrRqNRttBsPVbDLb7VbDwXA5GiFFaxazyWQxGy13m8FyMhoMJ8MhwtzEYrHMTCu3bLjbrEWLlWUtXDg8a4VlMljtZoONZTRyi14f02m0cW2cCy8KBnjtRXCRTqQvl9tlcjrcEp_lIpZoThbpRHbZd2Ym48jiWQxGJt9ysHJZBoOZZ2RxrFYe43LhWu17E4vFMjOt3LLhbrMWLVaWtXDh8KwVlslgtZsNNpbRyC16fUyn0ca1cS78jdVstVsMFoPZvrGarXaLwWIw23foDN_V52xUXXcij0n5jebUJ5nToHAZLN6p1LQbd44FcUlYdKqcMo_sIY5OVWaDx2BQxBLB6SKdiF7G00UskTwt0oliuJuZDMvRZuXy2Fy-hcexGs18u5nNtRtuTBPLRCxRmi7SiV7u8n3-Or_fZ3Z53oLL3-rymN7Sl-XvFjo8Xpfl85b5XXeTWzFY6x7Oz1v0d0ssL4fXrbSb_m6F3a00HP12l1v3NB3dCrfmafeZXW7Ry3h6q12ez8Pnsqj_6BDD1VwxW84lq9VcNFwlAAAAAAAAAIAlzJk3AQAAADgNZrIZLFfLBYiId9xVSZPv-bhsLihu_JhBXy63y-R0uCU-ywE!&cmcv=&uv=2375&unm=FEED_MANAGER&cb=1565710110283&abt=arhr_vD!expl_vA!mxpps2_vB!pqp1_vC!sac5_vB!ufm_vC&baseReportD=taboola.com&dataCenter=am&
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:30 GMT
via
1.1 varnish
server
nginx/1.13.12
x-timer
S1565710110.307504,VS0,VE14
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-fra19121-FRA
15c1b5cc-513e-4996-9dec-8b6ddbe9eaa6
https://www.bgr.in/
1 KB
0
Media
General
Full URL
blob:https://www.bgr.in/15c1b5cc-513e-4996-9dec-8b6ddbe9eaa6
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
BLOB
Security
, ,
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
60ddc774c7b5fd0c01d169321a444da403d60c0042f6bee01b0c96f6e1535fda

Request headers

Sec-Fetch-Mode
no-cors
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Content-Range
bytes 0-1492/1493
Content-Length
1493
Content-Type
video/mp4
8c1a98b8-a6ad-407f-9cca-d41b4593884d
https://www.bgr.in/
1 KB
0
Media
General
Full URL
blob:https://www.bgr.in/8c1a98b8-a6ad-407f-9cca-d41b4593884d
Requested by
Host: www.bgr.in
URL: https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Protocol
BLOB
Security
, ,
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
60ddc774c7b5fd0c01d169321a444da403d60c0042f6bee01b0c96f6e1535fda

Request headers

Sec-Fetch-Mode
no-cors
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Content-Range
bytes 0-1492/1493
Content-Length
1493
Content-Type
video/mp4
VideoBidRequestHandlerServlet
wf.taboola.com/
672 B
832 B
XHR
General
Full URL
https://wf.taboola.com/VideoBidRequestHandlerServlet?oid=15&width=330&height=185&pubid=169497&tagid=953497&crid=5254125&noaop=2&sortOrderType=0&cb=1565710110469&mimes=5,10,11,12&isvideo=0&plmd=2&mindur=1&maxdur=210&minbr=1&maxbr=10000&st=0&seq=1&pv=1032&pt=2050303299&tz=120&viewable=true&ddast=V7N-oCFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBuIHG8JbTHiDCYtBGS1Wq9Fws5jMVsvBcrLZDCFDeIsJbzBhMSijxWo1Gk4mg9ViNxxMpsAhTZ_RdJA0nGaDkHmxPE0GUdH1ttgdTrPnDXZoOh0-171e9_vdJT7LXWn3y12-z1_n9_vMLs9bcPlbXR7TW_qy_N1Ch8frsnzeMr_rbnIrBmvdw_l5i_5uieXl8LqVdtPfrbC7lYaj3-5y656mo1vh1jztPrPLLXoZT2-1y_N5-Fx-OQAAAAA8AECttEP8AAIARAAAAABIAAAAAFAEVPxbCFwAAAAAYAAclHZpAIhzKNzDbvL8_pbT0R8AAA8BIAAAAwokAATuFyUAGWBPJwAAAAAAAAAALP____8xA_OGuTIAHm_vPQAPPgAPRAWpRYwAAAAAclP_YY4mdUJlUQUAQJBuBXAFABDAtohJBBoGAAAgMLZAD4vfb3bYNX63ywAAAAAAAAAAzP7P_tGEmpzh0nybCJvUfgEBANZ-AQEA2NQNAOBNAC7oCFoxGKwuISab2WqwmGxmBwAAAHD3____rwcyM5NxZPEsBiOTbzlYuSyDwcwzsjhWK49xuXCttufgItKj9KEA28chTZ_RdJA0nGaDkHmxPE0GUdH1ttgdTrPnfhO2GK0mk81yOFsuJoPhaDga7U_gRgOcoOFwsNgNFrvFYjhZTEaD5WCBAjGY4IQMR5vJarRb7SbL4WQ0mm0mG6Ro1Wo22gyGq9lkttuthoPhcjRCitYsZpPJYjZa7jaD5WQ0GE6GQ4S5icVimZlWbtlwt1mLFivLWrhweNYKy2Sw2s0GG8to5Ba9PqbTaOPaOBdeFAzw2ovgIp1IXy63y-R0uCU-y0Us0Zws0onssu_MTMaRxbMYjEy-5WDlsgwGM8_I4litPMblwrXa9yYWi2VmWrllw91mLVqsLGvhwuFZKyyTwWo3G2wso5Fb9PqYTqONa-Nc-Bur2Wq3GCwGs31jNVvtFoPFYLbv0Bm-q8_ZqLruRB6T8hvNqU8yp0HhMli8U6lpN-4cC-KSsOhUOWUe2UMcnarMBo_BoIglgtNFOhG9jKeLWCJ5WqQTxXA3MxmWo83K5bG5fAuPYzWa-XYzm2s33JgmlolYojRdpBO93OX7_HV-v8_s8rwFl7_V5TG9pS_L3y10eLwuy-ct87vuJrdisNY9nJ-36O-WWF4Or1tpN_3dCrtbaTj67S637mk6uhVuzdPuM7vcopfx9Fa7PJ-Hz2VR_9Ehhqu5YracS1aruWi4SgAAAAAAAAAAS5gzbwIAAABwGsxkM1iulgsQEe-4q5Im3_Nx2VxQ3Pgxg75cbpfJ6XBLfJYD!&proto=2,3,5,6&dtagid=1663055&dpubid=323095&abtst=arhr_vD!expl_vA!pqp1_vC!sac5_vB&mPre=0.033&encoded=1&pstn=vforce2&cirf=https%3A%2F%2Fwww.bgr.in&callback=&en=1&wfv=1&cdb=&gdprApplies=false&amp=0&qsz=6&ft=0&pb=0
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.3.2/OvaMediaPlayer.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
ec4fd34df253780edd85dd32a4513199d918102523db58f368c27d5a0abeedee

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

date
Tue, 13 Aug 2019 15:28:30 GMT
via
1.1 varnish
machineid
1435
x-cache
MISS
status
200
x-cache-hits
0
content-length
672
x-served-by
cache-hhn4032-HHN
pragma
no-cache
server
nginx/1.13.12
x-timer
S1565710110.489773,VS0,VE128
content-type
application/json;charset=ISO-8859-1
access-control-allow-origin
https://www.bgr.in
cache-control
no-cache,must-revalidate,no-store,max-age=0,s-maxage=0
access-control-allow-credentials
true
accept-ranges
bytes
expires
Sat, 26 Jul 1997 05:00:00 GMT
Cookie set rt=ifr
bcp.crwdcntrl.net/5/ct=y/c=12381/rand=341928632/pv=y/int=site%3Abgr.in/int=PageTitle%3AGoogle%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone%20with%20a%2... Frame E821
Redirect Chain
  • https://bcp.crwdcntrl.net/5/c=12381/rand=341928632/pv=y/int=site%3Abgr.in/int=PageTitle%3AGoogle%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone%20with%20...
  • https://bcp.crwdcntrl.net/5/ct=y/c=12381/rand=341928632/pv=y/int=site%3Abgr.in/int=PageTitle%3AGoogle%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone%20wi...
0
0
Document
General
Full URL
https://bcp.crwdcntrl.net/5/ct=y/c=12381/rand=341928632/pv=y/int=site%3Abgr.in/int=PageTitle%3AGoogle%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone%20with%20a%20single%20text%20message/int=tag%3AGoogle%2Chacking%2CiOS%2CProject%20Zero%2Csecurity%20vulnerability%2Cvulnerability/int=pageType%3A%20Single/int=category%3ANews/int=language%3AEnglish/int=userDevice%3ADesktop/int=userOS%3AUnknown%20Operating%20System/int=platform%3AWeb/rt=ifr
Requested by
Host: tags.crwdcntrl.net
URL: https://tags.crwdcntrl.net/c/12381/cc.js?ns=_cc12381
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.194.238.142 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-194-238-142.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
bcp.crwdcntrl.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
Accept-Encoding
gzip, deflate, br
Cookie
_cc_cc=ctst
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/

Response headers

Access-Control-Allow-Origin
*
Cache-Control
no-cache
Content-Encoding
gzip
Content-Type
text/html;charset=UTF-8
Date
Tue, 13 Aug 2019 15:28:34 GMT
Expires
0
P3P
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
Pragma
no-cache
Set-Cookie
_cc_dc=1;Path=/;Domain=crwdcntrl.net;Expires=Sat, 09-May-2020 15:05:00 GMT;SameSite=None _cc_id=b04dc81a5e5a8d4eb10d65f3e94227b3;Path=/;Domain=crwdcntrl.net;Expires=Sat, 09-May-2020 15:05:00 GMT;SameSite=None _cc_cc="ACZ4nGNQSDIwSUm2MEw0TTVNtEgxSU0yNEgxM00zTrU0MTIyTzJmAILYoOtKDAgAAF55CrI%3D";Version=1;Path=/;Domain=crwdcntrl.net;Expires=Sat, 09-May-2020 15:05:00 GMT;Max-Age=23328000;SameSite=None _cc_aud="ABR4nGNgYGCIDbquxAAHABTcAak%3D";Version=1;Path=/;Domain=crwdcntrl.net;Expires=Sat, 09-May-2020 15:05:00 GMT;Max-Age=23328000;SameSite=None
Vary
Accept-Encoding
X-Server
10.45.31.209
Content-Length
139
Connection
keep-alive

Redirect headers

Cache-Control
no-cache
Date
Tue, 13 Aug 2019 15:28:34 GMT
Expires
0
Location
https://bcp.crwdcntrl.net/5/ct=y/c=12381/rand=341928632/pv=y/int=site%3Abgr.in/int=PageTitle%3AGoogle%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone%20with%20a%20single%20text%20message/int=tag%3AGoogle%2Chacking%2CiOS%2CProject%20Zero%2Csecurity%20vulnerability%2Cvulnerability/int=pageType%3A%20Single/int=category%3ANews/int=language%3AEnglish/int=userDevice%3ADesktop/int=userOS%3AUnknown%20Operating%20System/int=platform%3AWeb/rt=ifr
P3P
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
Pragma
no-cache
Set-Cookie
_cc_cc=ctst;Path=/;Domain=crwdcntrl.net;SameSite=None
X-Server
10.45.11.52
Content-Length
0
Connection
keep-alive
apple-ios-apps-stock-image.jpg
st1.bgr.in/wp-content/uploads/2017/06/
22 KB
23 KB
Image
General
Full URL
https://st1.bgr.in/wp-content/uploads/2017/06/apple-ios-apps-stock-image.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
Akamai Image Manager /
Resource Hash
04bc4c6d56aeba4e1f1a8ff31758ee11e14721139dc0a29c4709a46cb4995e7a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:34 GMT
x-check-cacheable
YES
server
Akamai Image Manager
etag
"d1a00a55da3912b83e3e45128caace8d"
x-serial
1648
content-type
image/webp
status
200
cache-control
public, max-age=2592000
last-modified
Fri, 05 Jul 2019 18:04:21 GMT
x-akamai-ssl-client-sid
Mr6gwUVyV0YQ7ttd0ukXvg==
content-length
22988
expires
Sun, 01 Sep 2019 14:16:15 GMT
samsung-galaxy-note-10-note10-plus-price-in-india-460x355.jpg
st1.bgr.in/wp-content/uploads/2019/08/
7 KB
8 KB
Image
General
Full URL
https://st1.bgr.in/wp-content/uploads/2019/08/samsung-galaxy-note-10-note10-plus-price-in-india-460x355.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
Akamai Image Manager /
Resource Hash
a5cc9937a3e9d4eca8e4def2278e39136a7049d95a992212ee0642a89f3df05c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:34 GMT
last-modified
Thu, 08 Aug 2019 06:15:47 GMT
server
Akamai Image Manager
etag
"3cbaacebf25fc6578bdd2019cc4a4da0"
content-type
image/webp
status
200
cache-control
public, max-age=2592000
content-length
7632
expires
Sat, 07 Sep 2019 06:17:06 GMT
twitter-logo-460x355.jpg
st1.bgr.in/wp-content/uploads/2018/10/
5 KB
5 KB
Image
General
Full URL
https://st1.bgr.in/wp-content/uploads/2018/10/twitter-logo-460x355.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.16.186.65 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-65.deploy.static.akamaitechnologies.com
Software
Akamai Image Manager /
Resource Hash
93fbfb4ec2f6a70dff3f856818f0081f648dbabf3a8ee4ee9713a271cf70c6e6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 15:28:34 GMT
last-modified
Thu, 13 Jun 2019 05:28:31 GMT
server
Akamai Image Manager
etag
"44de1060aef02f632f166c0e8216db5e"
content-type
image/webp
status
200
cache-control
public, max-age=2592000
content-length
4890
expires
Thu, 05 Sep 2019 07:02:38 GMT
feedback.php
www.facebook.com/plugins/ Frame B4F5
Redirect Chain
  • https://www.facebook.com/v2.10/plugins/comments.php?app_id=133005220097303&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D44%23cb%3Df28919b426b8bd8%26domain%3Dww...
  • https://www.facebook.com/plugins/comments.php?app_id=133005220097303&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D44%23cb%3Df28919b426b8bd8%26domain%3Dwww.bgr....
  • https://www.facebook.com/plugins/feedback.php?app_id=133005220097303&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D44%23cb%3Df28919b426b8bd8%26domain%3Dwww.bgr....
0
0
Document
General
Full URL
https://www.facebook.com/plugins/feedback.php?app_id=133005220097303&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D44%23cb%3Df28919b426b8bd8%26domain%3Dwww.bgr.in%26origin%3Dhttps%253A%252F%252Fwww.bgr.in%252Ff28043db50aad1%26relation%3Dparent.parent&container_width=0&height=100&href=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&locale=en_US&sdk=joey&version=v2.10
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/sdk.js?hash=a2ba1fe1df5c336b5e61eff98921b9d4&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f106:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/feedback.php?app_id=133005220097303&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D44%23cb%3Df28919b426b8bd8%26domain%3Dwww.bgr.in%26origin%3Dhttps%253A%252F%252Fwww.bgr.in%252Ff28043db50aad1%26relation%3Dparent.parent&container_width=0&height=100&href=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&locale=en_US&sdk=joey&version=v2.10
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
timing-allow-origin
*
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
content-type
text/html; charset="utf-8"
x-fb-debug
LoMvbrlReDvlUDGWcA7tDJ3kk1GbXj+tZp6GndGHAOOMAqvxmyHn0DJ0TXAV1G/Fjw7eJy8SY0QsmjFVVvKdlg==
date
Tue, 13 Aug 2019 15:28:34 GMT

Redirect headers

status
302
strict-transport-security
max-age=15552000; preload
location
https://www.facebook.com/plugins/feedback.php?app_id=133005220097303&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D44%23cb%3Df28919b426b8bd8%26domain%3Dwww.bgr.in%26origin%3Dhttps%253A%252F%252Fwww.bgr.in%252Ff28043db50aad1%26relation%3Dparent.parent&container_width=0&height=100&href=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F&locale=en_US&sdk=joey&version=v2.10
access-control-expose-headers
X-FB-Debug, X-Loader-Length
access-control-allow-credentials
true
vary
Origin
access-control-allow-origin
https://www.facebook.com
access-control-allow-methods
OPTIONS
content-type
text/html; charset="utf-8"
x-fb-debug
8IpfRCzgNG/6WSjZOYi4LPUZgNMNrg7NrRe2KcHLEbUhwj8So9nrzBF6IpOr02Q8Z1Dx35izwhjOwxtrZfS6Dg==
content-length
0
date
Tue, 13 Aug 2019 15:28:34 GMT
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MBRX45
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
cec3748d0c3da4700300d5424aaea375b03550b0ee8b3dd38e242c4022261446
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 29 Jul 2019 21:35:27 GMT
server
Golfe2
age
623
date
Tue, 13 Aug 2019 15:18:11 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
17724
expires
Tue, 13 Aug 2019 17:18:11 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j78&a=1985639704&t=event&ni=0&_s=1&dl=https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-s...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-21819872-1&cid=1707841348.1565710099&jid=2090376314&_gid=72033831.1565710114&gjid=866159242&_v=j78&z=791680378
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-21819872-1&cid=1707841348.1565710099&jid=2090376314&_v=j78&z=791680378
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-21819872-1&cid=1707841348.1565710099&jid=2090376314&_v=j78&z=791680378&slf_rd=1&random=4090429992
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-21819872-1&cid=1707841348.1565710099&jid=2090376314&_v=j78&z=791680378&slf_rd=1&random=4090429992
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:34 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:34 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-21819872-1&cid=1707841348.1565710099&jid=2090376314&_v=j78&z=791680378&slf_rd=1&random=4090429992
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
social
trc.taboola.com/zeemedia-bgr/log/3/
0
54 B
Image
General
Full URL
https://trc.taboola.com/zeemedia-bgr/log/3/social?route=AM:AM:v&ri=187fd0943eecfe7ac154f77ff578c4b2&sd=v2_3fd8db310dd790ee200f3db15ec89a55_7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a_1565710106_1565710106_CNawjgYQjuNHGIr74NzILSABKAEwTTin8g1A8I0QSJSLGlC8tTJYAGAA&ui=7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a&pi=/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message&wi=3056240166484561157&pt=text&vi=1565710105994&st=social-available&d=%7B%22data%22%3A%5B%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-share%22%2C%22nm%22%3A%22facebook%22%2C%22c%22%3A2%2C%22m%22%3A%22stp%22%7D%2C%7B%22i%22%3A%22ctx%22%2C%22ism%22%3Afalse%2C%22srx%22%3A1600%2C%22sry%22%3A1200%2C%22pd%22%3Anull%2C%22tpl%22%3A%22%22%2C%22url%22%3A%22https%3A%2F%2Fwww.bgr.in%2Fnews%2Fgoogles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message%2F%22%2C%22rref%22%3A%22%22%2C%22sref%22%3A%22_undefined_%22%2C%22hdl%22%3A%22Google%E2%80%99s%20Project%20Zero%20hackers%20found%2010%20ways%20to%20break%20into%20an%20iPhone%20with%20a%20single%20text%20message%22%2C%22sec%22%3A%22News%22%2C%22aut%22%3A%5B%22Staff%22%5D%2C%22img%22%3A%22https%3A%2F%2Fst1.bgr.in%2Fwp-content%2Fuploads%2F2017%2F06%2Fapple-ios-apps-stock-image.jpg%22%2C%22v%22%3A15%2C%22ui%22%3A%22%22%2C%22ut%22%3A%22%22%2C%22pw%22%3A%22%22%7D%5D%7D&tim=17%3A28%3A34.069&id=2229&llvl=1&cv=370-46-RELEASE&
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:34 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710114.085811,VS0,VE20
x-served-by
cache-hhn4083-HHN
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
*
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
social
trc.taboola.com/zeemedia-bgr/log/3/
0
55 B
Image
General
Full URL
https://trc.taboola.com/zeemedia-bgr/log/3/social?route=AM:AM:v&ri=187fd0943eecfe7ac154f77ff578c4b2&sd=v2_3fd8db310dd790ee200f3db15ec89a55_7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a_1565710106_1565710106_CNawjgYQjuNHGIr74NzILSABKAEwTTin8g1A8I0QSJSLGlC8tTJYAGAA&ui=7bbb2f4e-6873-41e2-8aa3-a2205760c24d-tuct44c5c9a&pi=/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message&wi=3056240166484561157&pt=text&vi=1565710105994&st=social-visible&d=%7B%22data%22%3A%5B%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-share%22%2C%22nm%22%3A%22facebook%22%2C%22c%22%3A1%2C%22ln%22%3A%22above-fold%22%2C%22lx%22%3A314%2C%22ly%22%3A418%2C%22m%22%3A%22stp%22%2C%22v%22%3A3%7D%5D%7D&tim=17%3A28%3A34.307&id=3199&llvl=1&cv=370-46-RELEASE&
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 13 Aug 2019 15:28:34 GMT
via
1.1 varnish
server
nginx
x-timer
S1565710114.323830,VS0,VE20
x-served-by
cache-hhn4083-HHN
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
*
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
VideoBidRequestHandlerServlet
wf.taboola.com/
700 B
791 B
XHR
General
Full URL
https://wf.taboola.com/VideoBidRequestHandlerServlet?oid=15&width=330&height=185&pubid=169497&tagid=953497&crid=5254125&noaop=2&sortOrderType=0&cb=1565710115472&mimes=5,10,11,12&isvideo=0&plmd=2&mindur=1&maxdur=210&minbr=1&maxbr=10000&st=0&seq=2&pv=1032&pt=2050303299&tz=120&viewable=true&ddast=V7N-oCFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBuIHG8JbTHiDCYtBGS1Wq9Fws5jMVsvBcrLZDCFDeIsJbzBhMSijxWo1Gk4mg9ViNxxMpsAhTZ_RdJA0nGaDkHmxPE0GUdH1ttgdTrPnDXZoOh0-171e9_vdJT7LXWn3y12-z1_n9_vMLs9bcPlbXR7TW_qy_N1Ch8frsnzeMr_rbnIrBmvdw_l5i_5uieXl8LqVdtPfrbC7lYaj3-5y656mo1vh1jztPrPLLXoZT2-1y_N5-Fx-OQAAAAA8AECttEP8AAIARAAAAABIAAAAAFAEVPxbCFwAAAAAYAAclHZpAIhzKNzDbvL8_pbT0R8AAA8BIAAAAwokAATuFyUAGWBPJwAAAAAAAAAALP____8xA_OGuTIAHm_vPQAPPgAPRAWpRYwAAAAAclP_YY4mdUJlUQUAQJBuBXAFABDAtohJBBoGAAAgMLZAD4vfb3bYNX63ywAAAAAAAAAAzP7P_tGEmpzh0nybCJvUfgEBANZ-AQEA2NQNAOBNAC7oCFoxGKwuISab2WqwmGxmBwAAAHD3____rwcyM5NxZPEsBiOTbzlYuSyDwcwzsjhWK49xuXCttufgItKj9KEA28chTZ_RdJA0nGaDkHmxPE0GUdH1ttgdTrPnfhO2GK0mk81yOFsuJoPhaDga7U_gRgOcoOFwsNgNFrvFYjhZTEaD5WCBAjGY4IQMR5vJarRb7SbL4WQ0mm0mG6Ro1Wo22gyGq9lkttuthoPhcjRCitYsZpPJYjZa7jaD5WQ0GE6GQ4S5icVimZlWbtlwt1mLFivLWrhweNYKy2Sw2s0GG8to5Ba9PqbTaOPaOBdeFAzw2ovgIp1IXy63y-R0uCU-y0Us0Zws0onssu_MTMaRxbMYjEy-5WDlsgwGM8_I4litPMblwrXa9yYWi2VmWrllw91mLVqsLGvhwuFZKyyTwWo3G2wso5Fb9PqYTqONa-Nc-Bur2Wq3GCwGs31jNVvtFoPFYLbv0Bm-q8_ZqLruRB6T8hvNqU8yp0HhMli8U6lpN-4cC-KSsOhUOWUe2UMcnarMBo_BoIglgtNFOhG9jKeLWCJ5WqQTxXA3MxmWo83K5bG5fAuPYzWa-XYzm2s33JgmlolYojRdpBO93OX7_HV-v8_s8rwFl7_V5TG9pS_L3y10eLwuy-ct87vuJrdisNY9nJ-36O-WWF4Or1tpN_3dCrtbaTj67S637mk6uhVuzdPuM7vcopfx9Fa7PJ-Hz2VR_9Ehhqu5YracS1aruWi4SgAAAAAAAAAAS5gzbwIAAABwGsxkM1iulgsQEe-4q5Im3_Nx2VxQ3Pgxg75cbpfJ6XBLfJYD!&proto=2,3,5,6&dtagid=1663055&dpubid=323095&abtst=arhr_vD!expl_vA!pqp1_vC!sac5_vB&mPre=0.033&encoded=1&pstn=vforce2&cirf=https%3A%2F%2Fwww.bgr.in&callback=&en=1&wfv=1&cdb=&gdprApplies=false&amp=0&qsz=6&ft=0&pb=0
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.3.2/OvaMediaPlayer.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
377b4abadbbeae1d2b548dd4da3afb2f0a8326ff98eb9c5591783cbda10674bc

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

date
Tue, 13 Aug 2019 15:28:35 GMT
via
1.1 varnish
machineid
1434
x-cache
MISS
status
200
x-cache-hits
0
content-length
700
x-served-by
cache-hhn4032-HHN
pragma
no-cache
server
nginx/1.13.12
x-timer
S1565710115.491990,VS0,VE111
content-type
application/json;charset=ISO-8859-1
access-control-allow-origin
https://www.bgr.in
cache-control
no-cache,must-revalidate,no-store,max-age=0,s-maxage=0
access-control-allow-credentials
true
accept-ranges
bytes
expires
Sat, 26 Jul 1997 05:00:00 GMT
VideoBidRequestHandlerServlet
wf.taboola.com/
688 B
871 B
XHR
General
Full URL
https://wf.taboola.com/VideoBidRequestHandlerServlet?oid=15&width=330&height=185&pubid=169497&tagid=953497&crid=5254125&noaop=2&sortOrderType=0&cb=1565710120475&mimes=5,10,11,12&isvideo=0&plmd=2&mindur=1&maxdur=210&minbr=1&maxbr=10000&st=0&seq=3&pv=1032&pt=2050303299&tz=120&viewable=true&ddast=V7N-oCFgP7S7NHJBtLDwT7S7NHJBtLDwUAAAAGBuIHG8JbTHiDCYtBGS1Wq9Fws5jMVsvBcrLZDCFDeIsJbzBhMSijxWo1Gk4mg9ViNxxMpsAhTZ_RdJA0nGaDkHmxPE0GUdH1ttgdTrPnDXZoOh0-171e9_vdJT7LXWn3y12-z1_n9_vMLs9bcPlbXR7TW_qy_N1Ch8frsnzeMr_rbnIrBmvdw_l5i_5uieXl8LqVdtPfrbC7lYaj3-5y656mo1vh1jztPrPLLXoZT2-1y_N5-Fx-OQAAAAA8AECttEP8AAIARAAAAABIAAAAAFAEVPxbCFwAAAAAYAAclHZpAIhzKNzDbvL8_pbT0R8AAA8BIAAAAwokAATuFyUAGWBPJwAAAAAAAAAALP____8xA_OGuTIAHm_vPQAPPgAPRAWpRYwAAAAAclP_YY4mdUJlUQUAQJBuBXAFABDAtohJBBoGAAAgMLZAD4vfb3bYNX63ywAAAAAAAAAAzP7P_tGEmpzh0nybCJvUfgEBANZ-AQEA2NQNAOBNAC7oCFoxGKwuISab2WqwmGxmBwAAAHD3____rwcyM5NxZPEsBiOTbzlYuSyDwcwzsjhWK49xuXCttufgItKj9KEA28chTZ_RdJA0nGaDkHmxPE0GUdH1ttgdTrPnfhO2GK0mk81yOFsuJoPhaDga7U_gRgOcoOFwsNgNFrvFYjhZTEaD5WCBAjGY4IQMR5vJarRb7SbL4WQ0mm0mG6Ro1Wo22gyGq9lkttuthoPhcjRCitYsZpPJYjZa7jaD5WQ0GE6GQ4S5icVimZlWbtlwt1mLFivLWrhweNYKy2Sw2s0GG8to5Ba9PqbTaOPaOBdeFAzw2ovgIp1IXy63y-R0uCU-y0Us0Zws0onssu_MTMaRxbMYjEy-5WDlsgwGM8_I4litPMblwrXa9yYWi2VmWrllw91mLVqsLGvhwuFZKyyTwWo3G2wso5Fb9PqYTqONa-Nc-Bur2Wq3GCwGs31jNVvtFoPFYLbv0Bm-q8_ZqLruRB6T8hvNqU8yp0HhMli8U6lpN-4cC-KSsOhUOWUe2UMcnarMBo_BoIglgtNFOhG9jKeLWCJ5WqQTxXA3MxmWo83K5bG5fAuPYzWa-XYzm2s33JgmlolYojRdpBO93OX7_HV-v8_s8rwFl7_V5TG9pS_L3y10eLwuy-ct87vuJrdisNY9nJ-36O-WWF4Or1tpN_3dCrtbaTj67S637mk6uhVuzdPuM7vcopfx9Fa7PJ-Hz2VR_9Ehhqu5YracS1aruWi4SgAAAAAAAAAAS5gzbwIAAABwGsxkM1iulgsQEe-4q5Im3_Nx2VxQ3Pgxg75cbpfJ6XBLfJYD!&proto=2,3,5,6&dtagid=1663055&dpubid=323095&abtst=arhr_vD!expl_vA!pqp1_vC!sac5_vB&mPre=0.033&encoded=1&pstn=vforce2&cirf=https%3A%2F%2Fwww.bgr.in&callback=&en=1&wfv=1&cdb=&gdprApplies=false&amp=0&qsz=6&ft=0&pb=0
Requested by
Host: vidstat.taboola.com
URL: https://vidstat.taboola.com/vpaid/vPlayer/player/v10.3.2/OvaMediaPlayer.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
935ddf4fbb8c40f33008f85656f099e6b391395df05e8f1cd85a14127f8a4312

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

date
Tue, 13 Aug 2019 15:28:40 GMT
via
1.1 varnish
machineid
1403
x-cache
MISS
status
200
x-cache-hits
0
content-length
688
x-served-by
cache-hhn4032-HHN
pragma
no-cache
server
nginx/1.13.12
x-timer
S1565710120.496445,VS0,VE146
content-type
application/json;charset=ISO-8859-1
access-control-allow-origin
https://www.bgr.in
cache-control
no-cache,must-revalidate,no-store,max-age=0,s-maxage=0
access-control-allow-credentials
true
accept-ranges
bytes
expires
Sat, 26 Jul 1997 05:00:00 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
tpc.googlesyndication.com
URL
https://tpc.googlesyndication.com/safeframe/1-0-35/html/container.html

Verdicts & Comments Add Verdict or Comment

408 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask object| dataEventTrack object| _gaq object| _comscore function| $ function| jQuery string| site_url object| _newsroom object| _izq object| container object| _izAlt undefined| _iz object| izConfig object| _taboola function| qp object| dataLayer function| chkVal object| _Impulser object| _scripter object| _izAltJS object| _izAlternate object| _gat object| gaGlobal object| google_tag_manager function| Izooto object| _izooto object| iframe function| EmbedHeaderScript function| EmbedFooterScript function| udm_ object| ns_p object| COMSCORE object| _cc12381 object| LOTCC function| Social object| jQuery1111024456080055367901 object| html5 object| Modernizr object| BJLL_options object| BJLL undefined| fnPutJson object| googletag function| getGoogleAd function| getGoogleAdRHS2 function| getGoogleAdRHS3 function| googleAdsCenter string| GoogleAnalyticsObject function| ga string| WIDGET_BASE_URL string| WIDGET_FRONT_BASE_URL object| element object| __s object| instgrm object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| __twttrll object| twttr object| __twttr object| FB object| google_tag_data object| gaplugins object| gaData function| getAfpadgCurrentDayId string| adgsrvrUrl object| scr boolean| adg_comscore_flag string| crtg_nid string| crtg_cookiename string| crtg_varname function| crtg_getCookie string| adg_crtg_content number| crtg_rnd undefined| pubads undefined| header undefined| PECGCookie undefined| targetData undefined| pbsExp undefined| segmentJson undefined| pbsCookie undefined| pbsjson undefined| segmentsObj undefined| campaigns object| adg_imagedetails object| xhr number| innoCall number| spiceMCall number| partnerCount number| splashCount number| forLoopcount string| splashPara string| innoPara object| twoPartner object| partnerArr number| val string| doublePixelpartnerId boolean| demoFlag string| demoDomain undefined| DemodomainArray undefined| tempDemodomainArray undefined| subDemoDomainArray number| PREBID_TIMEOUT object| adg_pbjs object| adUnits1 object| adgebraAdworld object| adg_slider string| deliveryChannel object| adNotSeved string| isDfpAppFlag object| RTB_LOG string| SiteDomain string| splashDC string| neg_keyword boolean| splashNotServed boolean| spotNotServed string| p1 string| p3 string| ADEp3Param boolean| ECGActiveFlag boolean| SegmentaionActiveFlag boolean| AdservingActiveFlag boolean| ADEActiveFlag boolean| PiggibackingActiveFlag string| splsKywrdDivs string| splsfle string| imgPosition string| adg_deviceType boolean| impulseResFalse boolean| isAdgebraValidIp string| ForkDetailsJson string| AdgDynamicDetails string| DynamicTrgDetails boolean| isHomePage boolean| notToServeFlag function| loadChannel object| customDataArray string| customData number| criteoAdserveFlag object| criteoCampIds object| JSONP function| adg_getURLParam1 function| apiInventoryToSpark function| update_comscore_flag function| adg_getMetaContentkeys function| screenSize function| getMetaTitleContentkeys function| callback_spot function| checkDynamicTarget function| nativeAdsCall function| create function| adgInnovation_callback function| innovationAdserve function| spotAdserve function| getExpireDate function| callsiteservlet function| adg_isIE function| lodUrl function| mobileTest function| getBidIdByDC function| findEndPointUrl function| AFPCall function| _RTB_DataLogger function| AdserveCalls function| AdNotServe function| getSiteSizeBySiteResponse function| imagePosition function| reloadAdgebraPixel function| reloadAdgPixel function| getNegativeKeyword function| geIframeStatus function| callback_NativeAds function| callback_NanoNativeAds function| inIframe function| adgCommonCanvasScript function| Splash_TP function| splash_tp_Callback object| siteConfigJson object| adgebraBidderObj object| dspDetailsObj string| master_bidId string| BidIdDetails string| bidderCampDetails boolean| AFPFPresent string| param undefined| google_measure_js_timing boolean| google_noFetch number| __google_ad_urls_id number| google_unique_id object| google_reactive_ads_global_state function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| __google_ad_urls object| TRC object| _tblConsole string| pm_pgtp undefined| msg function| __trcCopyProps function| __trcFromError function| __trcClientTimestamp function| __trcLog function| __trcError function| __trcDebug function| __trcInfo function| __trcWarn function| __trcDOMWalker function| __trcPurgeEventHandlers function| __trcJSONify function| __trcUnJSONify function| __trcGetMargins function| __trcAttachResize function| __trcDetachResize function| __trcTrim function| __trcGetElementsByClass function| __trcToArray function| __trcObjectCreate function| PageManager function| addHashParam object| params number| trc_debug_level string| trc_article_id object| TRCImpl number| taboola_view_id boolean| _tb_dis string| pm_ppy string| _pmep string| _pmep_geo string| _pmpmk boolean| _pmasync boolean| _pmoptimization boolean| _pmoptimizationmanipulation boolean| _pmhp boolean| _pmsb object| pmk object| pmglb object| pmfa object| pmad object| pmdebug_c object| _pmenv object| _pma undefined| _tb_d undefined| _tb_rand object| _pm_ecd string| _tb_vpx boolean| _tb_vautop function| _pmloadfile function| pmws_request_done function| _tb_getUrlParameter object| _pmk function| TBWidgetFacebook function| TBClickToPlayVideo function| TBClickToPlayVideoElem function| TBVideoElem function| TBVideoEvents function| TBOptimizationAutoPlayInfoFromXPathAndURL function| TBWidgetVideoPlayer function| TBGenericVideoModule function| TBOtherPlayer function| TBVideoMetaData function| TBVideo function| TBVideoDetectionYoutubeAPI function| TBOptimizationTouchAndClickEventTracker function| TBWidgetStorage object| PMFileLoader object| PMPage object| PMTemplate function| PMTracking function| PMUniversalGA function| PMMdotLabs function| PMComScore function| PMPublisher function| TBOptimization function| PMGlobal function| pmws_getlocation_done object| pmdebug object| pmws object| yi object| _pm_mcg object| tbopt object| cmTag undefined| define function| startCMTagMain boolean| isCmTagFMOnPage string| category function| webpackHotUpdate string| vpaidId function| OvaMediaPlayer function| shuffle object| arrToUse object| travel object| news object| mobilecontent1 object| mobilecontent1_new object| travelmuted object| movietrailersHD object| movietrailersHDmuted object| widescreen object| movietrailerslight object| landscapeHD object| landscapeHDmuted object| blank object| blankblack object| blankblack7 object| blankblack5 object| blankblack_mob object| blankwhiteHDmpg object| blankblack10 object| blankwhite object| blankwhiteHD object| black_loader object| lightweight object| lightweight_single object| lightweight300600 object| bonnier object| home object| lipstick object| shoes object| art object| infiltrator object| glass object| lemurs object| NBAshoes object| Sunglasses object| Hummus object| Short_food object| Short_swim object| Euro_news object| Automoto_TV object| Uzoo object| SmartDuvet object| Tiger object| Chocolate object| Logan object| Jacket object| Bike object| Kanye object| Cancun object| Smartwatch object| Helicopter object| dogshampoo object| icetea object| charger object| blueysmoothie object| ShortContent object| carbsandwich object| pisatower object| Food1 object| Food2 object| Food3 object| Food4 object| Food5 object| Food6 object| Food7 object| Fashion object| Lifestyle1 object| Lifestyle2 object| Technology1 object| Technology2 object| Technology3 object| Entertainment object| Scrambledeggs object| Spinach object| Bub1 object| Pokemon object| style_hacks object| Motorcycle object| IceCracking object| Manatees object| Daiving object| Fishing_Lure object| Shark object| HundredsManatees object| TigerShark object| MandelaPrize object| Bertram35 object| bushfire object| Snow object| Delta object| Wheels object| Yellowfin object| Grip object| Kawasaki object| Yoga object| Cat object| Chickens object| RZR object| bitcoin object| bmw object| wombat object| koala object| Marsupial object| puppy object| bitcoinMuted object| bmwMuted object| Wallabies object| Bunny object| Pumpkins object| Dogs_Stress object| Dogs_Stress_image object| lightweight300600_short object| playlist string| lastWfUrl number| newsroomStartsLoadingTime object| tbNewsroom

0 Cookies

4 Console Messages

Source Level URL
Text
console-api log URL: https://st1.bgr.in/wp-content/plugins/iwpl-social-share/v5/js/social-share.min.js?ver=x-20190809(Line 76)
Message:
social share cannot be initialized
console-api log URL: https://zee.shopping/js/initial.js(Line 1)
Message:
BGR
console-api log URL: https://zee.shopping/js/initial.js(Line 1)
Message:
https://www.bgr.in/news/googles-project-zero-hackers-found-10-ways-to-break-into-an-iphone-with-a-single-text-message/
console-api log URL: https://zee.shopping/js/initial.js(Line 1)
Message:
Google’s Project Zero hackers found 10 ways to break into an iPhone

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

15.taboola.com
a.quora.com
adgebra.co.in
ads.programattik.com
adservice.google.com
adservice.google.de
ajax.googleapis.com
bcp.crwdcntrl.net
bttrack.com
c2.taboola.com
cdn.izooto.com
cdn.taboola.com
cm.g.doubleclick.net
connect.facebook.net
convammp.taboola.com
cse.google.co.in
fonts.googleapis.com
fonts.gstatic.com
ib.adnxs.com
images.taboola.com
imprammp.taboola.com
impulse.forkcdn.com
match.adsrvr.org
match.taboola.com
platform.instagram.com
platform.twitter.com
px.powerlinks.com
q.quora.com
rtb.mfadsrvr.com
s3.ap-south-1.amazonaws.com
sb.scorecardresearch.com
securepubads.g.doubleclick.net
st1.bgr.in
staticxx.facebook.com
stats.g.doubleclick.net
sync.mathtag.com
tags.crwdcntrl.net
tpc.googlesyndication.com
trc.taboola.com
vidstat.taboola.com
wf.taboola.com
widget.perfectmarket.com
www.bgr.in
www.facebook.com
www.google-analytics.com
www.google.co.in
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.instagram.com
www.storygize.net
x.bidswitch.net
zee.shopping
tpc.googlesyndication.com
151.101.113.2
151.101.114.2
151.101.114.49
151.101.13.181
151.101.14.2
151.101.14.49
172.217.22.66
18.194.102.89
185.29.135.226
185.33.223.208
192.132.33.46
2.16.186.65
2.19.43.224
2606:2800:234:46c:e8b:1e2f:2bd:694
2606:4700:10::6814:3120
2606:4700:30::681b:89bc
2606:4700::6812:d841
2a00:1450:4001:80b::200a
2a00:1450:4001:815::2004
2a00:1450:4001:817::200a
2a00:1450:4001:81b::200e
2a00:1450:4001:81c::2002
2a00:1450:4001:81d::2003
2a00:1450:4001:81d::2008
2a00:1450:4001:81f::2002
2a00:1450:4001:821::200e
2a00:1450:4001:824::2003
2a00:1450:4001:825::2003
2a00:1450:400c:c02::9a
2a02:26f0:134::215:4e6b
2a02:26f0:6c00:197::2965
2a03:2880:f006:21:face:b00c:0:3
2a03:2880:f106:83:face:b00c:0:25de
2a03:2880:f206:c4:face:b00c:0:43fe
2a03:2880:f206:e5:face:b00c:0:4420
34.251.1.224
35.205.46.65
40.113.136.100
52.202.120.185
52.219.64.66
52.58.254.133
54.194.238.142
54.70.1.117
93.184.220.113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