URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-...
Submission: On May 09 via manual from US

Summary

This website contacted 53 IPs in 5 countries across 34 domains to perform 171 HTTP transactions. The main IP is 50.31.169.131, located in Chicago, United States and belongs to SERVERCENTRAL - Server Central Network, US. The main domain is arstechnica.com.
TLS certificate: Issued by COMODO RSA Domain Validation Secure S... on January 24th 2017. Valid for: 2 years.
This is the only time arstechnica.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
3 50.31.169.131 23352 (SERVERCEN...)
15 205.234.175.175 23352 (SERVERCEN...)
5 2.18.233.142 16625 (AKAMAI-AS)
2 151.101.14.202 54113 (FASTLY)
1 151.101.12.239 54113 (FASTLY)
1 2.18.234.190 16625 (AKAMAI-AS)
1 2 216.58.208.40 15169 (GOOGLE)
2 52.222.149.25 16509 (AMAZON-02)
1 4 52.25.247.124 16509 (AMAZON-02)
1 35.190.59.101 15169 (GOOGLE)
2 35.190.91.160 15169 (GOOGLE)
3 172.217.18.2 15169 (GOOGLE)
1 52.222.147.52 16509 (AMAZON-02)
1 54.230.14.213 16509 (AMAZON-02)
1 52.222.148.125 16509 (AMAZON-02)
5 2.18.234.21 16625 (AKAMAI-AS)
1 34.251.6.224 16509 (AMAZON-02)
2 184.30.208.157 20940 (AKAMAI-ASN1)
1 13.32.14.112 16509 (AMAZON-02)
3 34.207.27.213 14618 (AMAZON-AES)
2 34.202.134.243 14618 (AMAZON-AES)
1 74.125.206.154 15169 (GOOGLE)
1 52.222.156.165 16509 (AMAZON-02)
1 46.228.164.13 56396 (TURN)
1 2.18.233.185 16625 (AKAMAI-AS)
2 54.230.14.205 16509 (AMAZON-02)
1 35.153.11.94 14618 (AMAZON-AES)
1 52.201.40.242 14618 (AMAZON-AES)
6 172.217.23.130 15169 (GOOGLE)
1 52.85.254.3 16509 (AMAZON-02)
13 52.0.42.186 14618 (AMAZON-AES)
1 54.84.139.180 14618 (AMAZON-AES)
4 216.58.207.66 15169 (GOOGLE)
1 151.101.14.2 54113 (FASTLY)
2 54.154.30.221 16509 (AMAZON-02)
1 7 52.212.113.202 16509 (AMAZON-02)
2 63.140.41.50 15224 (OMNITURE)
1 1 66.117.28.86 15224 (OMNITURE)
1 54.164.243.144 14618 (AMAZON-AES)
2 52.204.137.72 14618 (AMAZON-AES)
1 4 52.94.220.16 16509 (AMAZON-02)
1 54.230.14.115 16509 (AMAZON-02)
5 152.195.39.114 15133 (EDGECAST)
8 54.165.0.24 14618 (AMAZON-AES)
4 172.217.23.129 15169 (GOOGLE)
4 69.172.216.55 7415 (ADSAFE-1)
2 54.225.180.43 14618 (AMAZON-AES)
2 2.18.235.40 16625 (AKAMAI-AS)
3 69.172.216.58 7415 (ADSAFE-1)
22 69.172.216.111 7415 (ADSAFE-1)
1 1 50.16.249.185 14618 (AMAZON-AES)
1 35.186.234.100 15169 (GOOGLE)
1 1 50.17.209.9 14618 (AMAZON-AES)
1 52.222.152.6 16509 (AMAZON-02)
12 174.129.90.180 14618 (AMAZON-AES)
171 53
Apex Domain
Subdomains
Transfer
29 adsafeprotected.com
pixel.adsafeprotected.com
static.adsafeprotected.com
dt.adsafeprotected.com
141 KB
28 condenastdigital.com
pixel.condenastdigital.com
4d.condenastdigital.com
infinityid.condenastdigital.com
capture.condenastdigital.com
20 KB
15 arstechnica.net
cdn.arstechnica.net
613 KB
14 moatads.com
z.moatads.com
v4.moatads.com
168 KB
11 demdex.net
dpm.demdex.net
condenast.demdex.net
15 KB
8 googlesyndication.com
pagead2.googlesyndication.com
tpc.googlesyndication.com
261 KB
7 doubleclick.net
stats.g.doubleclick.net
securepubads.g.doubleclick.net
80 KB
7 skimresources.com
s.skimresources.com
r.skimresources.com
p.skimresources.com
t.skimresources.com
19 KB
5 jivox.com
as.jivox.com
sync.jivox.com
evs.jivox.com
playercdn.jivox.com
20 KB
5 advertising.com
adserver-us.adtech.advertising.com
582 B
5 amazon-adsystem.com
c.amazon-adsystem.com
aax.amazon-adsystem.com
aax-eu.amazon-adsystem.com
15 KB
5 adobedtm.com
assets.adobedtm.com
67 KB
5 arstechnica.com
arstechnica.com
sstats.arstechnica.com
87 KB
4 casalemedia.com
as-sec.casalemedia.com
3 KB
3 parsely.com
srv-2018-05-09-13.config.parsely.com
srv-2018-05-09-13.pixel.parsely.com
1 KB
3 ndg.io
cdn.ndg.io
fallsm.ndg.io
7 KB
2 bounceexchange.com
tag.bounceexchange.com
assets.bounceexchange.com
63 KB
2 mediavoice.com
cdn.mediavoice.com
plugin.mediavoice.com
114 KB
2 yldbt.com
cdn.yldbt.com
i.yldbt.com
9 KB
2 cloudfront.net
d1z2jf7jlzjs58.cloudfront.net
17 KB
2 google-analytics.com
ssl.google-analytics.com
17 KB
2 outbrain.com
widgets.outbrain.com
odb.outbrain.com
25 KB
1 tapad.com
tapestry.tapad.com
332 B
1 everesttech.net
cm.everesttech.net
527 B
1 google.com
adservice.google.com
662 B
1 google.de
adservice.google.de
662 B
1 rkdms.com
mid.rkdms.com
721 B
1 polarmobile.com
meraxes-cdn.polarmobile.com
647 B
1 turn.com
d.turn.com
698 B
1 arsdev.net
cdn.accelerator.arsdev.net
302 B
1 zqtk.net
segment-data.zqtk.net
1 KB
1 indexww.com
js-sec.indexww.com
30 KB
1 cnevids.com
player.cnevids.com
18 KB
1 googletagservices.com
www.googletagservices.com
6 KB
171 34
Domain Requested by
22 dt.adsafeprotected.com arstechnica.com
21 capture.condenastdigital.com arstechnica.com
15 cdn.arstechnica.net arstechnica.com
12 v4.moatads.com arstechnica.com
7 condenast.demdex.net 1 redirects assets.adobedtm.com
arstechnica.com
6 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
arstechnica.com
5 adserver-us.adtech.advertising.com js-sec.indexww.com
5 assets.adobedtm.com arstechnica.com
assets.adobedtm.com
4 pixel.adsafeprotected.com arstechnica.com
4 tpc.googlesyndication.com securepubads.g.doubleclick.net
4 as-sec.casalemedia.com js-sec.indexww.com
4 pagead2.googlesyndication.com securepubads.g.doubleclick.net
arstechnica.com
4 4d.condenastdigital.com cdn.arstechnica.net
pixel.condenastdigital.com
4 dpm.demdex.net 1 redirects arstechnica.com
3 static.adsafeprotected.com pixel.adsafeprotected.com
arstechnica.com
3 arstechnica.com tpc.googlesyndication.com
cdn.arstechnica.net
2 z.moatads.com securepubads.g.doubleclick.net
2 as.jivox.com securepubads.g.doubleclick.net
as.jivox.com
2 aax-eu.amazon-adsystem.com 1 redirects c.amazon-adsystem.com
2 aax.amazon-adsystem.com c.amazon-adsystem.com
2 srv-2018-05-09-13.pixel.parsely.com arstechnica.com
2 sstats.arstechnica.com assets.adobedtm.com
arstechnica.com
2 t.skimresources.com s.skimresources.com
2 cdn.ndg.io cdn.mediavoice.com
cdn.ndg.io
2 infinityid.condenastdigital.com cdn.arstechnica.net
pixel.condenastdigital.com
2 p.skimresources.com arstechnica.com
2 d1z2jf7jlzjs58.cloudfront.net arstechnica.com
d1z2jf7jlzjs58.cloudfront.net
2 ssl.google-analytics.com 1 redirects arstechnica.com
2 s.skimresources.com arstechnica.com
s.skimresources.com
1 playercdn.jivox.com arstechnica.com
1 evs.jivox.com 1 redirects
1 tapestry.tapad.com arstechnica.com
1 sync.jivox.com 1 redirects
1 i.yldbt.com cdn.yldbt.com
1 cm.everesttech.net 1 redirects
1 odb.outbrain.com widgets.outbrain.com
1 fallsm.ndg.io cdn.ndg.io
1 assets.bounceexchange.com tag.bounceexchange.com
1 adservice.google.com www.googletagservices.com
1 adservice.google.de www.googletagservices.com
1 srv-2018-05-09-13.config.parsely.com d1z2jf7jlzjs58.cloudfront.net
1 mid.rkdms.com js-sec.indexww.com
1 meraxes-cdn.polarmobile.com cdn.mediavoice.com
1 plugin.mediavoice.com cdn.mediavoice.com
1 d.turn.com assets.adobedtm.com
1 tag.bounceexchange.com assets.adobedtm.com
1 stats.g.doubleclick.net arstechnica.com
1 cdn.accelerator.arsdev.net cdn.arstechnica.net
1 cdn.mediavoice.com cdn.arstechnica.net
1 segment-data.zqtk.net cdn.arstechnica.net
1 js-sec.indexww.com cdn.arstechnica.net
1 cdn.yldbt.com cdn.arstechnica.net
1 player.cnevids.com cdn.arstechnica.net
1 c.amazon-adsystem.com cdn.arstechnica.net
1 www.googletagservices.com cdn.arstechnica.net
1 r.skimresources.com s.skimresources.com
1 widgets.outbrain.com cdn.arstechnica.net
1 pixel.condenastdigital.com cdn.arstechnica.net
171 58
Subject Issuer Validity Valid
*.arstechnica.com
COMODO RSA Domain Validation Secure Server CA
2017-01-24 -
2019-01-24
2 years crt.sh
www.adobetag.com
DigiCert SHA2 High Assurance Server CA
2018-02-26 -
2019-11-06
2 years crt.sh
*.bounceexchange.com
Amazon
2017-09-05 -
2018-10-05
a year crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
sstats.arstechnica.com
DigiCert SHA2 High Assurance Server CA
2018-02-06 -
2019-05-02
a year crt.sh
aax-eu.amazon-adsystem.com
Amazon
2018-03-08 -
2019-03-08
a year crt.sh
*.jivox.com
DigiCert SHA2 Secure Server CA
2018-02-12 -
2020-04-17
2 years crt.sh

This page contains 11 frames:

Primary Page: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Frame ID: 2D5DECD46A8B57E996CBE47FA6383F74
Requests: 158 HTTP requests in this frame

Frame: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/scripts/satellite-59888de864746d0ba501787b.html?ParentURLEncoded=https%253A%252F%252Farstechnica.com%252Finformation-technology%252F2018%252F05%252Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%252F
Frame ID: 481848B48984C5F0A9B65EBBE32737F9
Requests: 1 HTTP requests in this frame

Frame: https://assets.bounceexchange.com/assets/bounce/local_storage_frame8.min.html
Frame ID: 25F6B2ABDBFDFD947B1A3C6B0433F025
Requests: 1 HTTP requests in this frame

Frame: https://condenast.demdex.net/dest5.html?d_nsid=0
Frame ID: 5CD4F170D30DE63489C10C9DC8A5598C
Requests: 1 HTTP requests in this frame

Frame: https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_ppt_ox_dm_pm_an&dcc=t
Frame ID: AEAB111C26D589E6BBC2482C43687EED
Requests: 1 HTTP requests in this frame

Frame: https://pixel.adsafeprotected.com/jload?anId=8158&campId=300x600&pubId=1465709575&chanId=32963455&placementId=4659201553&pubCreative=138232004643&pubOrder=557266375&cb=1433719524&adsafe_par&impId=&custom=siderail_0&custom2=article
Frame ID: FC459F9F526EAAD2415320B6DD5D9333
Requests: 2 HTTP requests in this frame

Frame: https://as.jivox.com/unit/unit_renderer.php?creativeUnitType=22&bDim=300x600&bUnitId=2200&siteId=554580bc721c8d&campaignId=121634&es_pId=2S1b4J&jvxVer=2&cMacro=https://adclick.g.doubleclick.net/pcs/click%253Fxai%253DAKAOjssy4RmHFs9-pv_pnkyypDdE3QH1q3xqo7f_MeUcsypqyNoBGCvI3jSPc0p9ih_yM0QvR5VY8Yq524hmsqFWY9hEl-aE5tAj52RkVM6n0U3AQosuxQUzIAp3tgvuCba1htpHeCKztfc8kvIVK-CgDiWhqdIyeEz7--5NgC2f2-_sAsIuolD9uwv4Az-SSlfCr5LfjTvDOB07UCKs89gAHpNlpVk5Mc-7Q7zIseW5QD_Lxz_R8stR%2526sai%253DAMfl-YTrCszRXQyenWiosaIpO-9yQNPneAT1VTEdi1wd6QLxqEjZokyUWnjjzzYhm2CL5hbqU0_hC2YqZXzpG5b7WNp4yVqlI0TQ7vjUhSr4lIF0qQxhZhhBYUgkcho%2526sig%253DCg0ArKJSzFcSIsun1I8NEAE%2526urlfix%253D1%2526adurl%253D&r=96026286
Frame ID: C39CE2F365E2FF3BE5E24A6AE1C15489
Requests: 10 HTTP requests in this frame

Frame: https://pixel.adsafeprotected.com/jload?anId=8158&campId=970x250&pubId=4499729729&chanId=32963455&placementId=4608023012&pubCreative=138231373993&pubOrder=2263887985&cb=1757537334&adsafe_par&impId=&custom=post_nav_0&custom2=article
Frame ID: F29757CB10A9E5E3D2B3C067AE353190
Requests: 2 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20180502/r20110914/activeview/osd_listener.js
Frame ID: E30C1FB2271577493DAE6FF6F0708193
Requests: 6 HTTP requests in this frame

Frame: https://static.adsafeprotected.com/sca.17.4.72.js
Frame ID: F3D583180F23A330C3E5D591BF4FCF88
Requests: 1 HTTP requests in this frame

Frame: https://as.jivox.com/unit/layout_renderer.php?creativeUnitType=22&bDim=300x600&bUnitId=2200&siteId=554580bc721c8d&campaignId=121634&es_pId=2S1b4J&jvxVer=2&cMacro=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%253Fxai%253DAKAOjssy4RmHFs9-pv_pnkyypDdE3QH1q3xqo7f_MeUcsypqyNoBGCvI3jSPc0p9ih_yM0QvR5VY8Yq524hmsqFWY9hEl-aE5tAj52RkVM6n0U3AQosuxQUzIAp3tgvuCba1htpHeCKztfc8kvIVK-CgDiWhqdIyeEz7--5NgC2f2-_sAsIuolD9uwv4Az-SSlfCr5LfjTvDOB07UCKs89gAHpNlpVk5Mc-7Q7zIseW5QD_Lxz_R8stR%2526sai%253DAMfl-YTrCszRXQyenWiosaIpO-9yQNPneAT1VTEdi1wd6QLxqEjZokyUWnjjzzYhm2CL5hbqU0_hC2YqZXzpG5b7WNp4yVqlI0TQ7vjUhSr4lIF0qQxhZhhBYUgkcho%2526sig%253DCg0ArKJSzFcSIsun1I8NEAE%2526urlfix%253D1%2526adurl%253D&r=96026286&objectName=jvx_5af2f667d2f9f&adUnitId=2200&jvxSessionId=1525872231.9372&delayLoad=0&base=1&pageURL=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&allowExp=0
Frame ID: 38F3A7DEBB1D70E50FB647C398CA18B8
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^bouncex$/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i
  • env /^google_ad_/i
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • env /^googletag$/i

Overall confidence: 100%
Detected patterns
  • env /^moment$/i

Overall confidence: 100%
Detected patterns
  • env /^(?:OutbrainPermaLink|OB_releaseVer)$/i

Overall confidence: 100%
Detected patterns
  • env /^PARSELY$/i

Overall confidence: 100%
Detected patterns
  • env /^s_(?:account|objectID|code|INST)$/i

Overall confidence: 100%
Detected patterns
  • script /tracker.js/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

171
Requests

6 %
HTTPS

0 %
IPv6

34
Domains

58
Subdomains

53
IPs

5
Countries

1817 kB
Transfer

4553 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 32
  • https://dpm.demdex.net/id?d_visid_ver=2.1.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_verify=1&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1525872229504 HTTP 302
  • https://dpm.demdex.net/id/rd?d_visid_ver=2.1.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_verify=1&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1525872229504
Request Chain 51
  • https://ssl.google-analytics.com/r/__utm.gif?utmwv=5.7.2&utms=1&utmn=776023998&utmhn=arstechnica.com&utme=8(view*theme*logged_in*show_comments*is_subscriber)9(grid*light*false*false*false)&utmcs=UTF-8&utmsr=1600x1200&utmvp=1585x1200&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users%20%7C%20Ars%20Technica&utmhid=1006727717&utmr=-&utmp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&utmht=1525872229678&utmac=UA-31997-1&utmcc=__utma%3D199748606.569429861.1525872230.1525872230.1525872230.1%3B%2B__utmz%3D199748606.1525872230.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=215240955&utmredir=1&utmu=qQAAAAAAAAAAAAAAAAAAAAAE~ HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-31997-1&cid=569429861.1525872230&jid=215240955&_v=5.7.2&z=776023998
Request Chain 80
  • https://cm.everesttech.net/cm/dd?d_uuid=75449697975556017190265652984919235276 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=WvL2ZgAAAqhJSgH6
Request Chain 104
  • https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_ppt_ox_dm_pm_an HTTP 302
  • https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_ppt_ox_dm_pm_an&dcc=t
Request Chain 136
  • https://sync.jivox.com/tags/sync/usync.php?src=tag&campaignId=121634&siteId=554580bc721c8d&es_pId=2S1b4J&px=BMFSvLPw&r=1525872231 HTTP 302
  • https://tapestry.tapad.com/tapestry/1?ta_partner_id=2166&ta_partner_did=qRyAnLqtIogR&ta_format=png
Request Chain 137
  • https://evs.jivox.com/trk/60/121634/554580bc721c8d/22/jvxSId_1525872231.9372/es_pId_2S1b4J/es_encParams_L3BhZ2VVcmxfaHR0cHMlM0ElMkYlMkZhcnN0ZWNobmljYS5jb20lMkZpbmZvcm1hdGlvbi10ZWNobm9sb2d5JTJGMjAxOCUyRjA1JTJGbWljcm9zb2Z0LXBhdGNoZXMtY3JpdGljYWwtd2luZG93cy1idWctYWN0aXZlbHktZXhwbG9pdGVkLWluLXRoZS13aWxkJTJGL2NsaWNrTWFjcm9faHR0cHMlM0ElMkYlMkZhZGNsaWNrLmcuZG91YmxlY2xpY2submV0JTJGcGNzJTJGY2xpY2slMjUzRnhhaSUyNTNEQUtBT2pzc3k0Um1IRnM5LXB2X3Bua3l5cERkRTNRSDFxM3hxbzdmX01lVWNzeXBxeU5vQkdDdkkzalNQYzBwOWloX3lNMFF2UjVWWS9jYWNoZU1hY3JvXzk2MDI2Mjg2L2p2eFJhbmRvbV8wLjQ5NDUyMTQwOTQ4OTI1MDk0 HTTP 302
  • https://playercdn.jivox.com/images/pixeltracker.gif
Request Chain 144
  • https://condenast.demdex.net/event?d_nsid=0&d_ld=_ts%3D1525872232686&d_rtbd=json&d_jsonv=1&d_dst=1&d_cb=demdexRequestCallback_0_1525872232686&c_viewability=1 HTTP 302
  • https://condenast.demdex.net/firstevent?d_nsid=0&d_ld=_ts%3D1525872232686&d_rtbd=json&d_jsonv=1&d_dst=1&d_cb=demdexRequestCallback_0_1525872232686&c_viewability=1

171 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
37 KB
12 KB
Document
General
Full URL
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Chicago, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
2ee78717cd21cd55390008976fbc30d7867ea4b47126aefe37d8e0ff66afdaf6
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
arstechnica.com
:scheme
https
:path
/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
2D5DECD46A8B57E996CBE47FA6383F74

Response headers

status
200
server
nginx
date
Wed, 09 May 2018 13:23:48 GMT
content-type
text/html; charset=UTF-8
link
<https://arstechnica.com/wp-json/>; rel="https://api.w.org/"
strict-transport-security
max-age=300
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
x-ars-server
web209
content-encoding
gzip
main-10a8ba8fea.css
cdn.arstechnica.net/wp-content/themes/ars/assets/css/
332 KB
71 KB
Stylesheet
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-10a8ba8fea.css
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
a1685588f17cd691f1965840c9790cf86b0feb2fd399207da87538d33c2304c7

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
x-cf2
H
status
200
last-modified
Mon, 07 May 2018 14:11:45 GMT
server
CFS 0215
cf4ttl
43200.000
x-cff
B
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
cf4age
0
x-cf3
H
content-encoding
gzip
x-cf-tsc
1525808104
LisaBrewster_Flickr_HackerDefcon15-800x536.jpg
cdn.arstechnica.net/wp-content/uploads/2017/11/
92 KB
93 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2017/11/LisaBrewster_Flickr_HackerDefcon15-800x536.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
aa064ae4143b0346d2cfe6c4898389baec333d8029799a2a5d342ff61ed3b180

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
x-cf2
H
status
200
last-modified
Wed, 29 Nov 2017 20:55:38 GMT
server
CFS 0215
cf4ttl
43200.000
x-cff
B
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
content-type
image/jpeg
access-control-allow-origin
*
cf4age
0
x-cf3
M
accept-ranges
bytes
content-length
94597
x-cf-tsc
1525808401
main-c48bd2bd99.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
560 KB
183 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-c48bd2bd99.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
813b8003754e92f8893f3cf89efcdd551a93d15a2d2b208031be579b5740bee9

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
x-cf2
H
status
200
last-modified
Mon, 07 May 2018 14:11:45 GMT
server
CFS 0215
cf4ttl
43200.000
x-cff
B
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
cf4age
0
x-cf3
H
content-encoding
gzip
x-cf-tsc
1525808104
ars-8fa3d9d28b.ads.us.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
2 KB
1 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/ars-8fa3d9d28b.ads.us.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
7950139b06e9d0d236850506df05b3bae58339d2d33155b4a743cdea3152b75b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
x-cf2
H
status
200
last-modified
Mon, 07 May 2018 14:11:45 GMT
server
CFS 0215
cf4ttl
43200.000
x-cff
B
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
cf4age
0
x-cf3
H
content-encoding
gzip
x-cf-tsc
1525808104
satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/
104 KB
34 KB
Script
General
Full URL
https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
2.18.233.142 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
db168bf69d348dc2e3fc93794732c77bf28d5296f900ae2d3cec43ffe77ed2b5

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:49 GMT
Content-Encoding
gzip
Last-Modified
Thu, 15 Feb 2018 21:24:34 GMT
Server
Apache
ETag
"f31acaf3363cb714aa2a0f541ae4dcfd:1518729874"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*, *, *
Content-Length
34636
Expires
Wed, 09 May 2018 14:23:49 GMT
100098X1555750.skimlinks.js
s.skimresources.com/js/
35 KB
13 KB
Script
General
Full URL
https://s.skimresources.com/js/100098X1555750.skimlinks.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
151.101.14.202 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Skimlinks V9.0 /
Resource Hash
687e89b61dd968d1f862b34bb04c0a5ead8bb834aacabbce6e536a5e61d92469

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

x-amz-version-id
_RPPng4m98yBl_1hpYGQ5885OYYMQF2y
content-encoding
gzip
server
Skimlinks V9.0
etag
"b7280bf080908fca97c036b426cd209c"
x-served-by
cache-fra19121-FRA
vary
Accept-Encoding
x-cache
HIT
p3p
policyref="https://s.skimresources.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
status
200
cache-control
public, max-age=3600
date
Wed, 09 May 2018 13:23:49 GMT
accept-ranges
bytes
content-type
application/octet-stream
content-length
13126
x-cache-hits
1
services.min.js
cdn.arstechnica.net/cns/
147 KB
50 KB
Script
General
Full URL
https://cdn.arstechnica.net/cns/services.min.js?1525871700
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
dd18d5706a07d3449feae0bee5c3601037b8c07faddda38bdfd777e193fda3af

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
content-encoding
gzip
x-cf3
H
x-amz-request-id
98679CABBCB09285
x-cf1
14961:fD.fra2:co:1525808084:cacheN.fra2-01:H
status
200
x-cache-hits
1
x-amz-id-2
PP9fymOghj2kgxzY2jwsmYbj2SR4X3dCQ0MuV4QnX8kjupZ1RYXI6Uc3egrPPMshBoSeDgAYEG4=
x-served-by
cache-mdw17323-MDW
cf4ttl
43200.000
x-cf2
H
last-modified
Thu, 26 Apr 2018 19:58:08 GMT
server
CFS 0215
x-timer
S1525808087.931014,VS0,VE57
x-cff
B
vary
Accept-Encoding, Accept-Encoding
x-amz-version-id
eXp5iBrrHtjb1F_0lmPmC05vid1HaISe
access-control-allow-origin
*
cache-control
max-age=300
cf4age
0
content-type
application/x-javascript
x-cf-tsc
1525808087
expires
Wed, 09 May 2018 13:28:49 GMT
truncated
/
357 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f95836cdd8c1af1d8261e8e198a4c1dd306e2b50ddc389fe820b56212a9cb17d

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/svg+xml;charset=utf-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
78c8c364b438f0be81f1c51627902fda95b7aebdd2c04aee28c2f72cd4390207

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/svg+xml;charset=utf-8
economica-regular-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-regular-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
c14a030b0b5ef06f710d9bbff164662d4b43c037e62f254aa6280504013caa34

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-10a8ba8fea.css
Origin
https://arstechnica.com

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
x-cf2
H
status
200
last-modified
Mon, 07 May 2018 14:11:45 GMT
server
CFS 0215
cf4ttl
43200.000
x-cff
B
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
content-type
application/octet-stream
access-control-allow-origin
*
cf4age
0
x-cf3
M
accept-ranges
bytes
content-length
24264
x-cf-tsc
1525808105
truncated
/
18 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
62c7d2da9a5942053f17c9756e53b7cda414541619bd35c2b1441cd88c77f235

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/svg+xml;charset=utf-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ec4b6769730ca98db1f40b152c52bd5bec01f61f559fb92709c307750388ac8

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/svg+xml;charset=utf-8
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c7f2558d7005dc61e343b6abb61a63da8ace760a0fdd45cb0cc124b0de5b4c2f

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/svg+xml;charset=utf-8
truncated
/
405 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
fe5248e95b08727c9710c5e8c3dd060dea4fdd96d4a170054e730c61c4493003

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/svg+xml;charset=utf-8
truncated
/
841 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
039f13cdf684666dd973e2385f773385adb074039e8a832ec48e1ae35fb20c15

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/svg+xml;charset=utf-8
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49282a74c6ced31e99f808232188ade8d82652004df4d664dcdb98c32563dd39

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/svg+xml;charset=utf-8
truncated
/
700 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ab499494548829e507e9b6cd57247a6cd565e7f1bc6eb55e3da445af76f1f0c

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/svg+xml;charset=utf-8
truncated
/
400 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6f261533d4b74ae931965cf3609bf47bb55001e39eb7029502d96cec73c4749a

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/svg+xml;charset=utf-8
d.goodin-3.jpg
cdn.arstechnica.net/wp-content/uploads/2016/05/
45 KB
45 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2016/05/d.goodin-3.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
382aa856f43e6756c660f8fe363db9e40f2ae7fa2292cf59a53a93f15097c97b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
x-cf2
H
status
200
last-modified
Tue, 10 May 2016 18:23:16 GMT
server
CFS 0215
cf4ttl
43200.000
x-cff
B
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
content-type
image/jpeg
access-control-allow-origin
*
cf4age
116
x-cf3
H
accept-ranges
bytes
content-length
46158
x-cf-tsc
1525808235
opensans-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
18 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
caa3854f28740fa98125ded826446ee4456379e8ad7c4ff46643347d1901506a

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-10a8ba8fea.css
Origin
https://arstechnica.com

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
x-cf2
H
status
200
last-modified
Mon, 07 May 2018 14:11:45 GMT
server
CFS 0215
cf4ttl
43200.000
x-cff
B
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
content-type
application/octet-stream
access-control-allow-origin
*
cf4age
0
x-cf3
M
accept-ranges
bytes
content-length
18824
x-cf-tsc
1525808105
bitter-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
1193e934b76ed372f47e23f78f8a13e99d9588e564aff866e8f700e7a0650a83

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-10a8ba8fea.css
Origin
https://arstechnica.com

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
x-cf2
H
status
200
last-modified
Mon, 07 May 2018 14:11:45 GMT
server
CFS 0215
cf4ttl
43200.000
x-cff
B
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
content-type
application/octet-stream
access-control-allow-origin
*
cf4age
0
x-cf3
H
accept-ranges
bytes
content-length
24212
x-cf-tsc
1525808105
bitter-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
23 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
0186840386391fa2c0750ff7450a78e066498ba3274546a6fcf0fa9c55cd457c

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-10a8ba8fea.css
Origin
https://arstechnica.com

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
x-cf2
H
status
200
last-modified
Mon, 07 May 2018 14:11:45 GMT
server
CFS 0215
cf4ttl
43200.000
x-cff
B
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
content-type
application/octet-stream
access-control-allow-origin
*
cf4age
0
x-cf3
M
accept-ranges
bytes
content-length
22872
x-cf-tsc
1525808105
opensans-semibold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
1f9cd4a445ba85172da6090dd7b95edf55fd9e81ddb193e0b78093c1afa84378

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-10a8ba8fea.css
Origin
https://arstechnica.com

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
x-cf2
H
status
200
last-modified
Mon, 07 May 2018 14:11:45 GMT
server
CFS 0215
cf4ttl
43200.000
x-cff
B
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
content-type
application/octet-stream
access-control-allow-origin
*
cf4age
2
x-cf3
H
accept-ranges
bytes
content-length
18972
x-cf-tsc
1525808108
truncated
/
279 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ecbfb541946a9a9437190a21d98e1c7ab7d863837d7d038a9a1e053c649c8ba

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/svg+xml;charset=utf-8
opensans-semibolditalic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibolditalic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
59201950b83489808587827b4050ffe0597992825daa88c227476cdbbf8ca282

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-10a8ba8fea.css
Origin
https://arstechnica.com

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
x-cf2
H
status
200
last-modified
Mon, 07 May 2018 14:11:45 GMT
server
CFS 0215
cf4ttl
43200.000
x-cff
B
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
content-type
application/octet-stream
access-control-allow-origin
*
cf4age
2
x-cf3
H
accept-ranges
bytes
content-length
20872
x-cf-tsc
1525808108
blockquote-15f4e0cf4f.svg
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
434 B
684 B
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/blockquote-15f4e0cf4f.svg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
69df9c207667c2ef7940a78d951cda72d599be4e843d8bc43cc3b0ff2c08e280

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-10a8ba8fea.css
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
x-cf2
H
status
200
last-modified
Mon, 07 May 2018 14:11:45 GMT
server
CFS 0215
cf4ttl
43200.000
x-cff
B
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
content-type
image/svg+xml
access-control-allow-origin
*
cf4age
0
x-cf3
M
accept-ranges
bytes
content-length
434
x-cf-tsc
1525808111
opensans-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
86096831a70c72ac0c08f5e65ae92d98330d9fd2b7511dde65ff50b8a16bfd9a

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-10a8ba8fea.css
Origin
https://arstechnica.com

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
x-cf2
H
status
200
last-modified
Mon, 07 May 2018 14:11:45 GMT
server
CFS 0215
cf4ttl
43200.000
x-cff
B
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
content-type
application/octet-stream
access-control-allow-origin
*
cf4age
0
x-cf3
H
accept-ranges
bytes
content-length
19516
x-cf-tsc
1525808105
bitter-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
22 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
205.234.175.175 , United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
Software
CFS 0215 /
Resource Hash
807271433f80bb33654a84ec904035be3d2b34e505a051e3469a47fe39ccb752

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-10a8ba8fea.css
Origin
https://arstechnica.com

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
x-cf2
H
status
200
last-modified
Mon, 07 May 2018 14:11:45 GMT
server
CFS 0215
cf4ttl
43200.000
x-cff
B
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
content-type
application/octet-stream
access-control-allow-origin
*
cf4age
2
x-cf3
H
accept-ranges
bytes
content-length
22104
x-cf-tsc
1525808108
sparrow.min.js
pixel.condenastdigital.com/
36 KB
13 KB
Script
General
Full URL
https://pixel.condenastdigital.com/sparrow.min.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1525871700
Protocol
HTTP/1.1
Server
151.101.12.239 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
17ceb84f4cb7d8a8aa5faf478a33dda1063a9ec8c1f762e194efe9e687bf997e

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:49 GMT
Content-Encoding
gzip
Age
416544
X-Cache
HIT, HIT
Connection
keep-alive
Content-Length
12593
x-amz-id-2
qo180z4AoOFHy21nUkm4l2ufC5tVh7hL3fTYTg/zL5eSZMTKwNGOVffiRD+Lr/il/vEWM/Enqls=
X-Served-By
cache-iad2130-IAD, cache-fra19120-FRA
Access-Control-Allow-Origin
*
Last-Modified
Fri, 27 Apr 2018 17:41:49 GMT
Server
AmazonS3
X-Timer
S1525872229.332768,VS0,VE0
ETag
"cad329cd36ce922ab5a9f127ddfeb9c0"
Vary
Accept-Encoding
x-amz-request-id
029A7B5874369865
Via
1.1 varnish, 1.1 varnish
Expires
Fri, 27 Apr 2018 23:41:48 GMT
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
X-Cache-Hits
2, 45006
outbrain.js
widgets.outbrain.com/
63 KB
24 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1525872229339
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-c48bd2bd99.js
Protocol
HTTP/1.1
Server
2.18.234.190 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
b9a92f809069cdd96c429398778b448594c13c551a5a110bfd95e226bfb7b11e

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:49 GMT
Content-Encoding
gzip
Last-Modified
Thu, 03 May 2018 10:42:51 GMT
Server
Apache
ETag
"90179500124e5686265270ee133d47da:1525344171"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*, *
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
23801
ga.js
ssl.google-analytics.com/
45 KB
17 KB
Script
General
Full URL
https://ssl.google-analytics.com/ga.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
216.58.208.40 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s12-in-f40.1e100.net
Software
Golfe2 /
Resource Hash
1259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 12 Apr 2018 18:13:11 GMT
server
Golfe2
age
4386
date
Wed, 09 May 2018 12:10:43 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
17168
expires
Wed, 09 May 2018 14:10:43 GMT
p.js
d1z2jf7jlzjs58.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/p.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.222.149.25 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-149-25.fra53.r.cloudfront.net
Software
nginx /
Resource Hash
725913eab3460e2955a8ac4ec176f902c7d8d2db60757248b735cbf8698b0749

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
public
Date
Sun, 25 Feb 2018 23:43:24 GMT
Content-Encoding
gzip
Last-Modified
Fri, 07 Mar 2014 00:45:07 GMT
Server
nginx
Age
49225
ETag
W/"53191693-19c1"
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 23082ff4de65f70078e091bc7cd0cf24.cloudfront.net (CloudFront)
Cache-Control
max-age=86400, public
Connection
keep-alive
X-Amz-Cf-Id
__Zt7d657LZQXO43251uEQJXqRWPg1tnBfd6JUV4Qy8rYQOaF08tcQ==
Expires
Mon, 26 Feb 2018 23:43:24 GMT
rd
dpm.demdex.net/id/
Redirect Chain
  • https://dpm.demdex.net/id?d_visid_ver=2.1.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_verify=1&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1525872229504
  • https://dpm.demdex.net/id/rd?d_visid_ver=2.1.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_verify=1&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1525872229504
0
-1 B
XHR
General
Full URL
https://dpm.demdex.net/id/rd?d_visid_ver=2.1.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_verify=1&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1525872229504
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.25.247.124 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-25-247-124.us-west-2.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:50 GMT
Access-Control-Allow-Origin
https://arstechnica.com
X-TID
k9zsVzYcRTc=
Vary
Origin
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Location
https://dpm.demdex.net/id/rd?d_visid_ver=2.1.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_verify=1&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1525872229504
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 2009 00:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:50 GMT
Access-Control-Allow-Origin
https://arstechnica.com
X-TID
k9zsVzYcRTc=
Vary
Origin
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Location
https://dpm.demdex.net/id/rd?d_visid_ver=2.1.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_verify=1&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1525872229504
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 2009 00:00:00 GMT
satellite-59888de864746d0ba501787b.html
assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/scripts/ Frame 4818
0
0
Document
General
Full URL
https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/scripts/satellite-59888de864746d0ba501787b.html?ParentURLEncoded=https%253A%252F%252Farstechnica.com%252Finformation-technology%252F2018%252F05%252Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%252F
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.142 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash

Request headers

Host
assets.adobedtm.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
2D5DECD46A8B57E996CBE47FA6383F74
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/

Response headers

Server
Apache
ETag
"6e713d745eb9332e4d2572981cc3ff57:1518729874"
Last-Modified
Thu, 15 Feb 2018 21:24:34 GMT
Accept-Ranges
bytes
Content-Type
text/html
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
580
Timing-Allow-Origin
* * *
Cache-Control
max-age=3600
Expires
Wed, 09 May 2018 14:23:49 GMT
Date
Wed, 09 May 2018 13:23:49 GMT
Connection
keep-alive
satellite-5a84580664746d080200085b.js
assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/scripts/
253 B
767 B
Script
General
Full URL
https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/scripts/satellite-5a84580664746d080200085b.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
HTTP/1.1
Server
2.18.233.142 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
79101ce3b78c8c246692e624e118ecf2ad0ffb8f6fa8dcfd69e16b223272b303

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:49 GMT
Content-Encoding
gzip
Last-Modified
Thu, 15 Feb 2018 21:24:34 GMT
Server
Apache
ETag
"ee13733e338709a300439a801fe59f21:1518729874"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*, *, *, *, *, *, *
Content-Length
205
Expires
Wed, 09 May 2018 14:23:49 GMT
satellite-5762fa5864746d7eef000ffb.js
assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/scripts/
667 B
907 B
Script
General
Full URL
https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/scripts/satellite-5762fa5864746d7eef000ffb.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
HTTP/1.1
Server
2.18.233.142 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
7687ba38a0a5dea55c69853197c27fd6a43fd0458900eb97420471ab8f030d97

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:49 GMT
Content-Encoding
gzip
Last-Modified
Thu, 15 Feb 2018 21:24:34 GMT
Server
Apache
ETag
"5ef8488551d91751068ce5e6782c4729:1518729874"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*, *, *, *
Content-Length
417
Expires
Wed, 09 May 2018 14:23:49 GMT
s-code-contents-566dcf5046f148f38d0aa32bf73df40db7ae7768.js
assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/
104 KB
31 KB
Script
General
Full URL
https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/s-code-contents-566dcf5046f148f38d0aa32bf73df40db7ae7768.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
HTTP/1.1
Server
2.18.233.142 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
9a425fc348afedf03100a9a5cccb756c1a00818d57e4a2bbb1c032111f0ac454

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:49 GMT
Content-Encoding
gzip
Last-Modified
Thu, 15 Feb 2018 21:24:34 GMT
Server
Apache
ETag
"ccc6d020b3575de11cd0e798e0463ccd:1518729874"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*, *, *, *, *, *
Content-Length
31389
Expires
Wed, 09 May 2018 14:23:49 GMT
ConsentA.js
s.skimresources.com/js/GDPR/
10 KB
4 KB
Script
General
Full URL
https://s.skimresources.com/js/GDPR/ConsentA.js
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
SPDY
Server
151.101.14.202 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Skimlinks V9.0 /
Resource Hash
6d10511bd1b437715e232df4a0bfcc267aa11ef1162afe27c203731b4739a5c7

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

x-amz-version-id
v_8YQ44kz9KX0E_74DMeeSt1h9rrykzb
content-encoding
gzip
server
Skimlinks V9.0
etag
"0e3c1c7b759ab0f7ac9aa05eb7b4b524"
x-served-by
cache-fra19121-FRA
vary
Accept-Encoding
x-cache
HIT
p3p
policyref="https://s.skimresources.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
status
200
cache-control
public, max-age=3600
date
Wed, 09 May 2018 13:23:49 GMT
accept-ranges
bytes
content-type
application/javascript
content-length
3792
x-cache-hits
347
/
r.skimresources.com/api/
196 B
638 B
Script
General
Full URL
https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22domains%22%3A%5B%22cdn.arstechnica.net%22%2C%22flickr.com%22%2C%22facebook.com%22%2C%22twitter.com%22%2C%22reddit.com%22%2C%22plus.google.com%22%2C%22portal.msrc.microsoft.com%22%2C%22isc.sans.edu%22%2C%22outbrain.com%22%2C%22condenast.com%22%5D%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F%22%7D
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
SPDY
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
f7f87ad1e574e163dc9fa4790b0c663b7b9504aa2f300c554b15536acacd2506
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
via
1.1 google
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/javascript
alt-svc
clear
px.gif
p.skimresources.com/
43 B
105 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=4.362468653418324
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
35.190.91.160 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
160.91.190.35.bc.googleusercontent.com
Software
Skimlinks Pixel 1.0 /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
via
1.1 google
server
Skimlinks Pixel 1.0
p3p
policyref="http://skimlinks.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
status
200
content-type
image/gif
alt-svc
clear
content-length
43
px.gif
p.skimresources.com/
43 B
247 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=4.362468653418324
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
35.190.91.160 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
160.91.190.35.bc.googleusercontent.com
Software
Skimlinks Pixel 1.0 /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
via
1.1 google
server
Skimlinks Pixel 1.0
p3p
policyref="http://skimlinks.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
status
200
content-type
image/gif
alt-svc
clear
content-length
43
gpt.js
www.googletagservices.com/tag/js/
14 KB
6 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1525871700
Protocol
SPDY
Server
172.217.18.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s28-in-f2.1e100.net
Software
sffe /
Resource Hash
b52312d42920d6f25491658685660957f0e79aab1432807d79a82fafa5391975
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"4 / 197 of 1000 / last-modified: 1525831099"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
hq="googleads.g.doubleclick.net:443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
5815
x-xss-protection
1; mode=block
expires
Wed, 09 May 2018 13:23:49 GMT
apstag.js
c.amazon-adsystem.com/aax2/
46 KB
14 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1525871700
Protocol
HTTP/1.1
Server
52.222.147.52 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-147-52.fra53.r.cloudfront.net
Software
Server /
Resource Hash
89e14d9aaffbf04245445faa32b4168270a190bb04d096d05ac3b26bf3238eb7

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Tue, 08 May 2018 22:05:22 GMT
Content-Encoding
gzip
Server
Server
Age
55107
ETag
feaecc1ed9b39fc83b458261074f038b
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 4d1cbe225c5d30aa78ec9a6fa1ba4211.cloudfront.net (CloudFront)
Cache-Control
public, max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
X-Amz-Cf-Id
RfCovfhLY3fkPR4K-r_YDCsWUTApdUJvNzmuRZe5wK2lp1AaYikIQA==
arstechnica.js
player.cnevids.com/interlude/
55 KB
18 KB
Script
General
Full URL
https://player.cnevids.com/interlude/arstechnica.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1525871700
Protocol
HTTP/1.1
Server
54.230.14.213 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-14-213.ams1.r.cloudfront.net
Software
nginx/1.12.1 /
Resource Hash
f0a9f44ded1df0b5d0fab37c521d71c5ed4c711be8e3f5fd5274923979e3923c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:11 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
39
X-Cache
Hit from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
17398
X-XSS-Protection
1; mode=block
X-Request-Id
6a751db3-a6ad-4b9c-b671-714a5b386ccc
X-Runtime
0.008121
X-Backend-Node
10.110.61.188
Server
nginx/1.12.1
ETag
W/"3b37df3182983760826992c310f0e988"
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 1e075734d681989d6cd80021b52ec2d1.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
OZL87pKKBkG8BscMUoLC8EDn69FG_ArpR2ruZW_UmEqWK4z5lo170g==
yieldbot.intent.js
cdn.yldbt.com/js/
22 KB
8 KB
Script
General
Full URL
https://cdn.yldbt.com/js/yieldbot.intent.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1525871700
Protocol
HTTP/1.1
Server
52.222.148.125 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-148-125.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
e633f3055ecd55b7a5ea5b2b6721c39b8e93ac5f10a917671cd04d4b94b57273

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 25 Apr 2018 04:15:37 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Apr 2018 17:15:35 GMT
Server
AmazonS3
x-amz-meta-s3cmd-attrs
md5:250f56ed40fea7565c4d098c7bb309f6
Age
480
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript; charset=utf-8
Via
1.1 e1f6fa82d37f125cb361c7c37faf6662.cloudfront.net (CloudFront)
Cache-Control
max-age=3600
Transfer-Encoding
chunked
Connection
keep-alive
X-Amz-Cf-Id
1i7g8Lv3wlXo29SNFdmDUjJ5D3zbP1SMcrRTS8sx_BsVCou9Ultx3Q==
htw-condenast.js
js-sec.indexww.com/ht/
105 KB
30 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/htw-condenast.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1525871700
Protocol
HTTP/1.1
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
cb14a7637d6e3093b3f476c679eb237c07f21f07fb52fd13e87c5fb2eaccc131

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:49 GMT
Content-Encoding
gzip
Last-Modified
Wed, 09 May 2018 13:00:05 GMT
Server
Apache
ETag
"9029b6-1a523-56bc57b5a3811"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=2448
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
29971
Expires
Wed, 09 May 2018 14:04:37 GMT
conde-nast
segment-data.zqtk.net/
777 B
1 KB
Script
General
Full URL
https://segment-data.zqtk.net/conde-nast?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1525871700
Protocol
HTTP/1.1
Server
34.251.6.224 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-251-6-224.eu-west-1.compute.amazonaws.com
Software
nginx/1.1.19 /
Resource Hash
f74eac7bdf148111514cb870dea250be12ceca74970d0383ca011c9adcea660f

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:49 GMT
Expires
Fri, 11 May 2018 00:46:24 GMT
Last-Modified
Wed, 09 May 2018 00:46:24 GMT
Server
nginx/1.1.19
Connection
keep-alive
Content-Length
777
Content-Type
application/javascript; charset=UTF-8
conde-asa-polar-master.js
cdn.mediavoice.com/nativeads/script/condenastcorporate/
6 KB
3 KB
Script
General
Full URL
https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1525871700
Protocol
HTTP/1.1
Server
184.30.208.157 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-208-157.deploy.static.akamaitechnologies.com
Software
gunicorn/0.17.2 /
Resource Hash
3ad51aec388130903b94f0657d099a90a29a290071efbce121a76e3bfe833d06

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:49 GMT
Content-Encoding
gzip
Server
gunicorn/0.17.2
Vary
Accept-Encoding
X-Varnish
2401115526 2400935832
X-Country
DE
Cache-Control
max-age=13488
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
2619
https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F
cdn.accelerator.arsdev.net/h/
12 B
302 B
Script
General
Full URL
https://cdn.accelerator.arsdev.net/h/https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F?callback=arsData
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1525871700
Protocol
SPDY
Server
13.32.14.112 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-32-14-112.muc51.r.cloudfront.net
Software
nginx/1.4.6 (Ubuntu) / PHP/5.5.9-1ubuntu4.9
Resource Hash
18c4dfbdcbf664e92468c3a09814db7f114f9b393613e2cb077d81565d496f8d

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:32:32 GMT
via
1.1 12fba751c55ef6b8d428b89feaf8c356.cloudfront.net (CloudFront)
server
nginx/1.4.6 (Ubuntu)
age
12
x-powered-by
PHP/5.5.9-1ubuntu4.9
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
max-age=300, public
x-amz-cf-id
c0zNF4S3oKKy4MSTddN3nu964KydToHnOUa_LYgGm6O9c55yaBrcGg==
content
4d.condenastdigital.com/
3 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1525871700
Protocol
HTTP/1.1
Server
34.207.27.213 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-207-27-213.compute-1.amazonaws.com
Software
/
Resource Hash
c0dd7a26a729dd7d20691760eab1f6c5b2f515c4c2d54bf45d861a013550b97f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com

Response headers

Date
Wed, 09 May 2018 13:23:50 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
/
infinityid.condenastdigital.com/
36 B
917 B
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1525872229591
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1525871700
Protocol
HTTP/1.1
Server
34.202.134.243 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-202-134-243.compute-1.amazonaws.com
Software
/
Resource Hash
400ba64dafc66e638473e0aaf11ec8b6678906873d0cd1faf83809093c2dcc82

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com

Response headers

Date
Wed, 09 May 2018 13:23:50 GMT
Content-Encoding
gzip
Vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Expose-Headers
WWW-Authenticate,Server-Authorization
Cache-Control
no-cache
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
56
collect
stats.g.doubleclick.net/r/
Redirect Chain
  • https://ssl.google-analytics.com/r/__utm.gif?utmwv=5.7.2&utms=1&utmn=776023998&utmhn=arstechnica.com&utme=8(view*theme*logged_in*show_comments*is_subscriber)9(grid*light*false*false*false)&utmcs=UT...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-31997-1&cid=569429861.1525872230&jid=215240955&_v=5.7.2&z=776023998
35 B
113 B
Image
General
Full URL
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-31997-1&cid=569429861.1525872230&jid=215240955&_v=5.7.2&z=776023998
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
74.125.206.154 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
wk-in-f154.1e100.net
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Wed, 09 May 2018 13:23:49 GMT
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 09 May 2018 13:23:49 GMT
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
302
location
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-31997-1&cid=569429861.1525872230&jid=215240955&_v=5.7.2&z=776023998
content-type
text/html; charset=UTF-8
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
365
expires
Fri, 01 Jan 1990 00:00:00 GMT
i.js
tag.bounceexchange.com/2806/
273 KB
63 KB
Script
General
Full URL
https://tag.bounceexchange.com/2806/i.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/scripts/satellite-5a84580664746d080200085b.js
Protocol
SPDY
Server
52.222.156.165 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-156-165.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
9eb63dafb7a8832d65b2d843ed2f26a8181aa1d8790892005a57d99596b1af46

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 08 May 2018 19:29:52 GMT
content-encoding
gzip
last-modified
Tue, 08 May 2018 19:29:39 GMT
server
AmazonS3
age
64438
etag
"e8bd0fac7bf396c2d1295ad65a94d9cc"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
max-age=600, s-maxage=604800
accept-ranges
bytes
content-length
63590
via
1.1 0c23bed0dc9f1c700b571cf55c540239.cloudfront.net (CloudFront)
x-amz-cf-id
VhSfzCb-mj9J8fMuFWPajxwc8SFM1h1VHTxxeBJwpnZRBf5_RXom3Q==
PageName=Biz%20&amp;%20IT,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=
d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/
253 B
698 B
Script
General
Full URL
https://d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/PageName=Biz%20&amp;%20IT,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/scripts/satellite-5762fa5864746d7eef000ffb.js
Protocol
HTTP/1.1
Server
46.228.164.13 , United Kingdom, ASN56396 (TURN, GB),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
8c0544fa603e85b1d331d0060ba5b3d43a01e20904b9c4bb946990e8e66407fe

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:48 GMT
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Server
Apache-Coyote/1.1
P3P
policyref="/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
Content-Length
253
Content-Type
text/javascript;charset=UTF-8
plugin.js
plugin.mediavoice.com/
297 KB
111 KB
Script
General
Full URL
https://plugin.mediavoice.com/plugin.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
HTTP/1.1
Server
184.30.208.157 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-30-208-157.deploy.static.akamaitechnologies.com
Software
nginx/1.13.5 /
Resource Hash
1243b7cd98899edba2c4593b50ebecf00c4a8fdbcd9348e1f3a3dc85d73b7229

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:49 GMT
Content-Encoding
gzip
Content-Type
application/javascript
Connection
keep-alive
Content-Length
112872
Last-Modified
Mon, 07 May 2018 16:03:02 GMT
Server
nginx/1.13.5
ETag
W/"5af078b6-4a2c8"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET, OPTIONS
X-Varnish
2014527638 2014120669
Access-Control-Allow-Origin
*
Cache-Control
max-age=9553
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Wed, 09 May 2018 16:03:02 GMT
condenastcorporate
meraxes-cdn.polarmobile.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/
254 B
647 B
XHR
General
Full URL
https://meraxes-cdn.polarmobile.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/condenastcorporate
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
HTTP/1.1
Server
2.18.233.185 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
gunicorn/0.17.2 /
Resource Hash
0f3f2e0ce78f38cee63edee661e16100767600c9cf6208aa594e98a835a5b1f4

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com

Response headers

Date
Wed, 09 May 2018 13:23:49 GMT
Content-Encoding
gzip
Server
gunicorn/0.17.2
ETag
"4ed41fc03a3c3b67ac78af86ee19d7f1"
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=84802
X-Varnish
2921266397 2899822848
X-Country
DE
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
Authorization
Content-Length
183
all-ndg-6542596696.js
cdn.ndg.io/
3 KB
4 KB
Script
General
Full URL
https://cdn.ndg.io/all-ndg-6542596696.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
SPDY
Server
54.230.14.205 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-14-205.ams1.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
01193e9c0fa4806a4a6e7e83da289429e1e562b67aaa9c5a77d6609d927100d6

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 24 Apr 2018 15:11:22 GMT
via
1.1 3f03be33ba5b2f7bb50e3776d2f77f4f.cloudfront.net (CloudFront)
last-modified
Tue, 24 Apr 2018 15:08:02 GMT
server
AmazonS3
age
79920
etag
"3e690daa10ca109390e94eb7419a4666"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
3314
x-amz-cf-id
-Wnh1yNAP5pWdZe5Xy87iQsptNymN-8g14OFUvzn7toqcMJEFzgRjg==
ids
mid.rkdms.com/
78 B
721 B
XHR
General
Full URL
https://mid.rkdms.com/ids?ptk=17c1789b-e660-493b-aa74-3c8fb990dc5f&pubid=CONDENAST
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Server
35.153.11.94 Seattle, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-153-11-94.compute-1.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
4fd3333b0cbd9e6293d8e83695e958bc96cae829c12475fee1c136012cc7128a

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Date
Wed, 09 May 2018 13:23:50 GMT
Content-Encoding
gzip
Server
nginx/1.12.1
Vary
Origin
Content-Type
application/json;charset=UTF-8
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Expose-Headers
Content-Type
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
89
arstechnica.com
srv-2018-05-09-13.config.parsely.com/config/
388 B
806 B
Script
General
Full URL
https://srv-2018-05-09-13.config.parsely.com/config/arstechnica.com
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Server
52.201.40.242 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-201-40-242.compute-1.amazonaws.com
Software
/ Express
Resource Hash
27b7de498ae00a25ac005515b56f95237d519c60d783853334d5df1dac53be06

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:50 GMT
Cache-Control
private, no-cache
ETag
W/"184-StYJOMqShDaR9Q79tWMIeQ"
Connection
keep-alive
X-Powered-By
Express
Content-Length
388
Content-Type
text/javascript; charset=utf-8
integrator.js
adservice.google.de/adsid/
111 B
662 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Server
172.217.18.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s28-in-f2.1e100.net
Software
cafe /
Resource Hash
207461e411e1ff6d6c5b0dd702d26031adb86de86ed3f571baa5a6fc498fc4b6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 09 May 2018 13:23:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
hq="googleads.g.doubleclick.net:443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
105
x-xss-protection
1; mode=block
integrator.js
adservice.google.com/adsid/
111 B
662 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Server
172.217.18.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s28-in-f2.1e100.net
Software
cafe /
Resource Hash
207461e411e1ff6d6c5b0dd702d26031adb86de86ed3f571baa5a6fc498fc4b6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 09 May 2018 13:23:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
hq="googleads.g.doubleclick.net:443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
105
x-xss-protection
1; mode=block
pubads_impl_203.js
securepubads.g.doubleclick.net/gpt/
163 KB
58 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_203.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
SPDY
Server
172.217.23.130 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f130.1e100.net
Software
sffe /
Resource Hash
56845977a56747959a170550b800acd5b5ec5db345d953c1f4b8d94feac234e5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 02 May 2018 15:23:17 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
58861
x-xss-protection
1; mode=block
expires
Wed, 09 May 2018 13:23:49 GMT
local_storage_frame8.min.html
assets.bounceexchange.com/assets/bounce/ Frame 25F6
0
0
Document
General
Full URL
https://assets.bounceexchange.com/assets/bounce/local_storage_frame8.min.html
Requested by
Host: tag.bounceexchange.com
URL: https://tag.bounceexchange.com/2806/i.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.254.3 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-254-3.ams1.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
assets.bounceexchange.com
:scheme
https
:path
/assets/bounce/local_storage_frame8.min.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
2D5DECD46A8B57E996CBE47FA6383F74
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/

Response headers

status
200
content-type
text/html
content-length
921
date
Wed, 25 Apr 2018 15:03:14 GMT
last-modified
Fri, 30 Mar 2018 22:08:20 GMT
etag
"2e6f2e37b8e46560ef748ae24064e372"
cache-control
max-age=1200
content-encoding
gzip
x-amz-version-id
NryqOj8K_u7HHA0rqydjiFYRHhMpszG4
accept-ranges
bytes
server
AmazonS3
age
800
x-cache
Hit from cloudfront
via
1.1 b163f71436b4720ab1d0eafa590498ec.cloudfront.net (CloudFront)
x-amz-cf-id
BkIwpZ5qqy2VtHgdX-JByHptTlb8D7sIHzkFSO6t818VQhnPBpu1Kw==
/
infinityid.condenastdigital.com/
36 B
917 B
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1525872229894
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Server
34.202.134.243 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-202-134-243.compute-1.amazonaws.com
Software
/
Resource Hash
3ffb8b2fac0c50907b4c668e37ef000139e5b40cb886b50a95cc57bb166b7714

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:50 GMT
Content-Encoding
gzip
Vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Expose-Headers
WWW-Authenticate,Server-Authorization
Cache-Control
no-cache
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
56
content
4d.condenastdigital.com/
3 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Server
34.207.27.213 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-207-27-213.compute-1.amazonaws.com
Software
/
Resource Hash
c0dd7a26a729dd7d20691760eab1f6c5b2f515c4c2d54bf45d861a013550b97f

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:50 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A49.897Z&_t=library_sparrow&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3000&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&uNw=1&uUq=1&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&requestStart=598.1000009924173&requestEnd=979.6000011265278&init=1243.9000010490417&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.0.42.186 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-42-186.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A49.907Z&_t=loaded&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3000&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns&cns=2_25_2&feature_get_entries=true&feature_performance_now=true&cns_metrics=1_1_0&cns_metrics_sparrow=1_2_0&_logType=info&cns_ads=2.18.2&cns_ads_ars_accelerator=0.2.0&cns_ads_amazon_match_buy=1.0.1&cns_ads_cne_interlude=1.0.0&cns_ads_yieldbot=0.1.6&cns_ads_adobe_audience_manager=1.0.0&cns_ads_index_exchange=1.2.2&cns_ads_proximic=0.1.2&cns_ads_4d=0.5.1&cns_ads_polar=0.2.0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.0.42.186 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-42-186.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A49.911Z&_t=library_service&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3000&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&init=596.2000004947186&requestEnd=541.100000962615&requestStart=490.80000072717667&device=desktop&cns=2_25_2&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.0.42.186 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-42-186.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A49.914Z&_t=page_created&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3000&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&channel=default&slots_count=6&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.0.42.186 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-42-186.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
asynctracker.js
fallsm.ndg.io/
0
0
Script
General
Full URL
https://fallsm.ndg.io/asynctracker.js?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&uid=3746715519&ctz=US%2FEastern&referrer=&is_canonical=1&canonical_url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&_fp=
Requested by
Host: cdn.ndg.io
URL: https://cdn.ndg.io/all-ndg-6542596696.js
Protocol
SPDY
Server
54.84.139.180 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-84-139-180.compute-1.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

status
403
date
Wed, 09 May 2018 13:23:50 GMT
content-encoding
gzip
server
nginx/1.10.3 (Ubuntu)
x-frame-options
SAMEORIGIN
content-type
text/html; charset=utf-8
autotrack.min.js
cdn.ndg.io/shared/
3 KB
3 KB
Script
General
Full URL
https://cdn.ndg.io/shared/autotrack.min.js?
Requested by
Host: cdn.ndg.io
URL: https://cdn.ndg.io/all-ndg-6542596696.js
Protocol
SPDY
Server
54.230.14.205 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-14-205.ams1.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
c298545ec7fb0e28515a10b056cfa194e84e0d2d162362f530b6716914d980e9

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 24 Apr 2018 15:11:19 GMT
via
1.1 3f03be33ba5b2f7bb50e3776d2f77f4f.cloudfront.net (CloudFront)
last-modified
Wed, 14 Feb 2018 10:09:48 GMT
server
AmazonS3
age
79936
etag
"7222e7d15f19da587b48cbf389878cff"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
2946
x-amz-cf-id
1bSJqpkyYw3Wq9fjtqdTcNh--tMdIKUQ-U17A9B_Jzoh-tXlltIGTQ==
show_companion_ad.js
pagead2.googlesyndication.com/pagead/
165 KB
61 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_companion_ad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_203.js
Protocol
SPDY
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
ac04c55923be9699d5471e42e829f91ca9a2f9f2322a26e6dde758d85c233029
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:09:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
881
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
hq="googleads.g.doubleclick.net:443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
61781
x-xss-protection
1; mode=block
server
cafe
etag
3919542960059380424
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Wed, 09 May 2018 14:09:08 GMT
get
odb.outbrain.com/utils/
986 B
1020 B
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=http%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&srcUrl=http%3A%2F%2Ffeeds.arstechnica.com%2Farstechnica%2Findex%2F&settings=true&recs=true&widgetJSId=JS_1&key=NANOWDGT01&idx=0&version=01003302&ref=&apv=false&sig=0dV2GI8h&format=vjapi&rand=65982&winW=1600&winH=1200&adblck=false&secured=true
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1525872229339
Protocol
SPDY
Server
151.101.14.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
0dc14f8cc3d67ee1f2b67ccfaf03883db2e9063566de28935b5b15c9e210447d
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, FRA, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-cache-hits
0, 0
x-served-by
cache-jfk8146-JFK, cache-fra19138-FRA
pragma
no-cache
x-timer
S1525872230.993830,VS0,VE88
date
Wed, 09 May 2018 13:23:50 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
no-cache
backend-ip
104.156.90.46
accept-ranges
bytes, bytes
expires
Thu, 01 Jan 1970 00:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A50.041Z&_t=library_gpt&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3000&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&init=1388.1999999284744&requestEnd=1074.3000004440546&requestStart=933.4999993443489&device=desktop&cns=2_25_2&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.0.42.186 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-42-186.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
link
t.skimresources.com/api/
22 B
526 B
XHR
General
Full URL
https://t.skimresources.com/api/link
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
HTTP/1.1
Server
54.154.30.221 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-30-221.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:50 GMT
X-Content-Type-Options
nosniff
Server
nginx/1.12.2
Access-Control-Allow-Methods
GET, POST
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
Content-Length
22
track.php
t.skimresources.com/api/
22 B
526 B
XHR
General
Full URL
https://t.skimresources.com/api/track.php
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
HTTP/1.1
Server
54.154.30.221 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-30-221.eu-west-1.compute.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:50 GMT
X-Content-Type-Options
nosniff
Server
nginx/1.12.2
Access-Control-Allow-Methods
GET, POST
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, must-revalidate
Connection
keep-alive
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
Content-Length
22
rd
dpm.demdex.net/id/
5 KB
2 KB
XHR
General
Full URL
https://dpm.demdex.net/id/rd?d_visid_ver=2.1.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_verify=1&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1525872229504
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.25.247.124 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-25-247-124.us-west-2.compute.amazonaws.com
Software
/
Resource Hash
d5ddecf530f540851c74e6005844951fd1eef555cc9abd0a27172f1a2556e94f

Request headers

X-DevTools-Emulate-Network-Conditions-Client-Id
2D5DECD46A8B57E996CBE47FA6383F74
Origin
https://arstechnica.com
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
usw2-prod-dcs-067546b72.edge-usw2.demdex.com 5.28.4.20180427090211 5ms
Pragma
no-cache
Date
Wed, 09 May 2018 13:23:50 GMT
Content-Encoding
gzip
X-TID
r59BC48KS3Y=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=UTF-8
Content-Length
1353
Expires
Thu, 01 Jan 2009 00:00:00 GMT
user
4d.condenastdigital.com/
46 B
410 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=04eab683-69ee-407d-a274-24f2c9e8b5c7
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1525871700
Protocol
HTTP/1.1
Server
34.207.27.213 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-207-27-213.compute-1.amazonaws.com
Software
/
Resource Hash
c76fb0e575a69c82b6a95b01d2822dc808c588c6b3f923c5d8305a48c49ef159

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com

Response headers

Date
Wed, 09 May 2018 13:23:50 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
Cookie set dest5.html
condenast.demdex.net/ Frame 5CD4
0
0
Document
General
Full URL
https://condenast.demdex.net/dest5.html?d_nsid=0
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.113.202 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-113-202.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
condenast.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Accept-Encoding
gzip, deflate
Cookie
demdex=75449697975556017190265652984919235276
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
2D5DECD46A8B57E996CBE47FA6383F74
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Date
Wed, 09 May 2018 13:23:50 GMT
DCS
irl1-prod-dcs-001cb4c9f.edge-irl1.demdex.com 5.29.1.20180508083900 0ms
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Wed, 09 May 2018 12:58:48 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Set-Cookie
demdex=75449697975556017190265652984919235276;Path=/;Domain=.demdex.net;Expires=Mon, 05-Nov-2018 13:23:50 GMT
Vary
Accept-Encoding, User-Agent
X-TID
icI5vk4kSSM=
Content-Length
2944
Connection
keep-alive
id
sstats.arstechnica.com/
49 B
464 B
XHR
General
Full URL
https://sstats.arstechnica.com/id?d_visid_ver=2.1.0&d_fieldgroup=A&mcorgid=F7093025512D2B690A490D44%40AdobeOrg&mid=75639448217025612620279874398121678357&ts=1525872230459
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.41.50 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
arstechnica.com.ssl.d1.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
47da1bc9b24d1dd68fa30c54b8e2405249721303ba3fc74e929cdb49307c21b5

Request headers

Pragma
no-cache
Origin
https://arstechnica.com
Accept-Encoding
gzip, deflate
Host
sstats.arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-Type
application/x-www-form-urlencoded
Accept
*/*
Cache-Control
no-cache
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Cookie
session_seen_posts=0; seen_posts=; __utma=199748606.569429861.1525872230.1525872230.1525872230.1; __utmc=199748606; __utmz=199748606.1525872230.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1; __utmb=199748606.1.10.1525872230; bounceClientVisit2806v=N4IgNgDiBcIBYBcEQM4FIDMBBNAmAYnvgIYBOKCApgMZwB2AltcQHTUD2AtkQ3QGbtSnYggbs6AWiq067MOwDmATyK4ADAEYAHETUBWIpyal2KdnwQSII2pRQTqpBqOZgJAd14ATdu-sAjAFcFCWJqUQA3SjAlCUoADwh5Z0ovCV4pOEoPBjAvIhAAGhBSGBAQAF8gA; sID=9b611b70-bf59-43e5-a006-6722f4e89597
Connection
keep-alive
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Wed, 09 May 2018 13:23:50 GMT
Server
Omniture DC/2.0.0
xserver
www85
Vary
Origin
Access-Control-Allow-Methods
GET, POST, DELETE
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/x-javascript
Keep-Alive
timeout=15
Content-Length
49
X-C
ms-6.2.1
ibs:dpid=411&dpuuid=WvL2ZgAAAqhJSgH6
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=75449697975556017190265652984919235276
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=WvL2ZgAAAqhJSgH6
42 B
766 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=411&dpuuid=WvL2ZgAAAqhJSgH6
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.25.247.124 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-25-247-124.us-west-2.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

DCS
usw2-prod-dcs-30460028.edge-usw2.demdex.com 5.28.4.20180427090211 3ms
Pragma
no-cache
Date
Wed, 09 May 2018 13:23:50 GMT
X-TID
J2bXyyudSbg=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 2009 00:00:00 GMT

Redirect headers

Date
Wed, 09 May 2018 13:23:49 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://dpm.demdex.net/ibs:dpid=411&dpuuid=WvL2ZgAAAqhJSgH6
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
user
4d.condenastdigital.com/
46 B
410 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=3bad4371-45ef-4a9a-84eb-66044ffe0b21
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Server
54.164.243.144 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-164-243-144.compute-1.amazonaws.com
Software
/
Resource Hash
74c2299ee9ef506fa014378ba6cd4c04785c123fcc95d144d0ddc02f2fdb7cf9

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:50 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
ptrack-v0.9.2-engaged-time-slots.js
d1z2jf7jlzjs58.cloudfront.net/code/
32 KB
13 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/code/ptrack-v0.9.2-engaged-time-slots.js
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Server
52.222.149.25 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-149-25.fra53.r.cloudfront.net
Software
nginx /
Resource Hash
8fe842540af65172e5aab06e18a6e005b3a8b2eab0e47287aca3f825bb3f8098

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
public
Date
Fri, 08 Dec 2017 15:06:23 GMT
Content-Encoding
gzip
Last-Modified
Wed, 31 May 2017 21:31:10 GMT
Server
nginx
Age
13126647
ETag
W/"592f361e-7f14"
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 23082ff4de65f70078e091bc7cd0cf24.cloudfront.net (CloudFront)
Cache-Control
max-age=315360000, public
Connection
keep-alive
X-Amz-Cf-Id
S_Od4KDDVX9OnRbEi1ABA4eingzrgNSJaPQK5ySb29xSHHWPqGUVlg==
Expires
Thu, 31 Dec 2037 23:55:55 GMT
/
srv-2018-05-09-13.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2018-05-09-13.pixel.parsely.com/plogger/?rand=1525872230485&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%22d404f802-ea79-42cb-ae43-cd76e8396b3a%22%2C%22parsely_site_uuid%22%3A%228e97969b-76e9-4d43-9046-28f5049b59fd%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&sref=&sts=1525872230482&slts=0&title=Critical+Windows+bug+fixed+today+is+actively+being+exploited+to+hack+users+%7C+Ars+Technica&date=Wed+May+09+2018+13%3A23%3A50+GMT%2B0000+(UTC)&action=pageview
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.204.137.72 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-204-137-72.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:50 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
event
condenast.demdex.net/
5 KB
2 KB
Script
General
Full URL
https://condenast.demdex.net/event?d_nsid=0&d_ld=_ts%3D1525872230546&d_rtbd=json&d_jsonv=1&d_dst=1&d_cb=demdexRequestCallback_0_1525872230546&c_pageName=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&c_channel=Biz%20%26amp%3B%20IT&c_events=event2%2Cevent28&c_eVar2=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&c_prop3=D%3Dv3&c_eVar3=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&c_prop4=D%3Dv4&c_eVar4=1306129&c_prop5=D%3Dv5&c_eVar5=report&c_prop6=D%3Dv6&c_eVar6=Biz%20%26amp%3B%20IT&c_prop7=D%3Dv7&c_eVar7=Biz%20%26amp%3B%20IT%2Fundefined&c_prop11=D%3Dv11&c_eVar11=9%3A23%20AM%7CWednesday&c_prop16=not%20logged%20in&c_eVar16=not%20logged%20in&c_prop17=1&c_eVar17=1&c_prop23=D%3Dv23&c_eVar23=New&c_prop32=D%3Dv32&c_eVar32=1&c_prop44=D%3Dv44&c_eVar44=null&c_prop50=exploits%7Cmicrosoft-3%7Cpatch-tuesday%7Cvulnerabilities%7Cwindows%7Ctype%3A%20report&c_prop51=D%3Dv51&c_eVar51=desktop%20layout%3A1600x1200&c_prop55=D%3Dv55&c_eVar55=Dan%20Goodin&c_prop56=D%3Dv56&c_eVar56=0.8&c_prop60=D%3Dv60&c_eVar60=581&c_prop61=D%3Dv61&c_eVar61=12h%7C0d&c_prop62=D%3Dv62&c_eVar62=2018-05-09T00%3A45%3A33%2B00%3A00&c_prop65=D%3Dv65&c_eVar65=null
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/s-code-contents-566dcf5046f148f38d0aa32bf73df40db7ae7768.js
Protocol
HTTP/1.1
Server
52.212.113.202 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-113-202.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
c5442e4c5b2cca6f945e626ebff2bf21e8e47b8c470cde4d80f556f8869e9e70

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

DCS
irl1-prod-dcs-8a1d8201.edge-irl1.demdex.com 5.29.1.20180508083900 8ms
Pragma
no-cache
Date
Wed, 09 May 2018 13:23:50 GMT
Content-Encoding
gzip
X-TID
dc/9k9zKSfQ=
Vary
Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
application/javascript; charset=UTF-8
Content-Length
1327
Expires
Thu, 01 Jan 2009 00:00:00 GMT
s47540543334460
sstats.arstechnica.com/b/ss/conde-arstechnica/1/JS-1.4.1-D7QN/
43 B
550 B
Image
General
Full URL
https://sstats.arstechnica.com/b/ss/conde-arstechnica/1/JS-1.4.1-D7QN/s47540543334460?AQB=1&ndh=1&pf=1&t=9%2F4%2F2018%2013%3A23%3A50%203%200&D=D%3D&mid=75639448217025612620279874398121678357&aamlh=9&ce=UTF-8&ns=condenast&pageName=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&g=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cc=USD&ch=Biz%20%26amp%3B%20IT&events=event2%2Cevent28&aamb=RKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y&v2=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&l2=exploits%7Cmicrosoft-3%7Cpatch-tuesday%7Cvulnerabilities%7Cwindows%7Ctype%3A%20report&c3=D%3Dv3&v3=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&c4=D%3Dv4&v4=1306129&c5=D%3Dv5&v5=report&c6=D%3Dv6&v6=Biz%20%26amp%3B%20IT&c7=D%3Dv7&v7=Biz%20%26amp%3B%20IT%2Fundefined&c11=D%3Dv11&v11=9%3A23%20AM%7CWednesday&c16=not%20logged%20in&v16=not%20logged%20in&c17=1&v17=1&c23=D%3Dv23&v23=New&c32=D%3Dv32&v32=1&c44=D%3Dv44&v44=null&c50=exploits%7Cmicrosoft-3%7Cpatch-tuesday%7Cvulnerabilities%7Cwindows%7Ctype%3A%20report&c51=D%3Dv51&v51=desktop%20layout%3A1600x1200&c55=D%3Dv55&v55=Dan%20Goodin&c56=D%3Dv56&v56=0.8&c60=D%3Dv60&v60=581&c61=D%3Dv61&v61=12h%7C0d&c62=D%3Dv62&v62=2018-05-09T00%3A45%3A33%2B00%3A00&c65=D%3Dv65&v65=null&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.41.50 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
arstechnica.com.ssl.d1.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
sstats.arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Cookie
session_seen_posts=0; seen_posts=; __utma=199748606.569429861.1525872230.1525872230.1525872230.1; __utmc=199748606; __utmz=199748606.1525872230.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1; __utmb=199748606.1.10.1525872230; bounceClientVisit2806v=N4IgNgDiBcIBYBcEQM4FIDMBBNAmAYnvgIYBOKCApgMZwB2AltcQHTUD2AtkQ3QGbtSnYggbs6AWiq067MOwDmATyK4ADAEYAHETUBWIpyal2KdnwQSII2pRQTqpBqOZgJAd14ATdu-sAjAFcFCWJqUQA3SjAlCUoADwh5Z0ovCV4pOEoPBjAvIhAAGhBSGBAQAF8gA; sID=9b611b70-bf59-43e5-a006-6722f4e89597; _parsely_session={%22sid%22:1%2C%22surl%22:%22https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/%22%2C%22sref%22:%22%22%2C%22sts%22:1525872230482%2C%22slts%22:0}; _parsely_visitor={%22id%22:%228e97969b-76e9-4d43-9046-28f5049b59fd%22%2C%22session_count%22:1%2C%22last_session_ts%22:1525872230482}; s_depth=1; s_vnum_m=1527811200542%26vn%3D1; sinvisit_m=true; s_ppn=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F; s_nr=1525872230542-New; s_cc=true
Connection
keep-alive
Cache-Control
no-cache
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:50 GMT
X-C
ms-6.2.1
P3P
CP="This is not a P3P policy"
Connection
Keep-Alive
Content-Length
43
Pragma
no-cache
Last-Modified
Thu, 10 May 2018 13:23:50 GMT
Server
Omniture DC/2.0.0
xserver
www161
ETag
"3276785662949392384-5976418628956880866"
Vary
*
Content-Type
image/gif
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Keep-Alive
timeout=15
Expires
Tue, 08 May 2018 13:23:50 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A50.608Z&_t=slot_staged&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3000&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&created=1950.6999999284744&staged=1955.299999564886&pageload_to_staged=1955.299999564886&channel=default&ctx_template=article&id=1525872230603rk00n6uawzwepwkt3fvfbkitgt3ovc&instance=0&name=post_nav_0&position_fold=atf&position_xy=0x0&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&type=post_nav&CNS_init=596.2000004947186&CNS_init_to_staged=1359.0999990701675&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.0.42.186 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-42-186.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
bid
aax.amazon-adsystem.com/e/dtb/
143 B
459 B
XHR
General
Full URL
https://aax.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pid=9156987771211525872229695&cb=1621123801131525872230615&ws=1600x1200&v=7.0.0&t=2000&slots=%5B%7B%22sd%22%3A%22cns_ads_1525872230603RK00n6UAwzwepWKt3FVfbkITgT3ovC_post_nav_0_container%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%5D%7D%5D&cfgv=0
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Server
52.94.220.16 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
Server /
Resource Hash
b5eb09d84d4b75c3644b6980ff989592c3050029c0e6c067597459d9f5e4755f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com

Response headers

Date
Wed, 09 May 2018 13:23:50 GMT
Content-Encoding
gzip
Server
Server
Vary
Accept-Encoding,User-Agent
Content-Type
text/javascript;charset=UTF-8
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
145
init
i.yldbt.com/m/1473/v1/
144 B
458 B
Script
General
Full URL
https://i.yldbt.com/m/1473/v1/init?cb=yieldbot.updateState&v=v2018-04-24%7Cadc808d&vi=jgz4xgbfcmifrywdcl&si=jgz4xgbfnrxev4q5ko&pvi=jgz4xgbe1uqmo2sqtb&pvd=1&nv&sn=leaderboard%7Cmedrec&ssz=%7C300x250.300x600&lo=https%3A//arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/&r=&sd=1600x1200&to=0&la=en-US&np=Linux%20x86_64&ua=Mozilla/5.0%20%28X11%3B%20Linux%20x86_64%29%20AppleWebKit/537.36%20%28KHTML%2C%20like%20Gecko%29%20HeadlessChrome/66.0.3359.139%20Safari/537.36&cts_ns=1525872228652&cts_js=1525872229737&cts_ini=1525872230619&e
Requested by
Host: cdn.yldbt.com
URL: https://cdn.yldbt.com/js/yieldbot.intent.js
Protocol
SPDY
Server
54.230.14.115 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-14-115.ams1.r.cloudfront.net
Software
Cowboy /
Resource Hash
62e7b6e91ae2ffa193fe66863b4aba15b1758df9f890bad04fb088c159785cc7
Security Headers
Name Value
Strict-Transport-Security max-age=0

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 12:46:05 GMT
via
1.1 026d3deac8a2b7a03c8c64b55e41365e.cloudfront.net (CloudFront)
server
Cowboy
age
2265
strict-transport-security
max-age=0
x-cache
Hit from cloudfront
content-type
text/javascript; charset=utf-8
status
200
cache-control
max-age=3600
access-control-allow-credentials
true
content-length
144
x-amz-cf-id
h4IKQfJ_69vs7R5QwAZa1bI5O43K5NcIqs2MZXP_MEU7wbh98LTcWQ==
ADTECH;cmd=bid;cors=yes;v=2;misc=1525872230621;callback=window.headertag.AolHtb.adResponseCallbacks._CAvGKgAv;
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/
48 B
259 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1525872230621;callback=window.headertag.AolHtb.adResponseCallbacks._CAvGKgAv;
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
SPDY
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
84f31b2ab480bd00e9f59c09fe61c068ee695b78e97e955f37bfdb03616e056b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 09 May 2018 13:23:50 GMT
server
nginx
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
48
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cmd=bid;cors=yes;v=2;misc=1525872230622;callback=window.headertag.AolHtb.adResponseCallbacks._h8IWt3rZ;
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/
48 B
81 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1525872230622;callback=window.headertag.AolHtb.adResponseCallbacks._h8IWt3rZ;
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
SPDY
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
f0c5daa45b17cba2233e746dd10448e764073e2971face5745d3c793cf43c416

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 09 May 2018 13:23:50 GMT
server
nginx
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
48
expires
Mon, 15 Jun 1998 00:00:00 GMT
cygnus
as-sec.casalemedia.com/
66 B
1003 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=175689&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A58177433%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%221%22%2C%22siteID%22%3A%22175689%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%222%22%2C%22siteID%22%3A%22175690%22%7D%2C%22id%22%3A%222%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%223%22%2C%22siteID%22%3A%22175691%22%7D%2C%22id%22%3A%223%22%7D%5D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
fd73c29d533018f351c5c6f62b197886ad38aa9a5f516ee121ad78d0d4fe4669

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:50 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Wed, 09 May 2018 13:23:50 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A50.624Z&_t=slot_staged&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3000&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&created=1952.5000005960464&staged=1971.2000004947186&pageload_to_staged=1971.2000004947186&channel=default&ctx_template=article&id=1525872230605ilgvwarj5eezky712hqshcbw3j8qm7&instance=0&name=siderail_0&position_fold=atf&position_xy=0x0&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&type=siderail&CNS_init=596.2000004947186&CNS_init_to_staged=1375&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.0.42.186 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-42-186.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
bid
aax.amazon-adsystem.com/e/dtb/
143 B
461 B
XHR
General
Full URL
https://aax.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pid=9156987771211525872229695&cb=8554383956961525872230629&ws=1600x1200&v=7.0.0&t=2000&slots=%5B%7B%22sd%22%3A%22cns_ads_1525872230605ILgvwArj5eeZKy712hqSHCbw3j8Qm7_siderail_0_container%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%7D%5D&cfgv=0
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Server
52.94.220.16 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
Server /
Resource Hash
fdf165d764d1971e1f819afdf9bd9faf8b23fd0d40cf8c199c335cd7cea54696

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com

Response headers

Date
Wed, 09 May 2018 13:23:50 GMT
Content-Encoding
gzip
Server
Server
Vary
Accept-Encoding,User-Agent
Content-Type
text/javascript;charset=UTF-8
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
147
ADTECH;cmd=bid;cors=yes;v=2;misc=1525872230630;callback=window.headertag.AolHtb.adResponseCallbacks._pkDA2Pfl;
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/
47 B
80 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1525872230630;callback=window.headertag.AolHtb.adResponseCallbacks._pkDA2Pfl;
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
SPDY
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
8bcead737dd7db3f336d34e1ae7e7cc379e796cf46c6db2816e5dc81d57a5abc

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 09 May 2018 13:23:50 GMT
server
nginx
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
47
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cmd=bid;cors=yes;v=2;misc=1525872230631;callback=window.headertag.AolHtb.adResponseCallbacks._zQhKeccA;
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/
48 B
81 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1525872230631;callback=window.headertag.AolHtb.adResponseCallbacks._zQhKeccA;
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
SPDY
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
41fef7c744f91dede6623023d97dd57b26d36376157a9e2520b3a8b735ef4092

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 09 May 2018 13:23:50 GMT
server
nginx
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
48
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cmd=bid;cors=yes;v=2;misc=1525872230631;callback=window.headertag.AolHtb.adResponseCallbacks._uiTKD4P8;
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704181/0/-1/
48 B
81 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704181/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1525872230631;callback=window.headertag.AolHtb.adResponseCallbacks._uiTKD4P8;
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
SPDY
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
feca9e8477ba8163277714d6ac87c2cb936cd17a1f2e7a2529cb98c3057ba2f5

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 09 May 2018 13:23:50 GMT
server
nginx
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
content-type
application/json
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
48
expires
Mon, 15 Jun 1998 00:00:00 GMT
cygnus
as-sec.casalemedia.com/
66 B
1003 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=175689&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A88472474%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2210%22%2C%22siteID%22%3A%22175698%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2211%22%2C%22siteID%22%3A%22175699%22%7D%2C%22id%22%3A%222%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A1050%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2212%22%2C%22siteID%22%3A%22175700%22%7D%2C%22id%22%3A%223%22%7D%5D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
b619c8ed5f759c930d0f4ad250e451f23abaf77b9a0923db8ddd6918aa52ce61

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:50 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Wed, 09 May 2018 13:23:50 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A50.632Z&_t=slot_staged&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3000&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&created=1953.099999576807&staged=1979.399999603629&pageload_to_staged=1979.399999603629&channel=default&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=41x0&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&type=native_xrail&CNS_init=596.2000004947186&CNS_init_to_staged=1383.1999991089106&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.0.42.186 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-42-186.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A50.637Z&_t=slot_staged&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3000&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&created=1953.7000004202127&staged=1984.6000000834465&pageload_to_staged=1984.6000000834465&channel=default&ctx_template=article&id=1525872230607oitsqrtmcfyxplehqxkvlgsk41afn9&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&type=out_of_page&CNS_init=596.2000004947186&CNS_init_to_staged=1388.399999588728&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.0.42.186 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-42-186.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A50.653Z&_t=pageview&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3000&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=general&xID=3bad4371-45ef-4a9a-84eb-66044ffe0b21&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=175689&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&v=2
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:50 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Wed, 09 May 2018 13:23:50 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=175689&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&v=2
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Server
2.18.234.21 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:50 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Wed, 09 May 2018 13:23:50 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A50.831Z&_t=slot_requested&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3000&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&aam_uuid=75449697975556017190265652984919235276&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=3bad4371-45ef-4a9a-84eb-66044ffe0b21&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&created=1952.5000005960464&staged=1971.2000004947186&pageload_to_staged=1971.2000004947186&channel=default&ctx_template=article&id=1525872230605ilgvwarj5eezky712hqshcbw3j8qm7&instance=0&name=siderail_0&position_fold=atf&position_xy=0x0&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&type=siderail&CNS_init=596.2000004947186&suffix=dart&CNS_init_to_staged=1375&inViewport=1976.5000008046627&pageLoad_to_in_viewport=1380.3000003099442&isRefresh=true&is_first_Request=true&requested=2178.3000007271767&pageLoad_to_requested=2178.3000007271767&CNS_init_to_requested=1582.1000002324581&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
Cookie set iu3
aax-eu.amazon-adsystem.com/s/ Frame AEAB
Redirect Chain
  • https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_ppt_ox_dm_pm_an
  • https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_ppt_ox_dm_pm_an&dcc=t
0
0
Document
General
Full URL
https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_ppt_ox_dm_pm_an&dcc=t
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.94.220.16 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
Server /
Resource Hash

Request headers

Host
aax-eu.amazon-adsystem.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Accept-Encoding
gzip, deflate
Cookie
ad-id=A3OYHfWWQUrQr5IP7WlmbFw|t
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
2D5DECD46A8B57E996CBE47FA6383F74
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/

Response headers

Server
Server
Date
Wed, 09 May 2018 13:23:51 GMT
Content-Type
text/html;charset=ISO-8859-1
Content-Length
198
Connection
keep-alive
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Pragma
no-cache
Expires
Thu, 01 Jan 1970 00:00:00 GMT
p3p
policyref="https://www.amazon.com/w3c/p3p.xml", CP="PSAo PSDo OUR SAM OTR DSP COR"
Set-Cookie
ad-id=A3OYHfWWQUrQr5IP7WlmbFw; Domain=.amazon-adsystem.com; Expires=Tue, 01-Jan-2019 13:23:50 GMT; Path=/ ad-privacy=0; Domain=.amazon-adsystem.com; Expires=Tue, 01-Jan-2019 13:23:51 GMT; Path=/
Vary
Accept-Encoding,User-Agent
Content-Encoding
gzip

Redirect headers

Server
Server
Date
Wed, 09 May 2018 13:23:50 GMT
Content-Length
0
Connection
keep-alive
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Pragma
no-cache
Expires
Thu, 01 Jan 1970 00:00:00 GMT
p3p
policyref="https://www.amazon.com/w3c/p3p.xml", CP="PSAo PSDo OUR SAM OTR DSP COR"
Location
https://aax-eu.amazon-adsystem.com/s/iu3?cm3ppd=1&d=dtb-pub&csif=t&dl=rbd_brt_ppt_ox_dm_pm_an&dcc=t
Set-Cookie
ad-id=A3OYHfWWQUrQr5IP7WlmbFw|t; Domain=.amazon-adsystem.com; Expires=Tue, 01-Jan-2019 13:23:50 GMT; Path=/
Vary
User-Agent
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A50.844Z&_t=slot_requested&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3000&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&aam_uuid=75449697975556017190265652984919235276&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=3bad4371-45ef-4a9a-84eb-66044ffe0b21&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&created=1950.6999999284744&staged=1955.299999564886&pageload_to_staged=1955.299999564886&channel=default&ctx_template=article&id=1525872230603rk00n6uawzwepwkt3fvfbkitgt3ovc&instance=0&name=post_nav_0&position_fold=atf&position_xy=0x0&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&type=post_nav&CNS_init=596.2000004947186&suffix=dart&CNS_init_to_staged=1359.0999990701675&inViewport=1961.3000005483627&pageLoad_to_in_viewport=1365.1000000536442&isRefresh=true&requested=2191.7000003159046&pageLoad_to_requested=2191.7000003159046&CNS_init_to_requested=1595.499999821186&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.0.42.186 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-42-186.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:50 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
ads
securepubads.g.doubleclick.net/gampad/
14 KB
5 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&correlator=2573042101729735&output=json_html&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&hxva=1&scor=1111979473344179&eid=21061458&vrg=203&tfcd=0&guci=1.2.0.0.2.2&sc=1&sfv=1-0-23&iu_parts=3379%2Cars.dart%2Cdefault&enc_prev_ius=0%2F1%2F2%2C0%2F1%2F2%2C0%2F1%2F2&prev_iu_szs=1x1%2C300x250%7C300x600%7C300x1050%2C728x90%7C970x66%7C970x250%7C930x400%7C932x372%7C970x90%7C970x418%7C9x1%7C9x3%7C9x9%7C1200x372&fsbs=1%2C1%2C1&prev_scp=%7Cctx_slot_name%3Dsiderail_0%26ctx_slot_instance%3Dsiderail_0%26ctx_slot_type%3Dsiderail%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%26vnd_ylbt_data%3Dn%26vnd_amzn_amznbid%3D2%26vnd_amzn_size%3D0x0%26amznbid%3D2%26amznp%3D2%7Cctx_slot_name%3Dpost_nav_0%26ctx_slot_instance%3Dpost_nav_0%26ctx_slot_type%3Dpost_nav%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%26vnd_ylbt_data%3Dn%26vnd_amzn_amznbid%3D2%26vnd_amzn_size%3D0x0&eri=1&cust_params=env_device_type%3Ddesktop%26env_server%3Dproduction%26rdt_device_template%3Ddesktop_article%26cnt_tags%3Dsection_information-technology%252Cdiscipline%252Chacking-2%252Cwindows-8%252Cdefault%252Cexploits%252Cmicrosoft-3%252Cpatch-tuesday%252Cvulnerabilities%252Cwindows%26usr_bkt_pv%3D24%26ctx_cns_version%3D2_25_2%26vnd_prx_segments%3D300003%252C131100%252C131103%252C121100%252C131118%252C131127%252C210001%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C0co3q9%252Cdhui4r%252Cwmhp4i%252C2hkgm5%252Cfdf1wd%252Cb08ry4%252C36vte1%252C5sx0hb%252C1frz43%252C6f173a%252C_B5isrn97Cl6_%26vnd_4d_ctx_topics%3DALLBRANDS_167%252CALLBRANDS_28%26vnd_4d_ctx_topic_sc%3D0.6920262436522664%252C0.10349567539731558%26vnd_4d_ctx_entities%3Dmicrosoft%252Cwindows%252Ckaspersky%2520lab%252Cdan%2520goodin%252Cutc%252Cars%2520orbital%2520transmission%252Canton%2520ivanov%252Cinternet%2520explorer%252Csans%2520institute%252Cazure%2520iot%2520sdk%26vnd_4d_ctx_ent_sc%3D1%252C0.7284355509011137%252C0.6092096796994252%252C0.4007397229375761%252C0.3706790067361101%252C0.29669238171347656%252C0.2900696709157858%252C0.25053502104436054%252C0.2441424923942869%252C0.22164167356032832%26vnd_4d_ctx_keywords%3Dmicrosoft%252Cvulnerability%252Cwindows%252Cattacker%252Ckaspersky%2520lab%252Clatest%2520patch%2520tuesday%252Cuse-after-free%2520flaw%252Cuser%252Cdan%2520goodin%252Cutc%252Cfix%252Cseparate%2520vulnerability.%252Ccve-2018-8174%252Cofficial%252Cfront%2520page%2520layout%252Cexploit%252Cprivilege%252Ccomputer%252Cunwitting%2520users.%252Cprivilege-escalation%2520flaw%252Cwebsite%26vnd_4d_ctx_kw_sc%3D1%252C0.7584320270763975%252C0.7284355509011137%252C0.6223293859789486%252C0.6092096796994252%252C0.5352745350834834%252C0.5281770081314667%252C0.5081770402472439%252C0.4007397229375761%252C0.3706790067361101%252C0.36793262616869876%252C0.36708855274903046%252C0.36430280572500184%252C0.3490486009197051%252C0.34387230261311613%252C0.33598895455491623%252C0.33145255775412713%252C0.32836428356012665%252C0.3271388645400488%252C0.3268948767717749%26vnd_4d_pid%3D3b1aec34-fd01-4691-8d2a-820f75c703a6%26vnd_4d_xid%3D04eab683-69ee-407d-a274-24f2c9e8b5c7%26vnd_4d_sid%3D9b611b70-bf59-43e5-a006-6722f4e89597%26vnd_aam_uuid%3D75449697975556017190265652984919235276%26vnd_aam_conde%3Dsv%26ctx_template%3Darticle%26ctx_page_slug%3Dmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%26ctx_page_channel%3Ddefault&cookie_enabled=1&bc=7&abxe=1&lmt=1525872231&dt=1525872231012&frm=20&biw=1585&bih=1200&oid=3&adxs=0%2C1063%2C0&adys=2969%2C100%2C0&adks=1292825085%2C2097200797%2C2801771188&gut=v2&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&dssz=43&icsg=34360819712&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x2968%7C300x-1%7C1585x-1&ga_vid=569429861.1525872230&ga_sid=1525872230&ga_hid=1006727717&ga_fc=true
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_203.js
Protocol
SPDY
Server
172.217.23.130 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f130.1e100.net
Software
cafe /
Resource Hash
cc939059a77b69fc86e8b5166eaf424989a78c0cf628f15a446a24e0b73f0cf1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com

Response headers

date
Wed, 09 May 2018 13:23:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
5049
x-xss-protection
1; mode=block
google-lineitem-id
-2,4659201553,4608023012
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2,138232004643,138231373993
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_203.js
securepubads.g.doubleclick.net/gpt/
43 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_203.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_203.js
Protocol
SPDY
Server
172.217.23.130 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f130.1e100.net
Software
sffe /
Resource Hash
a9f7e804bc04fde0a1d57e54f53b9db40da92751fa660e843d9834720c1fd494
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 02 May 2018 15:23:17 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
16616
x-xss-protection
1; mode=block
expires
Wed, 09 May 2018 13:23:51 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-23/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-23/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_203.js
Protocol
SPDY
Server
172.217.23.129 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f1.1e100.net
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

expires
Thu, 09 May 2019 10:27:31 GMT
cache-control
public, immutable, max-age=31536000
last-modified
Tue, 10 Apr 2018 14:51:09 GMT
content-type
text/html
jload
pixel.adsafeprotected.com/ Frame FC45
38 KB
13 KB
Script
General
Full URL
https://pixel.adsafeprotected.com/jload?anId=8158&campId=300x600&pubId=1465709575&chanId=32963455&placementId=4659201553&pubCreative=138232004643&pubOrder=557266375&cb=1433719524&adsafe_par&impId=&custom=siderail_0&custom2=article
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.55 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
89cbb69e5f4935d328750276841113d6831f5c48c4ee19034192a5df59cbe2b1

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:51 GMT
Content-Encoding
gzip
X-Server-Name
app15ami.ami.303net.pvt
Transfer-Encoding
chunked
Content-Type
application/javascript;charset=utf-8
Access-Control-Allow-Origin
pixel.adsafeprotected.com
Cache-Control
no-cache
Access-Control-Allow-Credentials
true
Connection
close
Server
nginx
Expires
Wed, 31 Dec 1969 23:59:59 GMT
unit_renderer.php
as.jivox.com/unit/ Frame C39C
80 KB
19 KB
Script
General
Full URL
https://as.jivox.com/unit/unit_renderer.php?creativeUnitType=22&bDim=300x600&bUnitId=2200&siteId=554580bc721c8d&campaignId=121634&es_pId=2S1b4J&jvxVer=2&cMacro=https://adclick.g.doubleclick.net/pcs/click%253Fxai%253DAKAOjssy4RmHFs9-pv_pnkyypDdE3QH1q3xqo7f_MeUcsypqyNoBGCvI3jSPc0p9ih_yM0QvR5VY8Yq524hmsqFWY9hEl-aE5tAj52RkVM6n0U3AQosuxQUzIAp3tgvuCba1htpHeCKztfc8kvIVK-CgDiWhqdIyeEz7--5NgC2f2-_sAsIuolD9uwv4Az-SSlfCr5LfjTvDOB07UCKs89gAHpNlpVk5Mc-7Q7zIseW5QD_Lxz_R8stR%2526sai%253DAMfl-YTrCszRXQyenWiosaIpO-9yQNPneAT1VTEdi1wd6QLxqEjZokyUWnjjzzYhm2CL5hbqU0_hC2YqZXzpG5b7WNp4yVqlI0TQ7vjUhSr4lIF0qQxhZhhBYUgkcho%2526sig%253DCg0ArKJSzFcSIsun1I8NEAE%2526urlfix%253D1%2526adurl%253D&r=96026286
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_203.js
Protocol
HTTP/1.1
Server
54.225.180.43 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-225-180-43.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/5.5.9-1ubuntu4.21
Resource Hash
688eeda790e3a4bbc419da7b70cfdd2a77a4d4a07266716dd57dd816297f62b9

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:51 GMT
Content-Encoding
gzip
Server
Apache/2.4.7 (Ubuntu)
X-Powered-By
PHP/5.5.9-1ubuntu4.21
Vary
Accept-Encoding
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Cache-Control
no-store, no-cache, must-revalidate, max-age=0, post-check=0, pre-check=0
Connection
keep-alive
Content-Type
application/javascript
Content-Length
19055
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20180502/r20110914/activeview/ Frame C39C
70 KB
25 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20180502/r20110914/activeview/osd_listener.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_203.js
Protocol
SPDY
Server
172.217.23.129 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f1.1e100.net
Software
cafe /
Resource Hash
2e6adc45495a3dce89cd1edec83715f36a9820996774ff14e0e900173811c851
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 02 May 2018 21:49:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
574451
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
25791
x-xss-protection
1; mode=block
server
cafe
etag
6494073687872998152
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 16 May 2018 21:49:40 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame C39C
266 KB
82 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_203.js
Protocol
HTTP/1.1
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
0693735864455a9c66d3a6d38cb4e57c2e2855b5f237b2b11cb115dba92af701

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:51 GMT
Content-Encoding
gzip
Last-Modified
Thu, 03 May 2018 16:38:16 GMT
Server
AmazonS3
x-amz-request-id
0EE31D89E3A0A671
ETag
"58b791ce890a1c964d8ff560d71ebda4"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=6760
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
83726
x-amz-id-2
TWrd5ibFJEa1NKhQ1irHrKe0wcetzFO37Ah3zxpNwFtDqyE0bsQPwoq8IN9gBKiXFfQRSbpThnU=
osd.js
pagead2.googlesyndication.com/pagead/
67 KB
25 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/osd.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_203.js
Protocol
SPDY
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
0b8f0144dab06f6ddd139221924d86370aacbbde30b136f556f6a8c45cf7a423
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 12:36:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
2820
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
hq="googleads.g.doubleclick.net:443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
25193
x-xss-protection
1; mode=block
server
cafe
etag
12221944481654968339
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Wed, 09 May 2018 13:36:51 GMT
jload
pixel.adsafeprotected.com/ Frame F297
38 KB
13 KB
Script
General
Full URL
https://pixel.adsafeprotected.com/jload?anId=8158&campId=970x250&pubId=4499729729&chanId=32963455&placementId=4608023012&pubCreative=138231373993&pubOrder=2263887985&cb=1757537334&adsafe_par&impId=&custom=post_nav_0&custom2=article
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.55 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
dd58ad0e4ee26daeab1e446d18743fb27a599948875ca3ae89321f66b523fac0

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:51 GMT
Content-Encoding
gzip
X-Server-Name
app06ami.ami.303net.pvt
Transfer-Encoding
chunked
Content-Type
application/javascript;charset=utf-8
Access-Control-Allow-Origin
pixel.adsafeprotected.com
Cache-Control
no-cache
Access-Control-Allow-Credentials
true
Connection
close
Server
nginx
Expires
Wed, 31 Dec 1969 23:59:59 GMT
osd_listener.js
tpc.googlesyndication.com/pagead/js/r20180502/r20110914/activeview/ Frame E30C
70 KB
25 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20180502/r20110914/activeview/osd_listener.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_203.js
Protocol
SPDY
Server
172.217.23.129 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f1.1e100.net
Software
cafe /
Resource Hash
2e6adc45495a3dce89cd1edec83715f36a9820996774ff14e0e900173811c851
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 02 May 2018 21:49:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
574451
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
25791
x-xss-protection
1; mode=block
server
cafe
etag
6494073687872998152
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 16 May 2018 21:49:40 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame E30C
266 KB
82 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_203.js
Protocol
HTTP/1.1
Server
2.18.235.40 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
0693735864455a9c66d3a6d38cb4e57c2e2855b5f237b2b11cb115dba92af701

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:51 GMT
Content-Encoding
gzip
Last-Modified
Thu, 03 May 2018 16:38:16 GMT
Server
AmazonS3
x-amz-request-id
0EE31D89E3A0A671
ETag
"58b791ce890a1c964d8ff560d71ebda4"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=6760
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
83726
x-amz-id-2
TWrd5ibFJEa1NKhQ1irHrKe0wcetzFO37Ah3zxpNwFtDqyE0bsQPwoq8IN9gBKiXFfQRSbpThnU=
imgad
tpc.googlesyndication.com/pagead/ Frame E30C
125 KB
125 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/imgad?id=CICAgKDr_7na1gEQARgBMghNw8-jtWZpWg
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_203.js
Protocol
SPDY
Server
172.217.23.129 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f1.1e100.net
Software
cafe /
Resource Hash
9af4abbb78d2f40a6bc90eb89b4becf529582cab86d0589c731259cc7acb0d25
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Mon, 07 May 2018 14:53:09 GMT
x-content-type-options
nosniff
server
cafe
age
167442
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
content-type
image/jpeg
status
200
cache-control
public, max-age=604800
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
127533
x-xss-protection
1; mode=block
expires
Mon, 14 May 2018 14:53:09 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame C39C
0
56 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsu5J3tmyeUH6t_MS6dEapUTOb0k8SMFh59ldBVs3TrGJN9jDYZ67oaeD529UO9CN9tGsDmyZFPLXDTYlKu7Ger9su0Yr3pp2gDQcX7h54t6qg-DmZNBgAVE8Uyn5y7xI0zPbic_nW3i1H1Id1nDdwoUQlVcMt5TZesW0nwW_HgOSJ5dX5ZPHnSlCtKil5MvGEktRJYMQ_O7bRexblypzjXoIqaq3nAfmVS0SnKGgIdNhmlR4mirK_cy&sai=AMfl-YR8FoQOyN2Eu6mwTfsuulkxnlALY918vvRYs8Agrv3Q9TA6ixKfoOpzjCYWKXBF8sTAvxesgSHe31HL-XDsBPA0BZrsCE2zdTwKPnYBLqycUWZX7LTp5AygnhA&sig=Cg0ArKJSzN3OxFohqzc1EAE&urlfix=1&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
172.217.23.130 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f130.1e100.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

cache-control
private
content-type
text/html; charset=UTF-8
view
securepubads.g.doubleclick.net/pcs/ Frame E30C
0
74 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssEOa740443l6d5uFmv-tA0x8EjeSovN3H_n2PcZMpwrIsOoStgwmduRSXkRbiZhBYh1tzYNc8BcAsxU3f7lA_eS6rZWwZ0Xx241skdemGnSphbtLilQxUpqrA8Ec14MMad3j1yj8dxBVxDVMZfM0jTc17fTlKqBVPekfIWIi5TgQ9zmoIDUlWyu_Q6DlwqTK1m3LOXCH_Zs5rFUIP-6nqIJrFEHUjoetl692BrXIjriPQxg_zfVI1oQUxE&sai=AMfl-YR98C6GKwdwx5MTdDkEyeZmpGPdRtdw1PHGcQUl277UdfgUmPMSzxjVQQTW9R-Ug0fq0wu89UhXQukOXkwISmWmAneMXKhm2aPPKtZMCawcFpRVnBh-9iS_JLU&sig=Cg0ArKJSzBxCQJmrdwOtEAE&urlfix=1&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
172.217.23.130 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f130.1e100.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

cache-control
private
content-type
text/html; charset=UTF-8
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A51.388Z&_t=slot_rendered&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3000&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&aam_uuid=75449697975556017190265652984919235276&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=3bad4371-45ef-4a9a-84eb-66044ffe0b21&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&created=1952.5000005960464&staged=1971.2000004947186&pageload_to_staged=1971.2000004947186&channel=default&ctx_template=article&id=1525872230605ilgvwarj5eezky712hqshcbw3j8qm7&instance=0&name=siderail_0&position_fold=atf&position_xy=0x0&request_number=1&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&type=siderail&CNS_init=596.2000004947186&suffix=dart&CNS_init_to_staged=1375&inViewport=1976.5000008046627&pageLoad_to_in_viewport=1380.3000003099442&isRefresh=true&is_first_Request=true&requested=2178.3000007271767&pageLoad_to_requested=2178.3000007271767&CNS_init_to_requested=1582.1000002324581&rendered=2734.9999994039536&advertiser_id=1465709575&creative_id=138232004643&creative_type=sized&line_item_id=4659201553&order_id=557266375&rendered_size=300x600&request_to_rendered=556.6999986767769&top_unit_id=14232775&unit_id=32963455&is_first_rendered=true&pageLoad_to_rendered=2734.9999994039536&CNS_init_to_rendered=2138.799998909235&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.0.42.186 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-42-186.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:51 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A51.435Z&_t=slot_rendered&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3000&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&aam_uuid=75449697975556017190265652984919235276&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=3bad4371-45ef-4a9a-84eb-66044ffe0b21&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&created=1950.6999999284744&staged=1955.299999564886&pageload_to_staged=1955.299999564886&channel=default&ctx_template=article&id=1525872230603rk00n6uawzwepwkt3fvfbkitgt3ovc&instance=0&name=post_nav_0&position_fold=atf&position_xy=0x0&request_number=1&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&type=post_nav&CNS_init=596.2000004947186&suffix=dart&CNS_init_to_staged=1359.0999990701675&inViewport=1961.3000005483627&pageLoad_to_in_viewport=1365.1000000536442&isRefresh=true&requested=2191.7000003159046&pageLoad_to_requested=2191.7000003159046&CNS_init_to_requested=1595.499999821186&rendered=2782.3000010102987&advertiser_id=4499729729&creative_id=138231373993&creative_type=sized&line_item_id=4608023012&order_id=2263887985&rendered_size=970x250&request_to_rendered=590.6000006943941&top_unit_id=14232775&unit_id=32963455&pageLoad_to_rendered=2782.3000010102987&CNS_init_to_rendered=2186.10000051558&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:51 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
main.17.4.102.js
static.adsafeprotected.com/ Frame FC45
139 KB
44 KB
Script
General
Full URL
https://static.adsafeprotected.com/main.17.4.102.js
Requested by
Host: pixel.adsafeprotected.com
URL: https://pixel.adsafeprotected.com/jload?anId=8158&campId=300x600&pubId=1465709575&chanId=32963455&placementId=4659201553&pubCreative=138232004643&pubOrder=557266375&cb=1433719524&adsafe_par&impId=&custom=siderail_0&custom2=article
Protocol
HTTP/1.1
Server
69.172.216.58 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
d12f03665c7cf10c8c041d22aad873d84c92dd4aa6e01e81cddca520b476cee7

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:51 GMT
Content-Encoding
gzip
Last-Modified
Tue, 08 May 2018 13:33:15 GMT
X-Server-Name
app11ami.ami.303net.pvt
ETag
"5af1a71b-af52"
Content-Type
application/javascript
Cache-Control
max-age=315360000
Connection
close
Content-Length
44882
Server
nginx
Expires
Thu, 31 Dec 2037 23:55:55 GMT
truncated
/ Frame E30C
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ebc18f4c8b227b480590a4bc06faf6dbeee9bee08a2b81abb048127cc7a82511

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
main.17.4.102.js
static.adsafeprotected.com/ Frame F297
139 KB
44 KB
Script
General
Full URL
https://static.adsafeprotected.com/main.17.4.102.js
Requested by
Host: pixel.adsafeprotected.com
URL: https://pixel.adsafeprotected.com/jload?anId=8158&campId=970x250&pubId=4499729729&chanId=32963455&placementId=4608023012&pubCreative=138231373993&pubOrder=2263887985&cb=1757537334&adsafe_par&impId=&custom=post_nav_0&custom2=article
Protocol
HTTP/1.1
Server
69.172.216.58 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
d12f03665c7cf10c8c041d22aad873d84c92dd4aa6e01e81cddca520b476cee7

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:51 GMT
Content-Encoding
gzip
Last-Modified
Tue, 08 May 2018 13:33:15 GMT
X-Server-Name
app25ami.ami.303net.pvt
ETag
"5af1a71b-af52"
Content-Type
application/javascript
Cache-Control
max-age=315360000
Connection
close
Content-Length
44882
Server
nginx
Expires
Thu, 31 Dec 2037 23:55:55 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A51.679Z&_t=slot_requested&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3200&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&aam_uuid=75449697975556017190265652984919235276&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=3bad4371-45ef-4a9a-84eb-66044ffe0b21&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&created=1953.099999576807&staged=1979.399999603629&pageload_to_staged=1979.399999603629&channel=default&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=641x0&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&type=native_xrail&CNS_init=596.2000004947186&suffix=dart&CNS_init_to_staged=1383.1999991089106&inViewport=1983.7999995797873&pageLoad_to_in_viewport=1387.5999990850687&isRefresh=true&requested=3025.900000706315&pageLoad_to_requested=3025.900000706315&CNS_init_to_requested=2429.7000002115965&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:51 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A51.685Z&_t=slot_requested&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3200&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&aam_uuid=75449697975556017190265652984919235276&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=3bad4371-45ef-4a9a-84eb-66044ffe0b21&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&created=1953.7000004202127&staged=1984.6000000834465&pageload_to_staged=1984.6000000834465&channel=default&ctx_template=article&id=1525872230607oitsqrtmcfyxplehqxkvlgsk41afn9&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&type=out_of_page&CNS_init=596.2000004947186&suffix=dart&CNS_init_to_staged=1388.399999588728&inViewport=1994.4000001996756&pageLoad_to_in_viewport=1398.199999704957&isRefresh=true&requested=3031.7999999970198&pageLoad_to_requested=3031.7999999970198&CNS_init_to_requested=2435.599999502301&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.0.42.186 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-42-186.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:51 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
mon
pixel.adsafeprotected.com/
43 B
304 B
Image
General
Full URL
https://pixel.adsafeprotected.com/mon?anId=8158&campId=970x250&pubId=4499729729&chanId=32963455&placementId=4608023012&pubCreative=138231373993&pubOrder=2263887985&cb=1757537334&adsafe_par&impId=&custom=post_nav_0&custom2=article&adsafe_url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&adsafe_type=abdfq&adsafe_jsinfo=,id:fe467184-79f5-0b57-e4ff-6888d82605f9,c:c7HEoG,sl:inView,em:true,fr:true,mn:app06ami,pt:1-5-15,wc:0.0.1600.1200,ac:308.0.970.250,am:i,cc:308.0.970.250,piv:100,obst:0,th:0,reas:,cmps:1,br:u,fv:0,bv:na,dm:na,abv:na,an:n,fm:qRyAnGh+11|12|13|1411|1412|1413|1414|14151|1416|15|161|17*.8158|171|172|173|174|175|18,idMap:17*,pl:,rt:1,cb:0,th:0,es:0,sa:1,sc:0,ha:1,fif:1,gm:1,uf:0,tt:jload,et:186,oid:36d0a431-538c-11e8-b83f-00259086bbca,v:17.4.102,sp:1,ct:na,dtm:i,gtpl:0,wr:1600.1200,sr:1600.1200,mst:158,ov:0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.55 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:51 GMT
X-Server-Name
app19ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=fe467184-79f5-0b57-e4ff-6888d82605f9&tv={c:c7HEoJ,pingTime:-8,time:188,type:l,rt:1,cb:0,th:0,es:0,sa:1,sc:0,ha:1,fif:1,gm:1,slTimes:{i:188,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:184,wc:0.0.1600.1200,ac:308.0.970.250,am:i,cc:308.0.970.250,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[24~100],as:[24~970.250]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:0,fm:qRyAnGh+11|12|13|1411|1412|1413|1414|14151|1416|15|161|17*.8158|171|172|173|174|175|18,idMap:17*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:51 GMT
X-Server-Name
dt44ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=fe467184-79f5-0b57-e4ff-6888d82605f9&tv={c:c7HEpp,pingTime:0,time:230,type:pf,clog:[{piv:100,vs:i,r:,w:970,h:250,t:185}],rt:1,cb:0,th:0,es:0,sa:1,sc:0,ha:1,fif:1,gm:1,slTimes:{i:230,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:184,wc:0.0.1600.1200,ac:308.0.970.250,am:i,cc:308.0.970.250,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[66~100],as:[66~970.250]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:0,fm:qRyAnGh+11|12|13|1411|1412|1413|1414|14151|1416|15|161|17*.8158|171|172|173|174|175|18,idMap:17*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:51 GMT
X-Server-Name
dt55ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
sca.17.4.72.js
static.adsafeprotected.com/ Frame F3D5
81 KB
20 KB
Script
General
Full URL
https://static.adsafeprotected.com/sca.17.4.72.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.58 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
e8cd262a1cda289635df443ebfe41d7f551f0215fea4090d1a10c04547b3a422

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:23:51 GMT
Content-Encoding
gzip
Last-Modified
Fri, 09 Mar 2018 20:15:42 GMT
X-Server-Name
app54ami.ami.303net.pvt
ETag
"5aa2eb6e-4fa2"
Content-Type
application/javascript
Cache-Control
max-age=315360000
Connection
close
Content-Length
20386
Server
nginx
Expires
Thu, 31 Dec 2037 23:55:55 GMT
mon
pixel.adsafeprotected.com/
43 B
304 B
Image
General
Full URL
https://pixel.adsafeprotected.com/mon?anId=8158&campId=300x600&pubId=1465709575&chanId=32963455&placementId=4659201553&pubCreative=138232004643&pubOrder=557266375&cb=1433719524&adsafe_par&impId=&custom=siderail_0&custom2=article&adsafe_url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&adsafe_type=abdfq&adsafe_jsinfo=,id:b7fb0cfa-121a-c548-d35d-1f367a2777ff,c:c7HEpX,sl:inView,em:true,fr:true,mn:app15ami,pt:1-5-15,wc:0.0.1600.1200,ac:1063.350.300.600,am:i,cc:1063.350.300.600,piv:100,obst:0,th:0,reas:,cmps:1,br:u,fv:0,bv:na,dm:na,abv:na,an:n,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|141511|141512|141513|141514|141515|141516|1416|15|16*.8158|161|171|172|173|174|175|18,idMap:16*,pl:,rt:1,cb:0,th:0,es:0,sa:1,sc:1,ha:1,fif:1,gm:1,uf:0,tt:jload,et:312,oid:36c5ce92-538c-11e8-a0bc-002590882922,v:17.4.102,sp:1,ct:na,dtm:i,gtpl:0,wr:1600.1200,sr:1600.1200,mst:285,ov:0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.55 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:51 GMT
X-Server-Name
app51ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=fe467184-79f5-0b57-e4ff-6888d82605f9&tv={c:c7HEqw,pingTime:-2,time:299,type:a,im:{prf:{beA:121,beZ:122,mfA:279,cmA:280,inA:280,inZ:288,prA:288,prZ:297,si:307,poA:310,poZ:311,cmZ:311,mfZ:311,loA:352,loZ:355,ltA:419,ltZ:419,mdA:123,mdZ:243}},sca:{dfp:{df:4,sz:970.254,dom:body}},env:{sf:0,pom:1},clog:[{piv:100,vs:i,r:,w:970,h:250,t:185}],rt:1,cb:0,th:0,es:0,sa:1,sc:0,ha:1,fif:1,gm:1,slTimes:{i:299,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:184,wc:0.0.1600.1200,ac:308.0.970.250,am:i,cc:308.0.970.250,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[138~100],as:[138~970.250]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:0,fm:qRyAnGh+11|12|13|1411|1412|1413|1414|14151|1416|15|161|17*.8158|171|172|173|174|175|18,idMap:17*,slid:[google_ads_iframe_3379/ars.dart/default_1,google_ads_iframe_3379/ars.dart/default_1__container__,cns_ads_1525872230603RK00n6UAwzwepWKt3FVfbkITgT3ovC_post_nav_0_container,cns_ads_1525872230603RK00n6UAwzwepWKt3FVfbkITgT3ovC_post_nav_0_stage,ad_crown_top],sinceFw:109,readyFired:true}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:51 GMT
X-Server-Name
dt10ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
ads
securepubads.g.doubleclick.net/gampad/
569 B
333 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&correlator=2573042101729735&output=json_html&callback=googletag.impl.pubads.callbackProxy2&impl=fifs&adsid=NT&json_a=1&hxva=1&scor=1111979473344179&eid=21061458&vrg=203&tfcd=0&guci=1.2.0.0.2.2&sc=1&sfv=1-0-23&iu_parts=3379%2Cars.dart%2Cdefault&enc_prev_ius=0%2F1%2F2%2C0%2F1%2F2&prev_iu_szs=1x1%2C300x140&fsbs=1%2C1&ists=2&prev_scp=ctx_slot_name%3D_out_of_page_0%26ctx_slot_instance%3D_out_of_page_0%26ctx_slot_type%3D_out_of_page%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%26vnd_ylbt_data%3Dn%7Cctx_slot_name%3Dnative_xrail_0%26ctx_slot_instance%3Dnative_xrail_0%26ctx_slot_type%3Dnative_xrail%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%26vnd_ylbt_data%3Dn&eri=1&cust_params=ctx_advertisers%3D1465709575%252C4499729729%26ctx_creatives%3D138232004643%252C138231373993%26ctx_line_items%3D4659201553%252C4608023012%26env_device_type%3Ddesktop%26env_server%3Dproduction%26rdt_device_template%3Ddesktop_article%26cnt_tags%3Dsection_information-technology%252Cdiscipline%252Chacking-2%252Cwindows-8%252Cdefault%252Cexploits%252Cmicrosoft-3%252Cpatch-tuesday%252Cvulnerabilities%252Cwindows%26usr_bkt_pv%3D24%26ctx_cns_version%3D2_25_2%26vnd_prx_segments%3D300003%252C131100%252C131103%252C121100%252C131118%252C131127%252C210001%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252C0co3q9%252Cdhui4r%252Cwmhp4i%252C2hkgm5%252Cfdf1wd%252Cb08ry4%252C36vte1%252C5sx0hb%252C1frz43%252C6f173a%252C_B5isrn97Cl6_%26vnd_4d_ctx_topics%3DALLBRANDS_167%252CALLBRANDS_28%26vnd_4d_ctx_topic_sc%3D0.6920262436522664%252C0.10349567539731558%26vnd_4d_ctx_entities%3Dmicrosoft%252Cwindows%252Ckaspersky%2520lab%252Cdan%2520goodin%252Cutc%252Cars%2520orbital%2520transmission%252Canton%2520ivanov%252Cinternet%2520explorer%252Csans%2520institute%252Cazure%2520iot%2520sdk%26vnd_4d_ctx_ent_sc%3D1%252C0.7284355509011137%252C0.6092096796994252%252C0.4007397229375761%252C0.3706790067361101%252C0.29669238171347656%252C0.2900696709157858%252C0.25053502104436054%252C0.2441424923942869%252C0.22164167356032832%26vnd_4d_ctx_keywords%3Dmicrosoft%252Cvulnerability%252Cwindows%252Cattacker%252Ckaspersky%2520lab%252Clatest%2520patch%2520tuesday%252Cuse-after-free%2520flaw%252Cuser%252Cdan%2520goodin%252Cutc%252Cfix%252Cseparate%2520vulnerability.%252Ccve-2018-8174%252Cofficial%252Cfront%2520page%2520layout%252Cexploit%252Cprivilege%252Ccomputer%252Cunwitting%2520users.%252Cprivilege-escalation%2520flaw%252Cwebsite%26vnd_4d_ctx_kw_sc%3D1%252C0.7584320270763975%252C0.7284355509011137%252C0.6223293859789486%252C0.6092096796994252%252C0.5352745350834834%252C0.5281770081314667%252C0.5081770402472439%252C0.4007397229375761%252C0.3706790067361101%252C0.36793262616869876%252C0.36708855274903046%252C0.36430280572500184%252C0.3490486009197051%252C0.34387230261311613%252C0.33598895455491623%252C0.33145255775412713%252C0.32836428356012665%252C0.3271388645400488%252C0.3268948767717749%26vnd_4d_pid%3D3b1aec34-fd01-4691-8d2a-820f75c703a6%26vnd_4d_xid%3D04eab683-69ee-407d-a274-24f2c9e8b5c7%26vnd_4d_sid%3D9b611b70-bf59-43e5-a006-6722f4e89597%26vnd_aam_uuid%3D75449697975556017190265652984919235276%26vnd_aam_conde%3Dsv%26ctx_template%3Darticle%26ctx_page_slug%3Dmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%26ctx_page_channel%3Ddefault&cookie=ID%3D610c8c88226dc109%3AT%3D1525872231%3AS%3DALNI_MbjvXfD10VrVV7mmovZndnVg65sQQ&cookie_enabled=1&bc=7&abxe=1&lmt=1525872231&dt=1525872231931&frm=20&biw=1585&bih=1200&oid=3&adxs=0%2C1063&adys=0%2C991&adks=824547617%2C524474251&gut=v2&ifi=5&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&dssz=45&icsg=34360819712&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x-1%7C300x-1&ga_vid=569429861.1525872230&ga_sid=1525872230&ga_hid=1006727717&ga_fc=true
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_203.js
Protocol
SPDY
Server
172.217.23.130 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s18-in-f130.1e100.net
Software
cafe /
Resource Hash
51815d9ba8e0aa010ba2d9de00a919cebaacefb52d291671f9a3265405d81864
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Origin
https://arstechnica.com

Response headers

date
Wed, 09 May 2018 13:23:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
236
x-xss-protection
1; mode=block
google-lineitem-id
-2,-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2,-2
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=b7fb0cfa-121a-c548-d35d-1f367a2777ff&tv={c:c7HEse,pingTime:0,time:452,type:pf,clog:[{piv:100,vs:i,r:,w:300,h:600,t:311}],rt:1,cb:0,th:0,es:0,sa:1,sc:1,ha:1,fif:1,gm:1,slTimes:{i:452,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:310,wc:0.0.1600.1200,ac:1063.350.300.600,am:i,cc:1063.350.300.600,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[161~100],as:[161~300.600]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:0,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|141511|141512|141513|141514|141515|141516|1416|15|16*.8158|161|171|172|173|174|175|18,idMap:16*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:52 GMT
X-Server-Name
dt37ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=b7fb0cfa-121a-c548-d35d-1f367a2777ff&tv={c:c7HEss,pingTime:-2,time:466,type:a,im:{prf:{beA:126,beZ:127,mfA:413,cmA:414,inA:414,inZ:418,prA:418,prZ:432,si:437,poA:438,poZ:461,cmZ:461,mfZ:461,loA:578,loZ:579,ltA:592,ltZ:592,mdA:128,mdZ:292}},sca:{dfp:{df:0}},env:{sf:0,pom:1},clog:[{piv:100,vs:i,r:,w:300,h:600,t:311}],rt:1,cb:0,th:0,es:0,sa:1,sc:1,ha:1,fif:1,gm:1,slTimes:{i:466,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:310,wc:0.0.1600.1200,ac:1063.350.300.600,am:i,cc:1063.350.300.600,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[175~100],as:[175~300.600]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:0,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|141511|141512|141513|141514|141515|141516|1416|15|16*.8158|161|171|172|173|174|175|18,idMap:16*,slid:[google_ads_iframe_3379/ars.dart/default_0,google_ads_iframe_3379/ars.dart/default_0__container__,cns_ads_1525872230605ILgvwArj5eeZKy712hqSHCbw3j8Qm7_siderail_0_container,cns_ads_1525872230605ILgvwArj5eeZKy712hqSHCbw3j8Qm7_siderail_0_stage,ad_xrail_top],sinceFw:154,readyFired:true}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:52 GMT
X-Server-Name
dt35ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
1
tapestry.tapad.com/tapestry/ Frame C39C
Redirect Chain
  • https://sync.jivox.com/tags/sync/usync.php?src=tag&campaignId=121634&siteId=554580bc721c8d&es_pId=2S1b4J&px=BMFSvLPw&r=1525872231
  • https://tapestry.tapad.com/tapestry/1?ta_partner_id=2166&ta_partner_did=qRyAnLqtIogR&ta_format=png
95 B
332 B
Image
General
Full URL
https://tapestry.tapad.com/tapestry/1?ta_partner_id=2166&ta_partner_did=qRyAnLqtIogR&ta_format=png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
35.186.234.100 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
100.234.186.35.bc.googleusercontent.com
Software
Jetty(8.1.13.v20130916) /
Resource Hash
3eb10792d1f0c7e07e7248273540f1952d9a5a2996f4b5df70ab026cd9f05517

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:52 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
status
200
content-type
image/png
alt-svc
clear
content-length
95

Redirect headers

Location
https://tapestry.tapad.com/tapestry/1?ta_partner_id=2166&ta_partner_did=qRyAnLqtIogR&ta_format=png
Date
Wed, 09 May 2018 13:23:52 GMT
Server
Jetty(9.3.z-SNAPSHOT)
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
pixeltracker.gif
playercdn.jivox.com/images/ Frame C39C
Redirect Chain
  • https://evs.jivox.com/trk/60/121634/554580bc721c8d/22/jvxSId_1525872231.9372/es_pId_2S1b4J/es_encParams_L3BhZ2VVcmxfaHR0cHMlM0ElMkYlMkZhcnN0ZWNobmljYS5jb20lMkZpbmZvcm1hdGlvbi10ZWNobm9sb2d5JTJGMjAxO...
  • https://playercdn.jivox.com/images/pixeltracker.gif
56 B
418 B
Image
General
Full URL
https://playercdn.jivox.com/images/pixeltracker.gif
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
52.222.152.6 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-152-6.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
2d310648a31461f6b76c38bca295da135b9825938ad1defab174fc29b414487b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 13 Jun 2017 04:28:03 GMT
via
1.1 0e417d376ffbd42061f20338431828b5.cloudfront.net (CloudFront)
last-modified
Fri, 08 Apr 2011 04:47:27 GMT
server
AmazonS3
age
24438
etag
"5ce964257ed66a53886261c4c7506515"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
x-amz-meta-s3fox-filesize
56
x-amz-meta-s3fox-modifiedtime
1297067647000
accept-ranges
bytes
content-length
56
x-amz-cf-id
JyRoe7iJEobXaxTWyvVIFhcUfbfP-rOgaQZ1KBLEhj211ODnDMR7lQ==

Redirect headers

Date
Wed, 09 May 2018 13:23:52 GMT
Server
Jetty(9.3.z-SNAPSHOT)
Access-Control-Allow-Origin
*
P3P
CP='IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA'
Location
https://playercdn.jivox.com/images/pixeltracker.gif
Connection
keep-alive
Content-Type
image/gif
Content-Length
0
/
arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/ Frame C39C
37 KB
37 KB
Image
General
Full URL
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/pagead/js/r20180502/r20110914/activeview/osd_listener.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Chicago, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:path
/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
pragma
no-cache
cookie
session_seen_posts=0; seen_posts=; __utma=199748606.569429861.1525872230.1525872230.1525872230.1; __utmc=199748606; __utmz=199748606.1525872230.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1; __utmb=199748606.1.10.1525872230; bounceClientVisit2806v=N4IgNgDiBcIBYBcEQM4FIDMBBNAmAYnvgIYBOKCApgMZwB2AltcQHTUD2AtkQ3QGbtSnYggbs6AWiq067MOwDmATyK4ADAEYAHETUBWIpyal2KdnwQSII2pRQTqpBqOZgJAd14ATdu-sAjAFcFCWJqUQA3SjAlCUoADwh5Z0ovCV4pOEoPBjAvIhAAGhBSGBAQAF8gA; sID=9b611b70-bf59-43e5-a006-6722f4e89597; pID=3b1aec34-fd01-4691-8d2a-820f75c703a6; CN_sp=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9; CN_su=87080cec-73e2-4c02-a8cb-e91d41ff6b90; _polar_tu=*_%22mgtn%22_@2Q_u_@_ab599fa3-1504-4528-924f-79dda95ac4b4_Q_n_@3Q_s_@1Q_sc_@*_v_@1Q_a_@1+Q_ss_@_%22p8gqjq_Q_sl_@_%22p8gqjq_Q_sd_@*+Q_v_@nullQ_vc_@*+Q_vs_@_%22p8gqjq_Q_vl_@_%22p8gqjq_Q_vd_@*+Q_vu_@_db786913bed8775c3b5e445b1f21fe92_Q_vf_@_%22jgz4xess_+; fpcid=3111364265714417957_FPD; AMCVS_F7093025512D2B690A490D44%40AdobeOrg=1; CN_xid=3bad4371-45ef-4a9a-84eb-66044ffe0b21; _parsely_session={%22sid%22:1%2C%22surl%22:%22https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/%22%2C%22sref%22:%22%22%2C%22sts%22:1525872230482%2C%22slts%22:0}; _parsely_visitor={%22id%22:%228e97969b-76e9-4d43-9046-28f5049b59fd%22%2C%22session_count%22:1%2C%22last_session_ts%22:1525872230482}; s_depth=1; s_vnum_m=1527811200542%26vn%3D1; sinvisit_m=true; s_ppn=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F; s_nr=1525872230542-New; s_cc=true; __ybotb=1473; __ybotv=1525872230619; __ybots=jgz4xgbfnrxev4q5ko.1.jgz4xgbe1uqmo2sqtb.1; aamconde=conde%3Dsv; aam_optimizely=aam%3D226821; aam_uuid=75449697975556017190265652984919235276; __ybotc=http%3A//ads-adseast.yldbt.com/m/; AMCV_F7093025512D2B690A490D44%40AdobeOrg=1099438348%7CMCIDTS%7C17661%7CMCMID%7C75639448217025612620279874398121678357%7CMCAAMLH-1526477030%7C9%7CMCAAMB-1526477030%7CRKhpRz8krg2tLO6pguXWp5olkAcUniQYPHaMWWgdJ3xzPWQmdj0y%7CMCOPTOUT-1525879430s%7CNONE%7CMCAID%7CNONE%7CMCSYNCSOP%7C411-17668%7CvVersion%7C2.1.0; __gads=ID=610c8c88226dc109:T=1525872231:S=ALNI_MbjvXfD10VrVV7mmovZndnVg65sQQ
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
arstechnica.com
referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
:scheme
https
:method
GET
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx
strict-transport-security
max-age=300
content-type
text/html; charset=UTF-8
status
200
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
link
<https://arstechnica.com/wp-json/>; rel="https://api.w.org/"
x-ars-server
web209
x-xss-protection
1; mode=block
truncated
/ Frame C39C
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e0b70b31f6eabdb89ebb21a0bf1d90ce197ab1de433135295ac5980e09654005

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=17&i=CONDECW3&hp=1&zMoatPS=siderail_0&zMoatKW=microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild&zMoatPT=article&zMoatST=siderail&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatCNS=2_25_2&zMoatRFSH=Refresh%20Not%20Defined&zMoatSZ=300x600&zMoatKWPos=Undefined&cm=23&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&bq=0&f=0&tw=%60w.(%60M*%2F.K&j=&o=3&t=1525872232062&de=410762890877&m=0&ar=4c90a2e-clean&q=5&cb=0&cu=1525872232062&ll=2&lm=0&ln=1&em=0&en=0&d=1465709575%3A557266375%3A4659201553%3A138232004643&qs=1&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&zMoatPlacID=32963455&bo=14232775&bp=32963455&bd=Undefined&zMoatNoRFSH=true&dfp=0%2C1&la=32963455&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&fd=1&ac=1&it=500&fs=143783&na=1095716918&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
174.129.90.180 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-174-129-90-180.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:52 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A52.090Z&_t=slot_rendered&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3200&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&aam_uuid=75449697975556017190265652984919235276&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=3bad4371-45ef-4a9a-84eb-66044ffe0b21&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&created=1953.7000004202127&staged=1984.6000000834465&pageload_to_staged=1984.6000000834465&channel=default&ctx_template=article&id=1525872230607oitsqrtmcfyxplehqxkvlgsk41afn9&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&request_number=1&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&type=out_of_page&CNS_init=596.2000004947186&suffix=dart&CNS_init_to_staged=1388.399999588728&inViewport=1994.4000001996756&pageLoad_to_in_viewport=1398.199999704957&isRefresh=true&requested=3031.7999999970198&pageLoad_to_requested=3031.7999999970198&CNS_init_to_requested=2435.599999502301&rendered=3437.5&creative_type=sized&is_empty=true&request_to_rendered=405.70000000298023&pageLoad_to_rendered=3437.5&CNS_init_to_rendered=2841.2999995052814&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:52 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A52.095Z&_t=slot_rendered&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3200&pSw=1600&pSh=1200&uID=c78f2394-6fa5-4a94-86e6-a6bdd804f6c9&sID=9b611b70-bf59-43e5-a006-6722f4e89597&pID=3b1aec34-fd01-4691-8d2a-820f75c703a6&uDt=desktop&aam_uuid=75449697975556017190265652984919235276&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=3bad4371-45ef-4a9a-84eb-66044ffe0b21&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&created=1953.099999576807&staged=1979.399999603629&pageload_to_staged=1979.399999603629&channel=default&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=641x0&request_number=1&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&type=native_xrail&CNS_init=596.2000004947186&suffix=dart&CNS_init_to_staged=1383.1999991089106&inViewport=1983.7999995797873&pageLoad_to_in_viewport=1387.5999990850687&isRefresh=true&requested=3025.900000706315&pageLoad_to_requested=3025.900000706315&CNS_init_to_requested=2429.7000002115965&rendered=3442.0999996364117&creative_type=sized&is_empty=true&request_to_rendered=416.1999989300966&pageLoad_to_rendered=3442.0999996364117&CNS_init_to_rendered=2845.899999141693&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.0.42.186 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-42-186.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:52 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=b7fb0cfa-121a-c548-d35d-1f367a2777ff&tv={c:c7HExu,pingTime:-10,time:778,type:s,mvn:ZnNjPTExLHNkPTMsbm89Nyxhc3A9MQ--,fsc:17.4.72v220002022020220000022002222000022220202020222200222220002222022002222200002220222022222222222000220200000002220222220222222222222202222222222222222222222222222222222222200000022022020020000002002202022022022222222000000000022222202022022222000000020000000000000000000220002220000022200222202220022200200222022202220222222220020222202000220000222202222202222000002002002222222222220022202200022002222222202,sd:MTcuNC43MnYxMjAwfHwxNjAwfHwxfHwxfHwyNHx8MTIwMHx8MHx8MHx8MXx8bGFuZHNjYXBlLXByaW1hcnl8fDI0fHw0LzN8fDQvM3x8MHx8MTYwMA--,no:MTcuNC43MnZNb3ppbGxhfHxOZXRzY2FwZXx8bnx8OHx8bnx8MHx8bnx8TGludXggeDg2XzY0fHxHZWNrb3x8MjAwMzAxMDd8fDB8fE1vemlsbGEvNS4wIChYMTE7IExpbnV4IHg4Nl82NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgSGVhZGxlc3NDaHJvbWUvNjYuMC4zMzU5LjEzOSBTYWZhcmkvNTM3LjM2fHwxfHwxfHxHb29nbGUgSW5jLnx8bg--,asp:1525872232276||cf1385236097d2ee11312e255ecdb50b||067a9243f06e23b09a948e996055c2e8||8a78589c76f8df4b2d384cbdbdb48fd8||ba738b997a493714ecfd6526b335d5ba||98db0e1fa021715dc5088f126cc33296||fd554a926e0dfe150be3fc2c7eb0f8b8||366436acf82d02ca71bf98d58426cef6||1520626246}
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:52 GMT
X-Server-Name
dt44ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
firstevent
condenast.demdex.net/
Redirect Chain
  • https://condenast.demdex.net/event?d_nsid=0&d_ld=_ts%3D1525872232686&d_rtbd=json&d_jsonv=1&d_dst=1&d_cb=demdexRequestCallback_0_1525872232686&c_viewability=1
  • https://condenast.demdex.net/firstevent?d_nsid=0&d_ld=_ts%3D1525872232686&d_rtbd=json&d_jsonv=1&d_dst=1&d_cb=demdexRequestCallback_0_1525872232686&c_viewability=1
5 KB
2 KB
Script
General
Full URL
https://condenast.demdex.net/firstevent?d_nsid=0&d_ld=_ts%3D1525872232686&d_rtbd=json&d_jsonv=1&d_dst=1&d_cb=demdexRequestCallback_0_1525872232686&c_viewability=1
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.212.113.202 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-113-202.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
65f9ba88a0489aeadad872d2cfa1e9df630000d7430e248ef78af9cb7b69dc6a

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

DCS
irl1-prod-dcs-7ce205ea.edge-irl1.demdex.com 5.29.1.20180508083900 6ms
Pragma
no-cache
Date
Wed, 09 May 2018 13:23:52 GMT
Content-Encoding
gzip
X-TID
W5PazkEUQ3g=
Vary
Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
transfer-encoding
chunked
Connection
keep-alive
Content-Type
application/javascript; charset=UTF-8
Expires
Thu, 01 Jan 2009 00:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:52 GMT
X-TID
Ozed551XTeI=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Location
https://condenast.demdex.net/firstevent?d_nsid=0&d_ld=_ts%3D1525872232686&d_rtbd=json&d_jsonv=1&d_dst=1&d_cb=demdexRequestCallback_0_1525872232686&c_viewability=1
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 2009 00:00:00 GMT
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=fe467184-79f5-0b57-e4ff-6888d82605f9&tv={c:c7HEFz,pingTime:1,time:1232,type:p,clog:[{piv:100,vs:i,r:,w:970,h:250,t:185}],rt:1,cb:0,th:0,es:0,sa:1,sc:0,ha:1,fif:1,gm:1,slTimes:{i:1232,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:184,wc:0.0.1600.1200,ac:308.0.970.250,am:i,cc:308.0.970.250,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[1068~100],as:[1068~970.250]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:126,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|14151|1416|15|16.8158|161|17*.8158|171|172|173|174|175|18,idMap:17*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:52 GMT
X-Server-Name
dt16ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=fe467184-79f5-0b57-e4ff-6888d82605f9&tv={c:c7HEFA,pingTime:1,time:1233,type:pf,clog:[{piv:100,vs:i,r:,w:970,h:250,t:185}],rt:1,cb:0,th:0,es:0,sa:1,sc:0,ha:1,fif:1,gm:1,slTimes:{i:1233,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:184,wc:0.0.1600.1200,ac:308.0.970.250,am:i,cc:308.0.970.250,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[1069~100],as:[1069~970.250]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:126,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|14151|1416|15|16.8158|161|17*.8158|171|172|173|174|175|18,idMap:17*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:52 GMT
X-Server-Name
dt08ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=fe467184-79f5-0b57-e4ff-6888d82605f9&tv={c:c7HEFA,pingTime:1,time:1233,type:c,clog:[{piv:100,vs:i,r:,w:970,h:250,t:185}],rt:1,cb:0,th:0,es:0,sa:1,sc:0,ha:1,fif:1,gm:1,slTimes:{i:1233,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:184,wc:0.0.1600.1200,ac:308.0.970.250,am:i,cc:308.0.970.250,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[1069~100],as:[1069~970.250]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:126,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|14151|1416|15|16.8158|161|17*.8158|171|172|173|174|175|18,idMap:17*,metricId:publ1}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:52 GMT
X-Server-Name
dt59ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=fe467184-79f5-0b57-e4ff-6888d82605f9&tv={c:c7HEFA,pingTime:1,time:1233,type:c,clog:[{piv:100,vs:i,r:,w:970,h:250,t:185}],rt:1,cb:0,th:0,es:0,sa:1,sc:0,ha:1,fif:1,gm:1,slTimes:{i:1233,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:184,wc:0.0.1600.1200,ac:308.0.970.250,am:i,cc:308.0.970.250,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[1069~100],as:[1069~970.250]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:126,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|14151|1416|15|16.8158|161|17*.8158|171|172|173|174|175|18,idMap:17*,metricId:grpm1}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:52 GMT
X-Server-Name
dt60ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A52.841Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3200&pSw=1600&pSh=1200&uID=1bb592fc-fb7f-43bf-adc7-9f4285f1e123&uNw=1&uUq=1&pID=105076ee-7690-45a6-a29a-e99e6c046622&uDt=desktop&aam_uuid=89714132033937251582783532736963186817&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=3bad4371-45ef-4a9a-84eb-66044ffe0b21&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&created=1950.6999999284744&staged=1955.299999564886&pageload_to_staged=1955.299999564886&channel=default&ctx_template=article&id=1525872230603rk00n6uawzwepwkt3fvfbkitgt3ovc&instance=0&name=post_nav_0&position_fold=atf&position_xy=0x308&request_number=1&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&type=post_nav&CNS_init=596.2000004947186&suffix=dart&CNS_init_to_staged=1359.0999990701675&inViewport=1961.3000005483627&pageLoad_to_in_viewport=1365.1000000536442&isRefresh=true&requested=2191.7000003159046&pageLoad_to_requested=2191.7000003159046&CNS_init_to_requested=1595.499999821186&rendered=2782.3000010102987&advertiser_id=4499729729&creative_id=138231373993&creative_type=sized&line_item_id=4608023012&order_id=2263887985&rendered_size=970x250&request_to_rendered=590.6000006943941&top_unit_id=14232775&unit_id=32963455&pageLoad_to_rendered=2782.3000010102987&CNS_init_to_rendered=2186.10000051558&is_first_impression_viewable=true&impression_Viewable=4188.100000843406&in_viewport_to_visible_change=2226.800000295043&pageLoad_to_gpt_viewable=4188.100000843406&CNS_init_to_impression_Viewable=3591.900000348687&request_to_impression_Viewable=1996.400000527501&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:52 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
activeview
pagead2.googlesyndication.com/pcs/ Frame E30C
42 B
178 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvNoW6taN_PKa9RJJDIR20W3Dgz3P58vlQ4VeBlIZPJCvEFVSfMRjF40e73WNp5rX-4lf18fok0OavkWPzKMW36IigqIXSIiI8&sig=Cg0ArKJSzJ0l20AIANZ2EAE&id=osdim&ti=1&adk=2801771188&tt=1329&bs=1585,1200&mtos=1178,1178,1178,1178,1178&tos=1178,0,0,0,0&p=0,308,250,1278&mraid_race=1&mcvt=1178&rs=3&ht=0&tfs=146&tls=1324&mc=1&lte=1&bas=0&bac=0&la=1&avms=geo&bos=1600,1200&ps=1585,3219&ss=1600,1200&pt=-1&deb=1-0-2-9-6--1-19-4&tvt=1183&op=1&r=v&uc=9&tgt=BODY&cl=0&cec=9&clc=0&cac=0&cd=970x254&v=r20180502
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 09 May 2018 13:23:52 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
hq="googleads.g.doubleclick.net:443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=b7fb0cfa-121a-c548-d35d-1f367a2777ff&tv={c:c7HEIn,pingTime:1,time:1453,type:p,clog:[{piv:100,vs:i,r:,w:300,h:600,t:311}],rt:1,cb:0,th:0,es:0,sa:1,sc:1,ha:1,fif:1,gm:1,slTimes:{i:1453,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:310,wc:0.0.1600.1200,ac:1063.350.300.600,am:i,cc:1063.350.300.600,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[1162~100],as:[1162~300.600]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:51,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|141511|141512|141513|141514|141515|141516|1416|15|16*.8158|161|171|172|173|174|175|18,idMap:16*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:52 GMT
X-Server-Name
dt30ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=b7fb0cfa-121a-c548-d35d-1f367a2777ff&tv={c:c7HEIn,pingTime:1,time:1453,type:pf,clog:[{piv:100,vs:i,r:,w:300,h:600,t:311}],rt:1,cb:0,th:0,es:0,sa:1,sc:1,ha:1,fif:1,gm:1,slTimes:{i:1453,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:310,wc:0.0.1600.1200,ac:1063.350.300.600,am:i,cc:1063.350.300.600,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[1162~100],as:[1162~300.600]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:51,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|141511|141512|141513|141514|141515|141516|1416|15|16*.8158|161|171|172|173|174|175|18,idMap:16*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:52 GMT
X-Server-Name
dt37ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=b7fb0cfa-121a-c548-d35d-1f367a2777ff&tv={c:c7HEIn,pingTime:1,time:1454,type:c,clog:[{piv:100,vs:i,r:,w:300,h:600,t:311}],rt:1,cb:0,th:0,es:0,sa:1,sc:1,ha:1,fif:1,gm:1,slTimes:{i:1454,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:310,wc:0.0.1600.1200,ac:1063.350.300.600,am:i,cc:1063.350.300.600,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[1163~100],as:[1163~300.600]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:51,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|141511|141512|141513|141514|141515|141516|1416|15|16*.8158|161|171|172|173|174|175|18,idMap:16*,metricId:publ1}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:52 GMT
X-Server-Name
dt02ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=b7fb0cfa-121a-c548-d35d-1f367a2777ff&tv={c:c7HEIo,pingTime:1,time:1454,type:c,clog:[{piv:100,vs:i,r:,w:300,h:600,t:311}],rt:1,cb:0,th:0,es:0,sa:1,sc:1,ha:1,fif:1,gm:1,slTimes:{i:1454,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:310,wc:0.0.1600.1200,ac:1063.350.300.600,am:i,cc:1063.350.300.600,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[1163~100],as:[1163~300.600]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:51,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|141511|141512|141513|141514|141515|141516|1416|15|16*.8158|161|171|172|173|174|175|18,idMap:16*,metricId:grpm1}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:53 GMT
X-Server-Name
dt64ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
layout_renderer.php
as.jivox.com/unit/ Frame 38F3
0
0
Document
General
Full URL
https://as.jivox.com/unit/layout_renderer.php?creativeUnitType=22&bDim=300x600&bUnitId=2200&siteId=554580bc721c8d&campaignId=121634&es_pId=2S1b4J&jvxVer=2&cMacro=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%253Fxai%253DAKAOjssy4RmHFs9-pv_pnkyypDdE3QH1q3xqo7f_MeUcsypqyNoBGCvI3jSPc0p9ih_yM0QvR5VY8Yq524hmsqFWY9hEl-aE5tAj52RkVM6n0U3AQosuxQUzIAp3tgvuCba1htpHeCKztfc8kvIVK-CgDiWhqdIyeEz7--5NgC2f2-_sAsIuolD9uwv4Az-SSlfCr5LfjTvDOB07UCKs89gAHpNlpVk5Mc-7Q7zIseW5QD_Lxz_R8stR%2526sai%253DAMfl-YTrCszRXQyenWiosaIpO-9yQNPneAT1VTEdi1wd6QLxqEjZokyUWnjjzzYhm2CL5hbqU0_hC2YqZXzpG5b7WNp4yVqlI0TQ7vjUhSr4lIF0qQxhZhhBYUgkcho%2526sig%253DCg0ArKJSzFcSIsun1I8NEAE%2526urlfix%253D1%2526adurl%253D&r=96026286&objectName=jvx_5af2f667d2f9f&adUnitId=2200&jvxSessionId=1525872231.9372&delayLoad=0&base=1&pageURL=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&allowExp=0
Requested by
Host: as.jivox.com
URL: https://as.jivox.com/unit/unit_renderer.php?creativeUnitType=22&bDim=300x600&bUnitId=2200&siteId=554580bc721c8d&campaignId=121634&es_pId=2S1b4J&jvxVer=2&cMacro=https://adclick.g.doubleclick.net/pcs/click%253Fxai%253DAKAOjssy4RmHFs9-pv_pnkyypDdE3QH1q3xqo7f_MeUcsypqyNoBGCvI3jSPc0p9ih_yM0QvR5VY8Yq524hmsqFWY9hEl-aE5tAj52RkVM6n0U3AQosuxQUzIAp3tgvuCba1htpHeCKztfc8kvIVK-CgDiWhqdIyeEz7--5NgC2f2-_sAsIuolD9uwv4Az-SSlfCr5LfjTvDOB07UCKs89gAHpNlpVk5Mc-7Q7zIseW5QD_Lxz_R8stR%2526sai%253DAMfl-YTrCszRXQyenWiosaIpO-9yQNPneAT1VTEdi1wd6QLxqEjZokyUWnjjzzYhm2CL5hbqU0_hC2YqZXzpG5b7WNp4yVqlI0TQ7vjUhSr4lIF0qQxhZhhBYUgkcho%2526sig%253DCg0ArKJSzFcSIsun1I8NEAE%2526urlfix%253D1%2526adurl%253D&r=96026286
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.225.180.43 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-225-180-43.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/5.5.9-1ubuntu4.21
Resource Hash

Request headers

Host
as.jivox.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Accept-Encoding
gzip, deflate
Cookie
jvxsync=qRyAnLqtIogR; jvxtpdsync=1525872232439
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
2D5DECD46A8B57E996CBE47FA6383F74
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/

Response headers

Cache-Control
no-cache
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Wed, 09 May 2018 13:23:53 GMT
Expires
Mon, 26 Jul 1997 05:00:00 GMT
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Pragma
no-cache
Server
Apache/2.4.7 (Ubuntu)
Vary
Accept-Encoding
X-Powered-By
PHP/5.5.9-1ubuntu4.21
Content-Length
28248
Connection
keep-alive
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A53.096Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3200&pSw=1600&pSh=1200&uID=1bb592fc-fb7f-43bf-adc7-9f4285f1e123&sID=0c221406-9dc9-4b5d-a5a8-b2b65fd65f9a&pID=105076ee-7690-45a6-a29a-e99e6c046622&uDt=desktop&aam_uuid=89714132033937251582783532736963186817&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=3bad4371-45ef-4a9a-84eb-66044ffe0b21&content_uri=default&image_avg_surface=428800&image_count=1&image_surface=428800&server=production&vp_height=1200&vp_width=1585&created=1952.5000005960464&staged=1971.2000004947186&pageload_to_staged=1971.2000004947186&channel=default&ctx_template=article&id=1525872230605ilgvwarj5eezky712hqshcbw3j8qm7&instance=0&name=siderail_0&position_fold=atf&position_xy=0x0&request_number=1&tags=section_information_technology_discipline_hacking_2_windows_8_default_exploits_microsoft_3_patch_tuesday_vulnerabilities_windows&template=article&type=siderail&CNS_init=596.2000004947186&suffix=dart&CNS_init_to_staged=1375&inViewport=1976.5000008046627&pageLoad_to_in_viewport=1380.3000003099442&isRefresh=true&is_first_Request=true&requested=2178.3000007271767&pageLoad_to_requested=2178.3000007271767&CNS_init_to_requested=1582.1000002324581&rendered=2734.9999994039536&advertiser_id=1465709575&creative_id=138232004643&creative_type=sized&line_item_id=4659201553&order_id=557266375&rendered_size=300x600&request_to_rendered=556.6999986767769&top_unit_id=14232775&unit_id=32963455&is_first_rendered=true&pageLoad_to_rendered=2734.9999994039536&CNS_init_to_rendered=2138.799998909235&impression_Viewable=4443.600000813603&in_viewport_to_visible_change=2467.1000000089407&pageLoad_to_gpt_viewable=4443.600000813603&CNS_init_to_impression_Viewable=3847.400000318885&request_to_impression_Viewable=2265.3000000864267&ver_cns_ads=2_18_2&device=desktop&cns=2_25_2&_logType=info&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:53 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
activeview
pagead2.googlesyndication.com/pcs/ Frame C39C
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstdqv8tFUHZQCj-x2NxDYPY-6A9Z_uNYJFBzko-ulEOXvtROjnDtGXO0aT72UXBbMLljvJEA0q5w1UJnBXytsHTGbIhUhw1644&sig=Cg0ArKJSzGaS4kFH-VFCEAE&id=osdim&ti=1&adk=2097200797&tt=1584&bs=1585,1200&mtos=1008,1008,1008,1008,1008&tos=1008,0,0,0,0&p=350,1063,950,1363&mraid_race=1&mcvt=1008&rs=3&ht=0&tfs=571&tls=1579&mc=1&lte=1&bas=0&bac=0&avms=geo&bos=1600,1200&ps=1585,3219&ss=1600,1200&pt=-1&deb=1-0-2-14-7--1-23-5&tvt=1438&op=1&r=v&uc=5&tgt=DIV&cl=1&cec=10&clc=1&cac=0&cd=300x600&v=r20180502
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
SPDY
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 09 May 2018 13:23:53 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
hq="googleads.g.doubleclick.net:443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="43,42,41,39,35",hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=0&q=0&hp=1&kq=1&lo=3&qs=1&ak=https%3A%2F%2Fas.jivox.com%2Funit%2Flayout_renderer.php%3FcreativeUnitType%3D22%26bDim%3D300x600%26bUnitId%3D2200%26siteId%3D554580bc721c8d%26campaignId%3D121634%26es_pId%3D2S1b4J%26jvxVer%3D2%26cMacro%3Dhttps%253A%252F%252Fadclick.g.doubleclick.net%252Fpcs%252Fclick%25253Fxai%25253DAKAOjssy4RmHFs9-pv_pnkyypDdE3QH1q3xqo7f_MeUcsypqyNoBGCvI3jSPc0p9ih_yM0QvR5VY8Yq524hmsqFWY9hEl-aE5tAj52RkVM6n0U3AQosuxQUzIAp3tgvuCba1htpHeCKztfc8kvIVK-CgDiWhqdIyeEz7--5NgC2f2-_sAsIuolD9uwv4Az-SSlfCr5LfjTvDOB07UCKs89gAHpNlpVk5Mc-7Q7zIseW5QD_Lxz_R8stR%252526sai%25253DAMfl-YTrCszRXQyenWiosaIpO-9yQNPneAT1VTEdi1wd6QLxqEjZokyUWnjjzzYhm2CL5hbqU0_hC2YqZXzpG5b7WNp4yVqlI0TQ7vjUhSr4lIF0qQxhZhhBYUgkcho%252526sig%25253DCg0ArKJSzFcSIsun1I8NEAE%252526urlfix%25253D1%252526adurl%25253D%26r%3D96026286%26objectName%3Djvx_5af2f667d2f9f%26adUnitId%3D2200%26jvxSessionId%3D1525872231.9372%26delayLoad%3D0%26base%3D1%26pageURL%3Dhttps%253A%252F%252Farstechnica.com%252Finformation-technology%252F2018%252F05%252Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%252F%26allowExp%3D0&i=CONDECW3&ud=false&ue=false&uu=false&qm=0&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D%5B%3B1RX%25lQMV9%22W6~P6Jn)s)%3Ee3wW0uC%2BA5%3Deu!LfBB2%2B%7BLT7%25%40qwMoI3%2B%3BggqhB3U4(%5B*rUo81C%24k%25zrI81V5.NO)Wx%7C*G%24%3D!L2tEKm3MAJ1%5D6WAJN3NZ_h)G%3E3%5D*lTr1W*d%5B4kf%2FLyUoRdByZ%3ClF&qp=00000&qq=000000000000&qr=0&is=BmCCkSBBBBBBbBBBBq6YYNCu3NB8Qwk0Bv34mCeCC4g6miE2wif6W0lBg1SfTBBBBBBeUIBCyBMBBvBUtBWx6jHdBBfXe8kBPB2kc3MMpFBTaBBBBBBBBBBBtsWaBBBHCa5iWeWSBM31KJPlglCCFMWFpcxaBCNBZnuBBOFeBCBBblBBBBBBBBBBoXjTr93nNa0B3BBJBBzBPBBBkDDVCDCCDCDDCCCC0GuBeEES8DDBqBCBqeMFB&iv=5&vf=1&vg=100&gz=0&hh=0&hn=0&qt=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&h=600&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cm=23&zMoatPS=siderail_0&zMoatKW=microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild&zMoatPT=article&zMoatST=siderail&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatCNS=2_25_2&zMoatRFSH=Refresh%20Not%20Defined&zMoatSZ=300x600&zMoatKWPos=Undefined&f=0&j=&o=3&t=1525872232062&de=410762890877&cu=1525872232062&m=1555&ar=4c90a2e-clean&cb=0&ll=2&lm=0&ln=1&dl=0&dm=1000&dn=0&gh=1&tw=%60w.(%60M*%2F.K&td=1&qa=1600&qb=1200&qi=1600&qj=1200&qf=1600&qe=1200&qh=1600&qg=1200&lk=undefined&lb=3219&le=1&gm=1&io=1&ct=undefined&as=0&ag=54&an=0&gf=54&gg=0&ez=1&aj=1&pg=100&pf=0&ib=0&ic=0&cc=0&bw=54&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&bu=108&cd=0&ah=108&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=1465709575%3A557266375%3A4659201553%3A138232004643&zMoatPlacID=32963455&bo=14232775&bp=32963455&bd=Undefined&zMoatNoRFSH=true&dfp=0%2C1&la=32963455&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=0%3A1%3A1600%3A1200%3A0&fs=143783&na=1736240771&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
174.129.90.180 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-174-129-90-180.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:53 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
/
arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/ Frame C39C
37 KB
37 KB
Image
General
Full URL
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1525871700
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Chicago, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:path
/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
pragma
no-cache
cookie
aamconde=conde%3Dsv; aam_optimizely=aam%3D226821; aam_uuid=89714132033937251582783532736963186817; CN_sp=1bb592fc-fb7f-43bf-adc7-9f4285f1e123; CN_su=8a2d86e6-a429-47bc-87e5-000e2097a8d2; pID=105076ee-7690-45a6-a29a-e99e6c046622; sID=0c221406-9dc9-4b5d-a5a8-b2b65fd65f9a
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
arstechnica.com
referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
:scheme
https
:method
GET
Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Wed, 09 May 2018 13:23:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx
strict-transport-security
max-age=300
content-type
text/html; charset=UTF-8
status
200
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
link
<https://arstechnica.com/wp-json/>; rel="https://api.w.org/"
x-ars-server
web209
x-xss-protection
1; mode=block
event
condenast.demdex.net/
5 KB
2 KB
Script
General
Full URL
https://condenast.demdex.net/event?d_nsid=0&d_ld=_ts%3D1525872234693&d_rtbd=json&d_jsonv=1&d_dst=1&d_cb=demdexRequestCallback_0_1525872234693&c_viewability=1
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/s-code-contents-566dcf5046f148f38d0aa32bf73df40db7ae7768.js
Protocol
HTTP/1.1
Server
52.212.113.202 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-113-202.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
feb552e7745b26002c4557f2411ed34c443d776eb208ef81e944b16e8a656ea3

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

DCS
irl1-prod-dcs-07d2ad19b91750173.edge-irl1.demdex.com 5.29.2.20180509123001 6ms
Pragma
no-cache
Date
Wed, 09 May 2018 13:23:54 GMT
Content-Encoding
gzip
X-TID
qbYkgRrYTOc=
Vary
Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
application/javascript; charset=UTF-8
Content-Length
1325
Expires
Thu, 01 Jan 2009 00:00:00 GMT
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=37&q=0&hp=1&kq=1&lo=3&qs=1&ak=-&i=CONDECW3&ud=false&ue=false&uu=false&qm=0&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D%5B%3B1RX%25lQMV9%22W6~P6Jn)s)%3Ee3wW0uC%2BA5%3Deu!LfBB2%2B%7BLT7%25%40qwMoI3%2B%3BggqhB3U4(%5B*rUo81C%24k%25zrI81V5.NO)Wx%7C*G%24%3D!L2tEKm3MAJ1%5D6WAJN3NZ_h)G%3E3%5D*lTr1W*d%5B4kf%2FLyUoRdByZ%3ClF&qp=00000&qq=000000000000&qr=0&is=BmCCkSBBBBBBbBBBBq6YYNCu3NB8Qwk0Bv34mCeCC4g6miE2wif6W0lBg1SfTBBBBBBeUIBCyBMBBvBUtBWx6jHdBBfXe8kBPB2kc3MMpFBTaBBBBBBBBBBBtsWaBBBHCa5iWeWSBM31KJPlglCCFMWFpcxaBCNBZnuBBOFeBCBBblBBBBBBBBBBoXjTr93nNa0B3BBJBBzBPBBBkDDVCDCCDCDDCCCC0GuBeEES8DDBqBCBqeMFB&iv=5&vf=1&vg=100&gz=0&hh=0&hn=0&qt=0&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&h=600&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cm=23&zMoatPS=siderail_0&zMoatKW=microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild&zMoatPT=article&zMoatST=siderail&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatCNS=2_25_2&zMoatRFSH=Refresh%20Not%20Defined&zMoatSZ=300x600&zMoatKWPos=Undefined&f=0&j=&o=3&t=1525872232062&de=410762890877&cu=1525872232062&m=2624&ar=4c90a2e-clean&cb=0&ll=2&lm=0&ln=1&dl=0&dm=1000&dn=0&gh=1&tw=%60w.(%60M*%2F.K&td=1&qa=1600&qb=1200&qi=1600&qj=1200&qf=1600&qe=1200&qh=1600&qg=1200&lk=undefined&lb=3219&le=1&gm=1&io=1&ct=undefined&as=1&ag=1150&an=54&gi=1&gf=1150&gg=54&ez=1&ck=1150&kw=1003&aj=1&pg=100&pf=100&ib=0&ic=1051&cc=1&bw=1150&bx=54&ci=1150&jz=1003&dj=1&aa=1&ad=1051&cn=0&gn=1&gk=1051&gl=0&co=1051&cp=1003&cq=1&im=1&in=1&pd=0&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&bu=1003&cd=108&ah=1003&am=108&rf=0&re=0&wb=1&cl=0&at=0&d=1465709575%3A557266375%3A4659201553%3A138232004643&zMoatPlacID=32963455&bo=14232775&bp=32963455&bd=Undefined&zMoatNoRFSH=true&dfp=0%2C1&la=32963455&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=0%3A1%3A1600%3A1200%3A0&fs=143783&na=2087485532&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
174.129.90.180 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-174-129-90-180.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:54 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=37&q=1&hp=1&kq=1&lo=3&qs=1&ak=-&i=CONDECW3&ud=false&ue=false&uu=false&qm=0&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D%5B%3B1RX%25lQMV9%22W6~P6Jn)s)%3Ee3wW0uC%2BA5%3Deu!LfBB2%2B%7BLT7%25%40qwMoI3%2B%3BggqhB3U4(%5B*rUo81C%24k%25zrI81V5.NO)Wx%7C*G%24%3D!L2tEKm3MAJ1%5D6WAJN3NZ_h)G%3E3%5D*lTr1W*d%5B4kf%2FLyUoRdByZ%3ClF&qp=00000&qq=000000000000&qr=0&is=BmCCkSBBBBBBbBBBBq6YYNCu3NB8Qwk0Bv34mCeCC4g6miE2wif6W0lBg1SfTBBBBBBeUIBCyBMBBvBUtBWx6jHdBBfXe8kBPB2kc3MMpFBTaBBBBBBBBBBBtsWaBBBHCa5iWeWSBM31KJPlglCCFMWFpcxaBCNBZnuBBOFeBCBBblBBBBBBBBBBoXjTr93nNa0B3BBJBBzBPBBBkDDVCDCCDCDDCCCC0GuBeEES8DDBqBCBqeMFB&iv=5&vf=1&vg=100&gz=0&hh=0&hn=0&qt=0&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&h=600&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cm=23&zMoatPS=siderail_0&zMoatKW=microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild&zMoatPT=article&zMoatST=siderail&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatCNS=2_25_2&zMoatRFSH=Refresh%20Not%20Defined&zMoatSZ=300x600&zMoatKWPos=Undefined&f=0&j=&o=3&t=1525872232062&de=410762890877&cu=1525872232062&m=2626&ar=4c90a2e-clean&cb=0&ll=2&lm=0&ln=1&dl=0&dm=1000&dn=0&gh=1&tw=%60w.(%60M*%2F.K&td=1&qa=1600&qb=1200&qi=1600&qj=1200&qf=1600&qe=1200&qh=1600&qg=1200&lk=undefined&lb=3219&le=1&gm=1&io=1&ct=undefined&as=1&ag=1150&an=1150&gi=1&gf=1150&gg=1150&ez=1&ck=1150&kw=1003&aj=1&pg=100&pf=100&ib=0&ic=1051&cc=1&bw=1150&bx=1150&ci=1150&jz=1003&dj=1&aa=1&ad=1051&cn=1051&gn=1&gk=1051&gl=1051&co=1051&cp=1003&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&bu=1003&cd=1003&ah=1003&am=1003&rf=0&re=0&wb=1&cl=0&at=0&d=1465709575%3A557266375%3A4659201553%3A138232004643&zMoatPlacID=32963455&bo=14232775&bp=32963455&bd=Undefined&zMoatNoRFSH=true&dfp=0%2C1&la=32963455&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=0%3A1%3A1600%3A1200%3A0&fs=143783&na=114288195&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
174.129.90.180 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-174-129-90-180.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:54 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=5&q=0&hp=1&kq=1&lo=3&qs=1&ak=-&i=CONDECW3&ud=false&ue=false&uu=false&qm=0&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D%5B%3B1RX%25lQMV9%22W6~P6Jn)s)%3Ee3wW0uC%2BA5%3Deu!LfBB2%2B%7BLT7%25%40qwMoI3%2B%3BggqhB3U4(%5B*rUo81C%24k%25zrI81V5.NO)Wx%7C*G%24%3D!L2tEKm3MAJ1%5D6WAJN3NZ_h)G%3E3%5D*lTr1W*d%5B4kf%2FLyUoRdByZ%3ClF&qp=00000&qq=000000000000&qr=0&is=BmCCkSBBBBBBbBBBBq6YYNCu3NB8Qwk0Bv34mCeCC4g6miE2wif6W0lBg1SfTBBBBBBeUIBCyBMBBvBUtBWx6jHdBBfXe8kBPB2kc3MMpFBTaBBBBBBBBBBBtsWaBBBHCa5iWeWSBM31KJPlglCCFMWFpcxaBCNBZnuBBOFeBCBBblBBBBBBBBBBoXjTr93nNa0B3BBJBBzBPBBBkDDVCDCCDCDDCCCC0GuBeEES8DDBqBCBqeMFB&iv=5&vf=1&vg=100&gz=0&hh=0&hn=0&qt=0&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&h=600&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cm=23&zMoatPS=siderail_0&zMoatKW=microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild&zMoatPT=article&zMoatST=siderail&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatCNS=2_25_2&zMoatRFSH=Refresh%20Not%20Defined&zMoatSZ=300x600&zMoatKWPos=Undefined&f=0&j=&o=3&t=1525872232062&de=410762890877&cu=1525872232062&m=2626&ar=4c90a2e-clean&cb=0&ll=2&lm=0&ln=1&dl=0&dm=1000&dn=0&gh=1&tw=%60w.(%60M*%2F.K&td=1&qa=1600&qb=1200&qi=1600&qj=1200&qf=1600&qe=1200&qh=1600&qg=1200&lk=undefined&lb=3219&le=1&gm=1&io=1&ct=undefined&as=1&ag=1150&an=1150&gi=1&gf=1150&gg=1150&ez=1&ck=1150&kw=1003&aj=1&pg=100&pf=100&ib=0&ic=1051&cc=1&bw=1150&bx=1150&ci=1150&jz=1003&dj=1&aa=1&ad=1051&cn=1051&gn=1&gk=1051&gl=1051&co=1051&cp=1003&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&bu=1003&cd=1003&ah=1003&am=1003&rf=0&re=0&wb=1&cl=0&at=0&d=1465709575%3A557266375%3A4659201553%3A138232004643&zMoatPlacID=32963455&bo=14232775&bp=32963455&bd=Undefined&zMoatNoRFSH=true&dfp=0%2C1&la=32963455&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=0%3A1%3A1600%3A1200%3A0&fs=143783&na=1615378818&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
174.129.90.180 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-174-129-90-180.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:54 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=37&q=2&hp=1&kq=1&lo=3&qs=1&ak=-&i=CONDECW3&ud=false&ue=false&uu=false&qm=0&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D%5B%3B1RX%25lQMV9%22W6~P6Jn)s)%3Ee3wW0uC%2BA5%3Deu!LfBB2%2B%7BLT7%25%40qwMoI3%2B%3BggqhB3U4(%5B*rUo81C%24k%25zrI81V5.NO)Wx%7C*G%24%3D!L2tEKm3MAJ1%5D6WAJN3NZ_h)G%3E3%5D*lTr1W*d%5B4kf%2FLyUoRdByZ%3ClF&qp=00000&qq=000000000000&qr=0&is=BmCCkSBBBBBBbBBBBq6YYNCu3NB8Qwk0Bv34mCeCC4g6miE2wif6W0lBg1SfTBBBBBBeUIBCyBMBBvBUtBWx6jHdBBfXe8kBPB2kc3MMpFBTaBBBBBBBBBBBtsWaBBBHCa5iWeWSBM31KJPlglCCFMWFpcxaBCNBZnuBBOFeBCBBblBBBBBBBBBBoXjTr93nNa0B3BBJBBzBPBBBkDDVCDCCDCDDCCCC0GuBeEES8DDBqBCBqeMFB&iv=5&vf=1&vg=100&gz=0&hh=0&hn=0&qt=0&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&h=600&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cm=23&zMoatPS=siderail_0&zMoatKW=microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild&zMoatPT=article&zMoatST=siderail&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatCNS=2_25_2&zMoatRFSH=Refresh%20Not%20Defined&zMoatSZ=300x600&zMoatKWPos=Undefined&f=0&j=&o=3&t=1525872232062&de=410762890877&cu=1525872232062&m=2627&ar=4c90a2e-clean&cb=0&ll=2&lm=0&ln=1&dl=0&dm=1000&dn=0&gh=1&tw=%60w.(%60M*%2F.K&td=1&qa=1600&qb=1200&qi=1600&qj=1200&qf=1600&qe=1200&qh=1600&qg=1200&lk=undefined&lb=3219&le=1&gm=1&io=1&ct=undefined&as=1&ag=1150&an=1150&gi=1&gf=1150&gg=1150&ez=1&ck=1150&kw=1003&aj=1&pg=100&pf=100&ib=0&ic=1051&cc=1&bw=1150&bx=1150&ci=1150&jz=1003&dj=1&aa=1&ad=1051&cn=1051&gn=1&gk=1051&gl=1051&co=1051&cp=1003&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&bu=1003&cd=1003&ah=1003&am=1003&rf=0&re=0&wb=1&cl=0&at=0&d=1465709575%3A557266375%3A4659201553%3A138232004643&zMoatPlacID=32963455&bo=14232775&bp=32963455&bd=Undefined&zMoatNoRFSH=true&dfp=0%2C1&la=32963455&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=0%3A1%3A1600%3A1200%3A0&fs=143783&na=23615841&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
174.129.90.180 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-174-129-90-180.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:55 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=9&q=0&hp=1&kq=1&lo=3&qs=1&ak=-&i=CONDECW3&ud=false&ue=false&uu=false&qm=0&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D%5B%3B1RX%25lQMV9%22W6~P6Jn)s)%3Ee3wW0uC%2BA5%3Deu!LfBB2%2B%7BLT7%25%40qwMoI3%2B%3BggqhB3U4(%5B*rUo81C%24k%25zrI81V5.NO)Wx%7C*G%24%3D!L2tEKm3MAJ1%5D6WAJN3NZ_h)G%3E3%5D*lTr1W*d%5B4kf%2FLyUoRdByZ%3ClF&qp=00000&qq=000000000000&qr=0&is=BmCCkSBBBBBBbBBBBq6YYNCu3NB8Qwk0Bv34mCeCC4g6miE2wif6W0lBg1SfTBBBBBBeUIBCyBMBBvBUtBWx6jHdBBfXe8kBPB2kc3MMpFBTaBBBBBBBBBBBtsWaBBBHCa5iWeWSBM31KJPlglCCFMWFpcxaBCNBZnuBBOFeBCBBblBBBBBBBBBBoXjTr93nNa0B3BBJBBzBPBBBkDDVCDCCDCDDCCCC0GuBeEES8DDBqBCBqeMFB&iv=5&vf=1&vg=100&gz=0&hh=0&hn=0&qt=0&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&h=600&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cm=23&zMoatPS=siderail_0&zMoatKW=microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild&zMoatPT=article&zMoatST=siderail&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatCNS=2_25_2&zMoatRFSH=Refresh%20Not%20Defined&zMoatSZ=300x600&zMoatKWPos=Undefined&f=0&j=&o=3&t=1525872232062&de=410762890877&cu=1525872232062&m=2629&ar=4c90a2e-clean&cb=0&ll=2&lm=0&ln=1&dl=0&dm=1000&dn=0&gh=1&tw=%60w.(%60M*%2F.K&td=1&qa=1600&qb=1200&qi=1600&qj=1200&qf=1600&qe=1200&qh=1600&qg=1200&lk=undefined&lb=3219&le=1&gm=1&io=1&ct=undefined&as=1&ag=1150&an=1150&gi=1&gf=1150&gg=1150&ez=1&ck=1150&kw=1003&aj=1&pg=100&pf=100&ib=0&ic=1051&cc=1&bw=1150&bx=1150&ci=1150&jz=1003&dj=1&aa=1&ad=1051&cn=1051&gn=1&gk=1051&gl=1051&co=1051&cp=1003&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&bu=1204&cd=1003&ah=1204&am=1003&rf=0&re=0&wb=1&cl=0&at=0&d=1465709575%3A557266375%3A4659201553%3A138232004643&zMoatPlacID=32963455&bo=14232775&bp=32963455&bd=Undefined&zMoatNoRFSH=true&dfp=0%2C1&la=32963455&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=0%3A1%3A1600%3A1200%3A0&fs=143783&na=1136460197&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
174.129.90.180 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-174-129-90-180.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:55 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2018-05-09T13%3A23%3A56.157Z&_t=timespent&cBr=Ars%20Technica&cCh=Biz%20%26amp%3B%20IT&cTi=Critical%20Windows%20bug%20fixed%20today%20is%20actively%20being%20exploited%20to%20hack%20users&cTy=report&cTp=ALLBRANDS_167%2C%20ALLBRANDS_28&cTpw=0.6920262436522664%2C%200.10349567539731558&cEnt=microsoft%2C%20windows%2C%20kaspersky%20lab%2C%20dan%20goodin%2C%20utc%2C%20ars%20orbital%20transmission%2C%20anton%20ivanov%2C%20internet%20explorer%2C%20sans%20institute%2C%20azure%20iot%20sdk&cEnw=1%2C%200.7284355509011137%2C%200.6092096796994252%2C%200.4007397229375761%2C%200.3706790067361101%2C%200.29669238171347656%2C%200.2900696709157858%2C%200.25053502104436054%2C%200.2441424923942869%2C%200.22164167356032832&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cCl=581&cId=1306129&cPd=2018-05-09T00%3A45%3A33.000Z&cPv=1&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRt=direct&pHp=%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3200&pSw=1600&pSh=1200&uID=310e96c4-2fea-4b93-9926-3c470f96cd48&uNw=1&uUq=1&pID=8ca48fdd-7499-4dcc-be50-f551e79921ee&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=general&xID=3bad4371-45ef-4a9a-84eb-66044ffe0b21&_v=5000&cKh=microsoft%2Cvulnerability%2Cwindows%2Cattacker%2Ckaspersky%20lab
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 09 May 2018 13:23:56 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=fe467184-79f5-0b57-e4ff-6888d82605f9&tv={c:c7HFI4,pingTime:5,time:5231,type:p,clog:[{piv:100,vs:i,r:,w:970,h:250,t:185}],rt:1,cb:0,th:0,es:0,sa:1,sc:0,ha:1,fif:1,gm:1,slTimes:{i:5231,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:184,wc:0.0.1600.1200,ac:308.0.970.250,am:i,cc:308.0.970.250,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[5067~100],as:[5067~970.250]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:49,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|14151|1416|15|16.8158|161|17*.8158|171|172|173|174|175|18,idMap:17*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:56 GMT
X-Server-Name
dt59ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=fe467184-79f5-0b57-e4ff-6888d82605f9&tv={c:c7HFI5,pingTime:5,time:5232,type:pf,clog:[{piv:100,vs:i,r:,w:970,h:250,t:185}],rt:1,cb:0,th:0,es:0,sa:1,sc:0,ha:1,fif:1,gm:1,slTimes:{i:5232,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:184,wc:0.0.1600.1200,ac:308.0.970.250,am:i,cc:308.0.970.250,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[5068~100],as:[5068~970.250]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:49,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|14151|1416|15|16.8158|161|17*.8158|171|172|173|174|175|18,idMap:17*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:56 GMT
X-Server-Name
dt34ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=b7fb0cfa-121a-c548-d35d-1f367a2777ff&tv={c:c7HFKT,pingTime:5,time:5453,type:p,clog:[{piv:100,vs:i,r:,w:300,h:600,t:311}],rt:1,cb:0,th:0,es:0,sa:1,sc:1,ha:1,fif:1,gm:1,slTimes:{i:5453,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:310,wc:0.0.1600.1200,ac:1063.350.300.600,am:i,cc:1063.350.300.600,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[5162~100],as:[5162~300.600]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:50,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|141511|141512|141513|141514|141515|141516|1416|15|16*.8158|161|171|172|173|174|175|18,idMap:16*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:56 GMT
X-Server-Name
dt35ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=b7fb0cfa-121a-c548-d35d-1f367a2777ff&tv={c:c7HFKT,pingTime:5,time:5453,type:pf,clog:[{piv:100,vs:i,r:,w:300,h:600,t:311}],rt:1,cb:0,th:0,es:0,sa:1,sc:1,ha:1,fif:1,gm:1,slTimes:{i:5453,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:310,wc:0.0.1600.1200,ac:1063.350.300.600,am:i,cc:1063.350.300.600,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[5162~100],as:[5162~300.600]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:50,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|141511|141512|141513|141514|141515|141516|1416|15|16*.8158|161|171|172|173|174|175|18,idMap:16*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:56 GMT
X-Server-Name
dt05ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=9&q=1&hp=1&kq=1&lo=3&qs=1&ak=-&i=CONDECW3&ud=false&ue=false&uu=false&qm=0&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D%5B%3B1RX%25lQMV9%22W6~P6Jn)s)%3Ee3wW0uC%2BA5%3Deu!LfBB2%2B%7BLT7%25%40qwMoI3%2B%3BggqhB3U4(%5B*rUo81C%24k%25zrI81V5.NO)Wx%7C*G%24%3D!L2tEKm3MAJ1%5D6WAJN3NZ_h)G%3E3%5D*lTr1W*d%5B4kf%2FLyUoRdByZ%3ClF&qp=00000&qq=000000000000&qr=0&is=BmCCkSBBBBBBbBBBBq6YYNCu3NB8Qwk0Bv34mCeCC4g6miE2wif6W0lBg1SfTBBBBBBeUIBCyBMBBvBUtBWx6jHdBBfXe8kBPB2kc3MMpFBTaBBBBBBBBBBBtsWaBBBHCa5iWeWSBM31KJPlglCCFMWFpcxaBCNBZnuBBOFeBCBBblBBBBBBBBBBoXjTr93nNa0B3BBJBBzBPBBBkDDVCDCCDCDDCCCC0GuBeEES8DDBqBCBqeMFB&iv=5&vf=1&vg=100&gz=0&hh=0&hn=0&qt=0&bq=0&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&h=600&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cm=23&zMoatPS=siderail_0&zMoatKW=microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild&zMoatPT=article&zMoatST=siderail&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatCNS=2_25_2&zMoatRFSH=Refresh%20Not%20Defined&zMoatSZ=300x600&zMoatKWPos=Undefined&f=0&j=&o=3&t=1525872232062&de=410762890877&cu=1525872232062&m=6652&ar=4c90a2e-clean&cb=0&ll=2&lm=0&ln=1&dl=0&dm=1000&dn=0&gh=1&tw=%60w.(%60M*%2F.K&td=1&qa=1600&qb=1200&qi=1600&qj=1200&qf=1600&qe=1200&qh=1600&qg=1200&lk=undefined&lb=3219&le=1&gm=1&io=1&ct=undefined&as=1&ag=5178&an=1150&gi=1&gf=5178&gg=1150&ez=1&ck=1150&kw=1003&aj=1&pg=100&pf=100&ib=0&ic=5079&cc=1&bw=5178&bx=1150&ci=1150&jz=1003&dj=1&aa=1&ad=5079&cn=1051&gn=1&gk=5079&gl=1051&co=1051&cp=1003&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&bu=5032&cd=1204&ah=5032&am=1204&rf=0&re=0&wb=2&cl=0&at=0&d=1465709575%3A557266375%3A4659201553%3A138232004643&zMoatPlacID=32963455&bo=14232775&bp=32963455&bd=Undefined&zMoatNoRFSH=true&dfp=0%2C1&la=32963455&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=0%3A1%3A1600%3A1200%3A0&fs=143783&na=2127210822&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
174.129.90.180 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-174-129-90-180.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:58 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=25&q=2&hp=1&kq=1&lo=3&qs=1&ak=https%3A%2F%2Fas.jivox.com%2Funit%2Flayout_renderer.php%3FcreativeUnitType%3D22%26bDim%3D300x600%26bUnitId%3D2200%26siteId%3D554580bc721c8d%26campaignId%3D121634%26es_pId%3D2S1b4J%26jvxVer%3D2%26cMacro%3Dhttps%253A%252F%252Fadclick.g.doubleclick.net%252Fpcs%252Fclick%25253Fxai%25253DAKAOjssy4RmHFs9-pv_pnkyypDdE3QH1q3xqo7f_MeUcsypqyNoBGCvI3jSPc0p9ih_yM0QvR5VY8Yq524hmsqFWY9hEl-aE5tAj52RkVM6n0U3AQosuxQUzIAp3tgvuCba1htpHeCKztfc8kvIVK-CgDiWhqdIyeEz7--5NgC2f2-_sAsIuolD9uwv4Az-SSlfCr5LfjTvDOB07UCKs89gAHpNlpVk5Mc-7Q7zIseW5QD_Lxz_R8stR%252526sai%25253DAMfl-YTrCszRXQyenWiosaIpO-9yQNPneAT1VTEdi1wd6QLxqEjZokyUWnjjzzYhm2CL5hbqU0_hC2YqZXzpG5b7WNp4yVqlI0TQ7vjUhSr4lIF0qQxhZhhBYUgkcho%252526sig%25253DCg0ArKJSzFcSIsun1I8NEAE%252526urlfix%25253D1%252526adurl%25253D%26r%3D96026286%26objectName%3Djvx_5af2f667d2f9f%26adUnitId%3D2200%26jvxSessionId%3D1525872231.9372%26delayLoad%3D0%26base%3D1%26pageURL%3Dhttps%253A%252F%252Farstechnica.com%252Finformation-technology%252F2018%252F05%252Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%252F%26allowExp%3D0&i=CONDECW3&ud=false&ue=false&uu=false&qm=0&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D%5B%3B1RX%25lQMV9%22W6~P6Jn)s)%3Ee3wW0uC%2BA5%3Deu!LfBB2%2B%7BLT7%25%40qwMoI3%2B%3BggqhB3U4(%5B*rUo81C%24k%25zrI81V5.NO)Wx%7C*G%24%3D!L2tEKm3MAJ1%5D6WAJN3NZ_h)G%3E3%5D*lTr1W*d%5B4kf%2FLyUoRdByZ%3ClF&qp=00000&qq=000000000000&qr=0&is=BmCCkSBBBBBBbBBBBq6YYNCu3NB8Qwk0Bv34mCeCC4g6miE2wif6W0lBg1SfTBBBBBBeUIBCyBMBBvBUtBWx6jHdBBfXe8kBPB2kc3MMpFBTaBBBBBBBBBBBtsWaBBBHCa5iWeWSBM31KJPlglCCFMWFpcxaBCNBZnuBBOFeBCBBblBBBBBBBBBBoXjTr93nNa0B3BBJBBzBPBBBkDDVCDCCDCDDCCCC0GuBeEES8DDBqBCBqeMFB&iv=5&vf=1&vg=100&gz=0&hh=0&hn=0&qt=0&bq=0&g=7&hq=0&hs=0&hu=0&hr=0&ht=0&h=600&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cm=23&zMoatPS=siderail_0&zMoatKW=microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild&zMoatPT=article&zMoatST=siderail&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatCNS=2_25_2&zMoatRFSH=Refresh%20Not%20Defined&zMoatSZ=300x600&zMoatKWPos=Undefined&f=0&j=&o=3&t=1525872232062&de=410762890877&cu=1525872232062&m=6853&ar=4c90a2e-clean&cb=0&ll=2&lm=0&ln=1&dl=0&dm=1000&dn=0&gh=1&tw=%60w.(%60M*%2F.K&td=1&qa=1600&qb=1200&qi=1600&qj=1200&qf=1600&qe=1200&qh=1600&qg=1200&lk=undefined&lb=3219&le=1&gm=1&io=1&ct=undefined&as=1&ag=5380&an=5178&gi=1&gf=5380&gg=5178&ez=1&ck=1150&kw=1003&aj=1&pg=100&pf=100&ib=0&ic=5281&cc=1&bw=5380&bx=5178&ci=1150&jz=1003&dj=1&aa=1&ad=5281&cn=5079&gn=1&gk=5281&gl=5079&co=1051&cp=1003&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&bu=5232&cd=5032&ah=5232&am=5032&rf=0&re=0&wb=2&cl=0&at=0&d=1465709575%3A557266375%3A4659201553%3A138232004643&zMoatPlacID=32963455&bo=14232775&bp=32963455&bd=Undefined&zMoatNoRFSH=true&dfp=0%2C1&la=32963455&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=0%3A1%3A1600%3A1200%3A0&fs=143783&na=227118304&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
174.129.90.180 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-174-129-90-180.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:23:58 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
/
srv-2018-05-09-13.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2018-05-09-13.pixel.parsely.com/plogger/?rand=1525872240985&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%22d404f802-ea79-42cb-ae43-cd76e8396b3a%22%2C%22parsely_site_uuid%22%3A%228e97969b-76e9-4d43-9046-28f5049b59fd%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&sref=&sts=1525872240985&slts=0&date=Wed+May+09+2018+13%3A24%3A00+GMT%2B0000+(UTC)&action=heartbeat&inc=5
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
52.204.137.72 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-204-137-72.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 09 May 2018 13:24:02 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=25&q=2&hp=1&kq=1&lo=0&qs=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fpagead%2Fimgad%3Fid%3DCICAgKDr_7na1gEQARgBMghNw8-jtWZpWg&i=CONDECW3&ud=false&ue=false&uu=false&qm=0&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D%5B%3B1RX%25lQMV9%22W6~P6Jn)s)%3Ee3wW0uC%2BA5%3Deu!LfBB2%2B%7BLT7%25%40qwMoI3%2B%3BggqhB3U4(%5B*rUo81C%24k%25zrI81V5.NO)Wx%7C*G%24%3D!L2tEKm3MAJ1%5D6WAJN3NZ_h)G%3E3%5D*lTr1W*d%5B4kf%2FLyUoRdByZ%3ClF&qp=00000&qq=000000000000&qr=0&is=BmCCkSBBBBBBbBBBBq6YYNCu3NB8Qwk0Bv34mCeCC4g6miE2wif6W0lBg1SfTBBBBBBeUIBCyBMBBvBUtBWx6jHdBBfXe8kBPB2kc3MMpFBTaBBBBBBBBBBBtsWaBBBHCa5iWeWSBM31KJPlglCCFMWFpcxaBCNBZnuBBOFeBCBBblBBBBBBBBBBoXjTr93nNa0B3BBJBBzBPBBBkDDVCDCCDCDDCCCC0GuBeEES8DDBqBCBqeMFB&iv=5&vf=1&vg=100&gz=0&hh=0&hn=0&qt=0&bq=0&g=8&hq=0&hs=0&hu=0&hr=0&ht=0&h=250&w=970&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cm=0&zMoatPS=post_nav_0&zMoatKW=microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild&zMoatPT=article&zMoatST=post_nav&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatCNS=2_25_2&zMoatRFSH=Refresh%20Not%20Defined&zMoatSZ=970x250&zMoatKWPos=Undefined&f=0&j=&o=3&t=1525872231572&de=480132504663&cu=1525872231572&m=10154&ar=4c90a2e-clean&cb=0&ll=2&lm=0&ln=1&dl=0&dm=1000&dn=0&gh=1&tw=%60w.(%60M*%2F.K&td=1&qa=1600&qb=1200&qi=1600&qj=1200&qf=1600&qe=1200&qh=1600&qg=1200&lk=undefined&lb=3219&le=1&gm=1&io=1&ct=undefined&as=1&ag=10126&an=5108&gi=1&gf=10126&gg=5108&ez=1&ck=1082&kw=891&aj=1&pg=100&pf=100&ib=0&ic=9994&cc=1&bw=10126&bx=5108&ci=1082&jz=891&dj=1&aa=1&ad=9994&cn=4976&gn=1&gk=9994&gl=4976&co=1155&cp=1092&cq=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&bu=9935&cd=4918&ah=9935&am=4918&rf=0&re=1&ft=4841&fv=4540&fw=514&wb=2&cl=0&at=0&d=4499729729%3A2263887985%3A4608023012%3A138231373993&zMoatPlacID=32963455&bo=14232775&bp=32963455&bd=Undefined&zMoatNoRFSH=true&dfp=0%2C1&la=32963455&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=0%3A1%3A1600%3A1200%3A0&fs=143783&zid=CICAgKDr_7na1gEQARgBMghNw8-jtWZpWg&na=1281989061&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
174.129.90.180 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-174-129-90-180.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:24:01 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=9&q=3&hp=1&kq=1&lo=3&qs=1&ak=-&i=CONDECW3&ud=false&ue=false&uu=false&qm=0&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D%5B%3B1RX%25lQMV9%22W6~P6Jn)s)%3Ee3wW0uC%2BA5%3Deu!LfBB2%2B%7BLT7%25%40qwMoI3%2B%3BggqhB3U4(%5B*rUo81C%24k%25zrI81V5.NO)Wx%7C*G%24%3D!L2tEKm3MAJ1%5D6WAJN3NZ_h)G%3E3%5D*lTr1W*d%5B4kf%2FLyUoRdByZ%3ClF&qp=00000&qq=000000000000&qr=0&is=BmCCkSBBBBBBbBBBBq6YYNCu3NB8Qwk0Bv34mCeCC4g6miE2wif6W0lBg1SfTBBBBBBeUIBCyBMBBvBUtBWx6jHdBBfXe8kBPB2kc3MMpFBTaBBBBBBBBBBBtsWaBBBHCa5iWeWSBM31KJPlglCCFMWFpcxaBCNBZnuBBOFeBCBBblBBBBBBBBBBoXjTr93nNa0B3BBJBBzBPBBBkDDVCDCCDCDDCCCC0GuBeEES8DDBqBCBqeMFB&iv=5&vf=1&vg=100&gz=0&hh=0&hn=0&qt=0&bq=0&g=8&hq=0&hs=0&hu=0&hr=0&ht=0&h=600&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cm=23&zMoatPS=siderail_0&zMoatKW=microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild&zMoatPT=article&zMoatST=siderail&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatCNS=2_25_2&zMoatRFSH=Refresh%20Not%20Defined&zMoatSZ=300x600&zMoatKWPos=Undefined&f=0&j=&o=3&t=1525872232062&de=410762890877&cu=1525872232062&m=11670&ar=4c90a2e-clean&cb=0&ll=2&lm=0&ln=1&dl=0&dm=1000&dn=0&gh=1&tw=%60w.(%60M*%2F.K&td=1&qa=1600&qb=1200&qi=1600&qj=1200&qf=1600&qe=1200&qh=1600&qg=1200&lk=undefined&lb=3219&le=1&gm=1&io=1&ct=undefined&as=1&ag=10196&an=5380&gi=1&gf=10196&gg=5380&ez=1&ck=1150&kw=1003&aj=1&pg=100&pf=100&ib=0&ic=10097&cc=1&bw=10196&bx=5380&ci=1150&jz=1003&dj=1&aa=1&ad=10097&cn=5281&gn=1&gk=10097&gl=5281&co=1051&cp=1003&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&bu=10050&cd=5232&ah=10050&am=5232&rf=0&re=0&wb=2&cl=0&at=0&d=1465709575%3A557266375%3A4659201553%3A138232004643&zMoatPlacID=32963455&bo=14232775&bp=32963455&bd=Undefined&zMoatNoRFSH=true&dfp=0%2C1&la=32963455&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=0%3A1%3A1600%3A1200%3A0&fs=143783&na=1857628407&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
174.129.90.180 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-174-129-90-180.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:24:03 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT
event
condenast.demdex.net/
5 KB
2 KB
Script
General
Full URL
https://condenast.demdex.net/event?d_nsid=0&d_ld=_ts%3D1525872246756&d_rtbd=json&d_jsonv=1&d_dst=1&d_cb=demdexRequestCallback_0_1525872246756&c_moatA=1
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/s-code-contents-566dcf5046f148f38d0aa32bf73df40db7ae7768.js
Protocol
HTTP/1.1
Server
52.212.113.202 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-113-202.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
b4a40a999287013fcbc3d6308c383d295ea3a057ac83c2aaef763fc337cd75fe

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

DCS
irl1-prod-dcs-080df4772.edge-irl1.demdex.com 5.29.1.20180508083900 6ms
Pragma
no-cache
Date
Wed, 09 May 2018 13:24:06 GMT
Content-Encoding
gzip
X-TID
18onQdWbR28=
Vary
Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
application/javascript; charset=UTF-8
Content-Length
1322
Expires
Thu, 01 Jan 2009 00:00:00 GMT
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=fe467184-79f5-0b57-e4ff-6888d82605f9&tv={c:c7HIjn,pingTime:15,time:15232,type:p,clog:[{piv:100,vs:i,r:,w:970,h:250,t:185}],rt:1,cb:0,th:0,es:0,sa:1,sc:0,ha:1,fif:1,gm:1,slTimes:{i:15232,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:184,wc:0.0.1600.1200,ac:308.0.970.250,am:i,cc:308.0.970.250,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[15068~100],as:[15068~970.250]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:43,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|14151|1416|15|16.8158|161|17*.8158|171|172|173|174|175|18,idMap:17*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:24:06 GMT
X-Server-Name
dt47ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=fe467184-79f5-0b57-e4ff-6888d82605f9&tv={c:c7HIjn,pingTime:15,time:15232,type:pf,clog:[{piv:100,vs:i,r:,w:970,h:250,t:185}],rt:1,cb:0,th:0,es:0,sa:1,sc:0,ha:1,fif:1,gm:1,slTimes:{i:15232,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:184,wc:0.0.1600.1200,ac:308.0.970.250,am:i,cc:308.0.970.250,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[15068~100],as:[15068~970.250]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:43,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|14151|1416|15|16.8158|161|17*.8158|171|172|173|174|175|18,idMap:17*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:24:06 GMT
X-Server-Name
dt46ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=b7fb0cfa-121a-c548-d35d-1f367a2777ff&tv={c:c7HImb,pingTime:15,time:15453,type:p,clog:[{piv:100,vs:i,r:,w:300,h:600,t:311}],rt:1,cb:0,th:0,es:0,sa:1,sc:1,ha:1,fif:1,gm:1,slTimes:{i:15453,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:310,wc:0.0.1600.1200,ac:1063.350.300.600,am:i,cc:1063.350.300.600,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[15162~100],as:[15162~300.600]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:48,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|141511|141512|141513|141514|141515|141516|1416|15|16*.8158|161|171|172|173|174|175|18,idMap:16*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:24:06 GMT
X-Server-Name
dt30ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
dt
dt.adsafeprotected.com/
43 B
303 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?anId=8158&asId=b7fb0cfa-121a-c548-d35d-1f367a2777ff&tv={c:c7HImb,pingTime:15,time:15453,type:pf,clog:[{piv:100,vs:i,r:,w:300,h:600,t:311}],rt:1,cb:0,th:0,es:0,sa:1,sc:1,ha:1,fif:1,gm:1,slTimes:{i:15453,o:0,n:0,pp:0,pm:0},slEvents:[{sl:i,t:310,wc:0.0.1600.1200,ac:1063.350.300.600,am:i,cc:1063.350.300.600,piv:100,obst:0,th:0,reas:,cmps:1,bkn:{piv:[15163~100],as:[15163~300.600]}}],slEventCount:1,em:true,fr:true,uf:0,e:,tt:jload,dtt:48,fm:qRyAnFw+11|12|13|1411|1412|1413|1414|141511|141512|141513|141514|141515|141516|1416|15|16*.8158|161|171|172|173|174|175|18,idMap:16*}&br=u
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
69.172.216.111 New York, United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:24:06 GMT
X-Server-Name
dt48ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
close
Content-Type
image/gif
Content-Length
43
Server
nginx
event
condenast.demdex.net/
5 KB
2 KB
Script
General
Full URL
https://condenast.demdex.net/event?d_nsid=0&d_ld=_ts%3D1525872248566&d_rtbd=json&d_jsonv=1&d_dst=1&d_cb=demdexRequestCallback_0_1525872248566&c_moatA=1
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/s-code-contents-566dcf5046f148f38d0aa32bf73df40db7ae7768.js
Protocol
HTTP/1.1
Server
52.212.113.202 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-212-113-202.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
0c12d52995c4b2ded60974d92546914c36135d7e4f836a4eb25c591f7fec137f

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

DCS
irl1-prod-dcs-0904558bf.edge-irl1.demdex.com 5.29.1.20180508083900 6ms
Pragma
no-cache
Date
Wed, 09 May 2018 13:24:08 GMT
Content-Encoding
gzip
X-TID
Wy/s4UjNTK8=
Vary
Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
transfer-encoding
chunked
Connection
keep-alive
Content-Type
application/javascript; charset=UTF-8
Expires
Thu, 01 Jan 2009 00:00:00 GMT
pixel.gif
v4.moatads.com/
43 B
312 B
Image
General
Full URL
https://v4.moatads.com/pixel.gif?e=9&q=4&hp=1&kq=1&lo=3&qs=1&ak=-&i=CONDECW3&ud=false&ue=false&uu=false&qm=0&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D%5B%3B1RX%25lQMV9%22W6~P6Jn)s)%3Ee3wW0uC%2BA5%3Deu!LfBB2%2B%7BLT7%25%40qwMoI3%2B%3BggqhB3U4(%5B*rUo81C%24k%25zrI81V5.NO)Wx%7C*G%24%3D!L2tEKm3MAJ1%5D6WAJN3NZ_h)G%3E3%5D*lTr1W*d%5B4kf%2FLyUoRdByZ%3ClF&qp=00000&qq=000000000000&qr=0&is=BmCCkSBBBBBBbBBBBq6YYNCu3NB8Qwk0Bv34mCeCC4g6miE2wif6W0lBg1SfTBBBBBBeUIBCyBMBBvBUtBWx6jHdBBfXe8kBPB2kc3MMpFBTaBBBBBBBBBBBtsWaBBBHCa5iWeWSBM31KJPlglCCFMWFpcxaBCNBZnuBBOFeBCBBblBBBBBBBBBBoXjTr93nNa0B3BBJBBzBPBBBkDDVCDCCDCDDCCCC0GuBeEES8DDBqBCBqeMFB&iv=5&vf=1&vg=100&gz=0&hh=0&hn=0&qt=0&bq=0&g=9&hq=0&hs=0&hu=0&hr=0&ht=0&h=600&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2018%2F05%2Fmicrosoft-patches-critical-windows-bug-actively-exploited-in-the-wild%2F&cm=23&zMoatPS=siderail_0&zMoatKW=microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild&zMoatPT=article&zMoatST=siderail&zMoatLL=Lazy%20Load%20Not%20Defined&zMoatCNS=2_25_2&zMoatRFSH=Refresh%20Not%20Defined&zMoatSZ=300x600&zMoatKWPos=Undefined&f=0&j=&o=3&t=1525872232062&de=410762890877&cu=1525872232062&m=16503&ar=4c90a2e-clean&cb=0&ll=2&lm=0&ln=1&dl=0&dm=1000&dn=0&gh=1&tw=%60w.(%60M*%2F.K&td=1&qa=1600&qb=1200&qi=1600&qj=1200&qf=1600&qe=1200&qh=1600&qg=1200&lk=undefined&lb=3219&le=1&gm=1&io=1&ct=undefined&as=1&ag=15029&an=10196&gi=1&gf=15029&gg=10196&ez=1&ck=1150&kw=1003&aj=1&pg=100&pf=100&ib=0&ic=14930&cc=1&bw=15029&bx=10196&ci=1150&jz=1003&dj=1&aa=1&ad=14930&cn=10097&gn=1&gk=14930&gl=10097&co=1051&cp=1003&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&bu=14883&cd=10050&ah=14883&am=10050&rf=0&re=0&wb=2&cl=0&at=0&d=1465709575%3A557266375%3A4659201553%3A138232004643&zMoatPlacID=32963455&bo=14232775&bp=32963455&bd=Undefined&zMoatNoRFSH=true&dfp=0%2C1&la=32963455&zMoatAltSL=bo%3AzMoatAdUnit2%3AzMoatAdUnit3&gw=condenastdfp9588492144&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=0%3A1%3A1600%3A1200%3A0&fs=143783&na=454892986&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
Protocol
HTTP/1.1
Server
174.129.90.180 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-174-129-90-180.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 09 May 2018 13:24:08 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:01 GMT

Verdicts & Comments Add Verdict or Comment

143 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ars object| digitalData object| cns object| BOOMR_mq object| Twig object| Arrive function| FPCountdown function| $ function| jQuery function| moment function| UAParser function| purl function| twig function| EvEmitter function| imagesLoaded function| transitionEnd object| _gaq function| Visitor object| _satellite object| s_c_il number| s_c_in function| skimlinksODPCallback function| skimlinksBeaconCallback function| skimlinksBeaconSecondaryCallback function| skimlinksBeaconAuxCallback object| __SKIM_JS_GLOBAL__ boolean| skimlinks_revenue_forecast number| skimlinks_requests_in_flight object| googletag function| moatCondeListener object| apstag object| headertag object| CN object| _4d object| SparrowCache function| arsData object| _cne object| PolarConde string| hash function| Sparrow object| _gat object| gaGlobal object| PARSELY object| __adIq_Config object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater object| NATIVEADS object| NATIVEADS_QUEUE function| _toConsumableArray function| _defineProperty function| _typeof function| _extends function| s_doPlugins function| s_getLoadTime boolean| _scObj object| scDil boolean| sc undefined| prop function| AppMeasurement function| s_gi function| s_pgicq object| s string| s_loadT function| DIL number| s_objectID number| s_giq number| vb function| headertag_render object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| ybotq object| yieldbot object| bouncex function| reload_campaigns function| setBounceCookie function| getBounceCookie function| setBounceVisitCookie function| getBounceVisitCookie function| clearBounceCookie boolean| sparrowInitialize object| _sparrow object| NATIVEADS_STORE string| FallsmGlobalObj function| ysfm object| ndg_tracker_info function| ndg function| vndg object| GPT_jstiming undefined| google_measure_js_timing boolean| google_noFetch boolean| google_DisableInitialLoad number| __google_ad_urls_id function| UrlChangeTracker function| getPath object| urlTracker function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| googleCompanionsServicePresent function| googleGetCompanionAdSlots function| googleSetCompanionAdContents function| google_show_companion_ad function| google_show_companion_ad_in_slot function| google_get_companion_slot_params function| google_companion_error function| google_companion_loaded function| google_increment_num_ad_mouseovers string| google_ad_output string| google_ad_client string| google_flash_version boolean| google_webgl_support string| google_ad_section string| google_country object| __core-js_shared__ object| core number| d function| AppMeasurement_Module_DIL object| s_i_conde-arstechnica function| demdexRequestCallback_0_1525872230546 number| google_unique_id object| closure_memoize_cache_ object| __google_ad_urls object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure object| Moat#G26 boolean| Moat#EVA object| MoatSuperV26 function| demdexRequestCallback_0_1525872232686 function| demdexRequestCallback_0_1525872234693 function| demdexRequestCallback_0_1525872246756 function| demdexRequestCallback_0_1525872248566 function| arrive function| unbindArrive function| leave function| unbindLeave

0 Cookies

2 Console Messages

Source Level URL
Text
console-api warning URL: https://player.cnevids.com/interlude/arstechnica.js(Line 2)
Message:
CNE Player: no interlude for "information-technology/2018/05/microsoft-patches-critical-windows-bug-actively-exploited-in-the-wild" ("No available slot found.")
console-api debug URL: https://static.adsafeprotected.com/sca.17.4.72.js(Line 32)
Message:
a: 0.001953125ms

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

4d.condenastdigital.com
aax-eu.amazon-adsystem.com
aax.amazon-adsystem.com
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
arstechnica.com
as-sec.casalemedia.com
as.jivox.com
assets.adobedtm.com
assets.bounceexchange.com
c.amazon-adsystem.com
capture.condenastdigital.com
cdn.accelerator.arsdev.net
cdn.arstechnica.net
cdn.mediavoice.com
cdn.ndg.io
cdn.yldbt.com
cm.everesttech.net
condenast.demdex.net
d.turn.com
d1z2jf7jlzjs58.cloudfront.net
dpm.demdex.net
dt.adsafeprotected.com
evs.jivox.com
fallsm.ndg.io
i.yldbt.com
infinityid.condenastdigital.com
js-sec.indexww.com
meraxes-cdn.polarmobile.com
mid.rkdms.com
odb.outbrain.com
p.skimresources.com
pagead2.googlesyndication.com
pixel.adsafeprotected.com
pixel.condenastdigital.com
player.cnevids.com
playercdn.jivox.com
plugin.mediavoice.com
r.skimresources.com
s.skimresources.com
securepubads.g.doubleclick.net
segment-data.zqtk.net
srv-2018-05-09-13.config.parsely.com
srv-2018-05-09-13.pixel.parsely.com
ssl.google-analytics.com
sstats.arstechnica.com
static.adsafeprotected.com
stats.g.doubleclick.net
sync.jivox.com
t.skimresources.com
tag.bounceexchange.com
tapestry.tapad.com
tpc.googlesyndication.com
v4.moatads.com
widgets.outbrain.com
www.googletagservices.com
z.moatads.com
13.32.14.112
151.101.12.239
151.101.14.2
151.101.14.202
152.195.39.114
172.217.18.2
172.217.23.129
172.217.23.130
174.129.90.180
184.30.208.157
2.18.233.142
2.18.233.185
2.18.234.190
2.18.234.21
2.18.235.40
205.234.175.175
216.58.207.66
216.58.208.40
34.202.134.243
34.207.27.213
34.251.6.224
35.153.11.94
35.186.234.100
35.190.59.101
35.190.91.160
46.228.164.13
50.16.249.185
50.17.209.9
50.31.169.131
52.0.42.186
52.201.40.242
52.204.137.72
52.212.113.202
52.222.147.52
52.222.148.125
52.222.149.25
52.222.152.6
52.222.156.165
52.25.247.124
52.85.254.3
52.94.220.16
54.154.30.221
54.164.243.144
54.165.0.24
54.225.180.43
54.230.14.115
54.230.14.205
54.230.14.213
54.84.139.180
63.140.41.50
66.117.28.86
69.172.216.111
69.172.216.55
69.172.216.58
74.125.206.154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