Submitted URL: https://threatpost.com/hackers-exploit=
Effective URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Submission: On March 24 via api from US

Summary

This website contacted 48 IPs in 7 countries across 38 domains to perform 230 HTTP transactions. The main IP is 35.173.160.135, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is threatpost.com.
TLS certificate: Issued by Thawte EV RSA CA 2018 on June 17th 2019. Valid for: a year.
This is the only time threatpost.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 20 35.173.160.135 14618 (AMAZON-AES)
11 99.84.5.39 16509 (AMAZON-02)
5 2606:4700:303... 13335 (CLOUDFLAR...)
25 2a00:1450:400... 15169 (GOOGLE)
7 2600:9000:21d... 16509 (AMAZON-02)
1 1 2a04:fa87:fff... 2635 (AUTOMATTIC)
1 192.0.77.2 2635 (AUTOMATTIC)
10 2600:9000:21d... 16509 (AMAZON-02)
1 4 2a00:1450:400... 15169 (GOOGLE)
21 185.220.204.204 41436 (CLOUDWEBM...)
7 172.217.22.98 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
4 69.173.144.141 26667 (RUBICONPR...)
4 185.33.223.83 29990 (ASN-APPNEX)
5 34.95.120.147 15169 (GOOGLE)
1 134.209.131.220 14061 (DIGITALOC...)
10 25 152.199.22.24 15133 (EDGECAST)
3 95.101.185.51 20940 (AKAMAI-ASN1)
1 3 216.52.2.30 29791 (VOXEL-DOT...)
4 185.64.189.112 62713 (AS-PUBMATIC)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a03:2880:f01... 32934 (FACEBOOK)
1 2a05:f500:11:... 14413 (LINKEDIN)
1 199.232.53.140 54113 (FASTLY)
1 2 2a00:1450:400... 15169 (GOOGLE)
1 91.228.74.143 27281 (QUANTCAST)
1 151.101.12.157 54113 (FASTLY)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 99.86.159.242 16509 (AMAZON-02)
1 2600:9000:21d... 16509 (AMAZON-02)
1 104.244.42.133 13414 (TWITTER)
2 2a00:1450:400... 15169 (GOOGLE)
21 185.127.19.170 210329 (CLOUDWEBM...)
3 52.58.103.169 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 2 91.228.74.203 27281 (QUANTCAST)
15 2a00:1450:400... 15169 (GOOGLE)
2 52.29.128.237 16509 (AMAZON-02)
7 2a00:1450:400... 15169 (GOOGLE)
2 104.109.78.125 20940 (AKAMAI-ASN1)
1 1 172.217.16.162 15169 (GOOGLE)
5 5 35.157.249.39 16509 (AMAZON-02)
1 5 3.126.56.137 16509 (AMAZON-02)
1 2 2a00:1288:110... 34010 (YAHOO-IRD)
2 3 52.51.104.248 16509 (AMAZON-02)
1 95.101.184.231 20940 (AKAMAI-ASN1)
1 1 206.189.254.17 14061 (DIGITALOC...)
1 205.185.216.10 20446 (HIGHWINDS3)
1 95.101.184.244 20940 (AKAMAI-ASN1)
1 104.244.42.67 13414 (TWITTER)
230 48
Apex Domain
Subdomains
Transfer
42 sekindo.com
live.sekindo.com
video.sekindo.com
4 MB
36 threatpost.com
threatpost.com
assets.threatpost.com
media.threatpost.com
934 KB
33 advertising.com
adserver-us.adtech.advertising.com
ads.adaptv.advertising.com
pixel.advertising.com
9 KB
28 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
409 KB
13 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
googleads.g.doubleclick.net
cm.g.doubleclick.net
95 KB
11 adlightning.com
tagan.adlightning.com
236 KB
8 rubiconproject.com
fastlane.rubiconproject.com
prebid-server.rubiconproject.com
eus.rubiconproject.com
7 KB
8 googletagservices.com
www.googletagservices.com
207 KB
7 yahoo.com
ups.analytics.yahoo.com
pr-bh.ybp.yahoo.com
6 KB
7 google.com
www.google.com
adservice.google.com
1 KB
5 pubmatic.com
hbopenbid.pubmatic.com
ads.pubmatic.com
292 B
5 openx.net
teachingaids-d.openx.net
u.openx.net
eu-u.openx.net
1 KB
5 adnxs.com
ib.adnxs.com
acdn.adnxs.com
4 KB
5 google.de
adservice.google.de
www.google.de
800 B
5 admetricspro.com
qd.admetricspro.com
163 KB
4 ampproject.org
cdn.ampproject.org
146 KB
3 adsrvr.org
match.adsrvr.org
1 KB
3 quantserve.com
secure.quantserve.com
pixel.quantserve.com
7 KB
3 lijit.com
ap.lijit.com
1 KB
3 casalemedia.com
as-sec.casalemedia.com
3 KB
2 googleapis.com
fonts.googleapis.com
1 KB
2 amazon-adsystem.com
c.amazon-adsystem.com
28 KB
2 google-analytics.com
www.google-analytics.com
18 KB
2 gstatic.com
www.gstatic.com
fonts.gstatic.com
104 KB
2 serverbid.com
e.serverbid.com
sync.serverbid.com
267 B
1 twitter.com
analytics.twitter.com
651 B
1 digitaloceanspaces.com
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
1 t.co
t.co
448 B
1 quantcount.com
rules.quantcount.com
354 B
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 reddit.com
www.reddit.com
1 KB
1 linkedin.com
www.linkedin.com
1 facebook.com
graph.facebook.com
525 B
1 googletagmanager.com
www.googletagmanager.com
24 KB
1 wp.com
i1.wp.com
65 B
1 gravatar.com
secure.gravatar.com
324 B
1 kasperskycontenthub.com
kasperskycontenthub.com
398 B
0 adap.tv Failed
sync.adap.tv Failed
230 38
Domain Requested by
25 adserver-us.adtech.advertising.com 10 redirects threatpost.com
21 video.sekindo.com threatpost.com
live.sekindo.com
21 live.sekindo.com threatpost.com
live.sekindo.com
19 threatpost.com 1 redirects threatpost.com
securepubads.g.doubleclick.net
17 pagead2.googlesyndication.com tagan.adlightning.com
pagead2.googlesyndication.com
threatpost.com
securepubads.g.doubleclick.net
11 tpc.googlesyndication.com tagan.adlightning.com
threatpost.com
cdn.ampproject.org
11 tagan.adlightning.com threatpost.com
tagan.adlightning.com
10 media.threatpost.com threatpost.com
8 www.googletagservices.com threatpost.com
tagan.adlightning.com
securepubads.g.doubleclick.net
7 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
threatpost.com
7 assets.threatpost.com threatpost.com
5 ups.analytics.yahoo.com 1 redirects threatpost.com
5 pixel.advertising.com 5 redirects
5 qd.admetricspro.com threatpost.com
4 googleads.g.doubleclick.net tagan.adlightning.com
pagead2.googlesyndication.com
4 cdn.ampproject.org securepubads.g.doubleclick.net
threatpost.com
4 hbopenbid.pubmatic.com qd.admetricspro.com
live.sekindo.com
4 ib.adnxs.com qd.admetricspro.com
live.sekindo.com
4 fastlane.rubiconproject.com qd.admetricspro.com
4 adservice.google.de tagan.adlightning.com
4 www.google.com 1 redirects threatpost.com
tagan.adlightning.com
3 match.adsrvr.org 2 redirects threatpost.com
3 adservice.google.com tagan.adlightning.com
3 ads.adaptv.advertising.com live.sekindo.com
3 ap.lijit.com 1 redirects qd.admetricspro.com
3 as-sec.casalemedia.com qd.admetricspro.com
live.sekindo.com
3 teachingaids-d.openx.net qd.admetricspro.com
live.sekindo.com
2 pr-bh.ybp.yahoo.com 1 redirects threatpost.com
2 eus.rubiconproject.com live.sekindo.com
qd.admetricspro.com
2 prebid-server.rubiconproject.com live.sekindo.com
2 pixel.quantserve.com 1 redirects threatpost.com
2 fonts.googleapis.com live.sekindo.com
2 c.amazon-adsystem.com live.sekindo.com
c.amazon-adsystem.com
2 www.google-analytics.com 1 redirects www.googletagmanager.com
1 analytics.twitter.com tagan.adlightning.com
1 eu-u.openx.net qd.admetricspro.com
1 ads.pubmatic.com qd.admetricspro.com
1 serverbid-sync.nyc3.cdn.digitaloceanspaces.com qd.admetricspro.com
1 sync.serverbid.com 1 redirects
1 acdn.adnxs.com qd.admetricspro.com
1 cm.g.doubleclick.net 1 redirects
1 u.openx.net live.sekindo.com
1 fonts.gstatic.com threatpost.com
1 t.co threatpost.com
1 rules.quantcount.com secure.quantserve.com
1 www.google.de threatpost.com
1 stats.g.doubleclick.net 1 redirects
1 static.ads-twitter.com www.googletagmanager.com
1 secure.quantserve.com www.googletagmanager.com
1 www.reddit.com threatpost.com
1 www.linkedin.com threatpost.com
1 graph.facebook.com threatpost.com
1 www.gstatic.com www.google.com
1 www.googletagmanager.com threatpost.com
1 e.serverbid.com qd.admetricspro.com
1 i1.wp.com threatpost.com
1 secure.gravatar.com 1 redirects
1 kasperskycontenthub.com threatpost.com
0 sync.adap.tv Failed threatpost.com
230 59
Subject Issuer Validity Valid
threatpost.com
Thawte EV RSA CA 2018
2019-06-17 -
2020-06-17
a year crt.sh
*.adlightning.com
Amazon
2019-08-19 -
2020-09-19
a year crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-02-04 -
2020-10-09
8 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
assets.threatpost.com
Amazon
2020-03-04 -
2021-04-04
a year crt.sh
kasperskycontenthub.com
Thawte RSA CA 2018
2019-06-14 -
2020-06-13
a year crt.sh
*.wp.com
Go Daddy Secure Certificate Authority - G2
2018-04-10 -
2020-05-11
2 years crt.sh
media.threatpost.com
Amazon
2020-03-04 -
2021-04-04
a year crt.sh
www.google.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
www.sekindo.com
Go Daddy Secure Certificate Authority - G2
2019-05-23 -
2020-06-18
a year crt.sh
*.google.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
*.openx.net
GeoTrust RSA CA 2018
2018-01-04 -
2020-07-09
3 years crt.sh
e.serverbid.com
Let's Encrypt Authority X3
2020-03-24 -
2020-06-22
3 months crt.sh
*.adtech.advertising.com
DigiCert SHA2 High Assurance Server CA
2018-05-22 -
2020-05-26
2 years crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2020-03-02 -
2021-04-01
a year crt.sh
*.lijit.com
Go Daddy Secure Certificate Authority - G2
2019-03-11 -
2020-05-10
a year crt.sh
*.pubmatic.com
Sectigo RSA Organization Validation Secure Server CA
2019-02-22 -
2021-02-21
2 years crt.sh
*.google-analytics.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-03-01 -
2020-05-30
3 months crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2019-11-21 -
2020-09-01
9 months crt.sh
*.reddit.com
DigiCert SHA2 Secure Server CA
2018-08-17 -
2020-09-02
2 years crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2019-10-04 -
2020-10-07
a year crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2019-08-14 -
2020-08-18
a year crt.sh
www.google.de
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
t.co
DigiCert SHA2 High Assurance Server CA
2020-03-05 -
2021-03-02
a year crt.sh
*.storage.googleapis.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
*.v.ssp.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-03-01 -
2020-08-28
6 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
misc-sni.google.com
GTS CA 1O1
2020-03-03 -
2020-05-26
3 months crt.sh
ups.analytics.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-02-13 -
2020-08-11
6 months crt.sh
*.ybp.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-01-04 -
2020-07-02
6 months crt.sh
cdn.adnxs.com
GeoTrust RSA CA 2018
2020-01-02 -
2021-04-02
a year crt.sh
*.nyc3.cdn.digitaloceanspaces.com
DigiCert SHA2 Secure Server CA
2020-03-11 -
2021-04-14
a year crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
*.twitter.com
DigiCert SHA2 High Assurance Server CA
2020-03-05 -
2021-03-02
a year crt.sh

This page contains 26 frames:

Primary Page: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Frame ID: 58CC47E6CE0895BDA09020A3EFEFC435
Requests: 101 HTTP requests in this frame

Frame: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1585075627&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Frame ID: EAEA555CD33095EFB549A753875CEA07
Requests: 42 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=P6KLRNy7h3K160ZmYNUOAce7&theme=standard&size=normal&cb=c21nk2vnzo2y
Frame ID: 6E5C20C067DD36324FF7369398C4F57D
Requests: 1 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/bframe?hl=en&v=P6KLRNy7h3K160ZmYNUOAce7&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=hnpukau13w7h
Frame ID: 2B86F03F2722712F0867475D41529205
Requests: 1 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Roboto&display=swap
Frame ID: D757BCB6E66AB5272002ECABA357E0A4
Requests: 5 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Roboto&display=swap
Frame ID: EA215E180A0C22D99F47A325388B94D4
Requests: 19 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-88d2de2-61a6b07d.js
Frame ID: ECBA40A560AF09044AE6B6BFA109C2F4
Requests: 14 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-88d2de2-61a6b07d.js
Frame ID: 78A79AB285AF1A4949986A542BDEAC1F
Requests: 14 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-88d2de2-61a6b07d.js
Frame ID: 3B87950EE5D02F40902E448A5F567FE1
Requests: 13 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-88d2de2-61a6b07d.js
Frame ID: 32039A6C40417858DDC108562D7920C6
Requests: 10 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20200316/r20190131/zrt_lookup.html
Frame ID: 0F4810A7BC47F75BB038623F75735A3E
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=90&slotname=5620800026&adk=2236077833&adf=3173046725&w=970&psa=0&guci=1.2.0.0.2.2.0.0&format=970x90&url=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1585075629471&bpp=17&bdt=144&fdt=184&idt=184&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&correlator=2572689394282&frm=23&ife=4&pv=2&ga_vid=1066081866.1585075628&ga_sid=1585075630&ga_hid=2126302693&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=308&ady=10&biw=1585&bih=1200&isw=970&ish=90&ifk=3361072646&scr_x=0&scr_y=0&oid=3&pvsid=736344778191518&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C970%2C90&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.9yn3pv4m2iwl&fsb=1&dtd=194
Frame ID: B484AFCE4343FDAF712458404F399420
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=280&slotname=7077012612&adk=2662501839&adf=3173046724&w=336&psa=0&guci=1.2.0.0.2.2.0.0&format=336x280&url=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1585075629564&bpp=5&bdt=229&fdt=159&idt=159&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&correlator=2572689394282&frm=23&ife=4&pv=1&ga_vid=1066081866.1585075628&ga_sid=1585075630&ga_hid=188924414&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1057&ady=257&biw=1585&bih=1200&isw=336&ish=280&ifk=3935297907&scr_x=0&scr_y=0&eid=21065725&oid=3&pvsid=1175099316616374&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C336%2C280&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.xbj4dnyou7q0&fsb=1&dtd=164
Frame ID: D0F92F4D6C0C9AB2A83D3FAB0F05E0F7
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=600&slotname=7785652766&adk=2248810365&adf=3173046723&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1585075629630&bpp=5&bdt=290&fdt=132&idt=132&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&correlator=2572689394282&frm=23&ife=4&pv=1&ga_vid=1066081866.1585075628&ga_sid=1585075630&ga_hid=1944273300&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1075&ady=1538&biw=1585&bih=1200&isw=300&ish=600&ifk=3946578095&scr_x=0&scr_y=0&eid=21064802&oid=3&pvsid=3685369569621237&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C600&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.mljhqseoq30k&btvi=1&fsb=1&dtd=135
Frame ID: 6E8F4E8A8AAA19A84F2FCE2C4B98F02F
Requests: 1 HTTP requests in this frame

Frame: https://u.openx.net/w/1.0/pd?gdpr=1&gdpr_consent=
Frame ID: 73C219FB972BBC9D9FBBB48FC63269E4
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?gdpr=1&gdpr_consent=
Frame ID: 11995ECCA19B67A61C4DC45C8B53BB7C
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 2732B119F7EB6894DD691CEDBDBFDE95
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 574622DFFA9036219202F041E9C8ED00
Requests: 1 HTTP requests in this frame

Frame: https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Frame ID: AB38F804B6F0E3A39028A0D2CB63F5E7
Requests: 1 HTTP requests in this frame

Frame: https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Frame ID: E825472C6C6A87B81CA7EC8CB5A7C74C
Requests: 1 HTTP requests in this frame

Frame: https://ap.lijit.com/beacon?informer=13394437&dnr=1
Frame ID: 1ACC00449DAC742E245C7F8F3F91F6D1
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html
Frame ID: EF19D5A813876C680ED34B8C1DBCB106
Requests: 1 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/showad.js
Frame ID: C5B0848240FE56D104348368C77A340F
Requests: 1 HTTP requests in this frame

Frame: https://eu-u.openx.net/w/1.0/pd?plm=6&ph=e1b1f5e1-3c2c-4287-9806-317cfbf3bd12&gdpr=1
Frame ID: A9A52CF9495762DDFE887EB7391988F5
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 5969C0D2579CCFFDE721B947457A9804
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: B117112DCDB67BDC3AA25DEF5FBC186C
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://threatpost.com/hackers-exploit= HTTP 301
    https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /googletagservices\.com\/tag\/js\/gpt(?:_mobile)?\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • script /\/prebid\.js/i

Overall confidence: 100%
Detected patterns
  • script /\.quantserve\.com\/quant\.js/i

Page Statistics

230
Requests

99 %
HTTPS

38 %
IPv6

38
Domains

59
Subdomains

48
IPs

7
Countries

6286 kB
Transfer

10349 kB
Size

4
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://threatpost.com/hackers-exploit= HTTP 301
    https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 12
  • https://secure.gravatar.com/avatar/fd862bb16bd9638c650113a83d17452f?s=60&d=https%3A%2F%2Fkasperskycontenthub.com%2Fwp-content%2Fthemes%2Fkaspersky-root%2Fassets%2Fimages%2Favatar_default.jpg&r=g HTTP 302
  • https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
Request Chain 41
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955
Request Chain 42
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955
Request Chain 43
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955
Request Chain 44
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955
Request Chain 45
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955
Request Chain 69
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1Add24e316-6dff-11ea-b70e-12358a211a00;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955
Request Chain 70
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1Add24f8b0-6dff-11ea-9b84-1245d65848a4;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955
Request Chain 71
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1Add2501a2-6dff-11ea-aff6-1212911483a0;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955
Request Chain 72
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1Add252f24-6dff-11ea-a1fd-12495d14311c;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955
Request Chain 73
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955
Request Chain 86
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&aip=1&a=859632365&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ul=en-us&de=UTF-8&dt=Hackers%20Actively%20Exploit%200-Day%20in%20CCTV%20Camera%20Hardware%20%7C%20Threatpost&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=YEBAAEAB~&jid=912452835&gjid=1530187708&cid=1066081866.1585075628&tid=UA-35676203-21&_gid=2059936311.1585075628&_r=1&gtm=2wg3b2PM29HLF&z=1994047704 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-35676203-21&cid=1066081866.1585075628&jid=912452835&_gid=2059936311.1585075628&gjid=1530187708&_v=j81&z=1994047704 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1066081866.1585075628&jid=912452835&_v=j81&z=1994047704 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1066081866.1585075628&jid=912452835&_v=j81&z=1994047704&slf_rd=1&random=3803922350
Request Chain 183
  • https://cm.g.doubleclick.net/pixel?google_nid=adaptv_dbm&google_cm&google_sc HTTP 302
  • https://pixel.advertising.com/ups/57304/sync?uid=CAESEMmB-6kQpsEwUgPSwT2vilI&google_cver=1 HTTP 302
  • https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESEMmB-6kQpsEwUgPSwT2vilI&google_cver=1&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
Request Chain 185
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=adaptv&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=adaptv&ttd_tpi=1 HTTP 302
  • https://pixel.advertising.com/ups/55953/sync?uid=91434c76-4f6d-4f3e-a41b-8e4bdc41b313&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=91434c76-4f6d-4f3e-a41b-8e4bdc41b313 HTTP 302
  • https://ups.analytics.yahoo.com/ups/55953/sync?uid=91434c76-4f6d-4f3e-a41b-8e4bdc41b313&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=91434c76-4f6d-4f3e-a41b-8e4bdc41b313&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
Request Chain 186
  • https://sync-tm.everesttech.net/upi/pid/m7y5t93k?redir=https%3A%2F%2Fsync.adap.tv%2Fsync%3Ftype%3Dgif%26key%3Dtubemogul%26uid%3D%24%7BUSER_ID%7D HTTP 302
  • https://sync-tm.everesttech.net/ct/upi/pid/m7y5t93k?redir=https%3A%2F%2Fsync.adap.tv%2Fsync%3Ftype%3Dgif%26key%3Dtubemogul%26uid%3D%24%7BUSER_ID%7D&_test=XnpVrgAAAGm_blk2 HTTP 302
  • https://sync.adap.tv/sync?type=gif&key=tubemogul&uid=XnpVrgAAAGm_blk2&_test=XnpVrgAAAGm_blk2
Request Chain 203
  • https://sync.serverbid.com/ss/2000891.html HTTP 302
  • https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Request Chain 204
  • https://ap.lijit.com/beacon?informer=13394437 HTTP 302
  • https://ap.lijit.com/beacon?informer=13394437&dnr=1
Request Chain 208
  • https://pixel.quantserve.com/pixel/p-NcBg8UA4xqUFp.gif?idmatch=0&gdpr=1&gdpr_consent= HTTP 302
  • https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=JdtDeCWLFXo92hcscoxZISaIECA9jEx4ct8OZrI7 HTTP 302
  • https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=JdtDeCWLFXo92hcscoxZISaIECA9jEx4ct8OZrI7&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
Request Chain 210
  • https://pixel.advertising.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent= HTTP 302
  • https://ups.analytics.yahoo.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc HTTP 302
  • https://pr-bh.ybp.yahoo.com/sync/adtech/1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc?gdpr=1&gdpr_consent= HTTP 302
  • https://pixel.advertising.com/ups/56465/sync?uid=y-R6_ZvSl1lxlqgjNLNgRkBYwCD.3kdNEsNCAm&_origin=0&nsync=0 HTTP 302
  • https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-R6_ZvSl1lxlqgjNLNgRkBYwCD.3kdNEsNCAm&_origin=0&nsync=0&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc

230 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Redirect Chain
  • https://threatpost.com/hackers-exploit=
  • https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
77 KB
19 KB
Document
General
Full URL
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
a5a6ccc66b1b898fbda94d45a6ac4ab7d9076831fc2cfb8657b16e1040f3418c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
threatpost.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

Server
nginx
Date
Tue, 24 Mar 2020 18:47:07 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
close
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Link
<https://threatpost.com/wp-json/>; rel="https://api.w.org/" <https://threatpost.com/?p=154051>; rel=shortlink
X-Frame-Options
SAMEORIGIN
X-Debug-Auth
off
X-Request-Host
threatpost.com
x-cache-hit
HIT
Content-Encoding
gzip

Redirect headers

Server
nginx
Date
Tue, 24 Mar 2020 18:47:06 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
close
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Expires
Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control
no-cache, must-revalidate, max-age=0, no-store
X-Redirect-By
WordPress
Location
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
X-Frame-Options
SAMEORIGIN
X-Debug-Auth
off
X-Request-Host
threatpost.com
x-cache-hit
MISS
main.css
threatpost.com/wp-content/themes/threatpost-2018/assets/css/
234 KB
35 KB
Stylesheet
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1585045399
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
56ab0f61f8ed6030bdd684f3752233177da0555b07cb172e0abffe8e02978bc5

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:07 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 10:23:18 GMT
Server
nginx
ETag
W/"5e79df96-3a94d"
Transfer-Encoding
chunked
Content-Type
text/css
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 31 Mar 2020 18:47:07 GMT
op.js
tagan.adlightning.com/math-aids-threatpost/
47 KB
14 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/op.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.5.39 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-84-5-39.lhr62.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
a68697f03d43b6ccbe9bf6080d18caf4a55a002d097934b5ea40fe999424efcb

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:38:11 GMT
content-encoding
gzip
age
537
x-cache
Hit from cloudfront
status
200
content-length
13707
x-amz-meta-git_commit
0d4dfcb
last-modified
Tue, 24 Mar 2020 16:21:00 GMT
server
AmazonS3
etag
"98ead1dd88cde8be4923286374604a94"
x-amz-version-id
r_9BNl0lw.hf.djUj9aICZ_uil2bsJTy
via
1.1 fce73a5f84ba5b26f15a077c70bc9a61.cloudfront.net (CloudFront)
cache-control
max-age=900
x-amz-cf-pop
LHR62-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
PUiBcknJsBrZGpTe5h4qIDy8RGU-ukOcvm5fuKoOhKmAryNf1QguZg==
ros-layout.js
qd.admetricspro.com/js/threatpost/
18 KB
3 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/ros-layout.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::6812:3967 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5e00db38c7c200422a1b2604eccaee91db1aa7dd5aead5383f62b85cead19068

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:07 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Mon, 23 Mar 2020 17:20:59 GMT
server
cloudflare
access-control-allow-origin
*
etag
W/"4871-5a188dbd16705-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
57928f0ed828e00b-FRA
expires
Tue, 24 Mar 2020 18:50:46 GMT
gpt.js
www.googletagservices.com/tag/js/
43 KB
14 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6d20167b25a7777e7cc5d9f3beb13e0d8480228eb35bb539ece444c196813dc6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"466 / 370 of 1000 / last-modified: 1585073265"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
14437
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:07 GMT
cmp.js
qd.admetricspro.com/js/threatpost/
218 KB
61 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/cmp.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::6812:3967 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
aaf45a172ec90c76bcecd61c68d998c2256fe9b1700371e80011d1161c5ab629

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:07 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 27 Sep 2019 21:07:46 GMT
server
cloudflare
access-control-allow-origin
*
etag
W/"367ba-5938f47194c80-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
57928f0ed82ce00b-FRA
expires
Tue, 24 Mar 2020 18:51:01 GMT
targeting.js
qd.admetricspro.com/js/threatpost/
275 B
212 B
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/targeting.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::6812:3967 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6cdc57f82f4b0d09e5b4e584ca4736cd3871f20563d4ce25120b057d8ffb4eb2

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:07 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Sat, 08 Feb 2020 20:49:18 GMT
server
cloudflare
access-control-allow-origin
*
etag
W/"113-59e16a3cfb471-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
57928f0ed82ee00b-FRA
expires
Tue, 24 Mar 2020 18:50:46 GMT
prebid.js
qd.admetricspro.com/js/threatpost/
294 KB
86 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/prebid.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::6812:3967 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9f40f7297122393e1425eec62e78a75c3211f7ad3f6b09a356aa317fcedc2cf3

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:07 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 26 Feb 2020 03:30:32 GMT
server
cloudflare
access-control-allow-origin
*
etag
W/"49929-59f723a0fd39e-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
57928f0ed834e00b-FRA
expires
Tue, 24 Mar 2020 18:50:46 GMT
engine.js
qd.admetricspro.com/js/threatpost/
16 KB
12 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/engine.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::6812:3967 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bcf391dd0b006a87698ac0894d71039d610480913d24fcdaa1f2fdeeeda943e3

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:07 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Sun, 24 Nov 2019 00:06:08 GMT
server
cloudflare
access-control-allow-origin
*
etag
W/"41f6-5980c69fe949d-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
57928f0ed833e00b-FRA
expires
Tue, 24 Mar 2020 18:50:46 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
77 KB
17 KB
Stylesheet
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=456b3244
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:1a00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
2ed8662cb6ca4b48b146127db22ebd71f824d54fb6ca11601bd8fa97ff572cf2
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Tue, 24 Mar 2020 10:23:29 GMT
content-encoding
gzip
age
30218
x-cache
Hit from cloudfront
status
200
content-length
16477
last-modified
Tue, 24 Mar 2020 10:23:18 GMT
server
nginx
cache-control
max-age=86400
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 7d12bef71f48487e9202b581d949876e.cloudfront.net (CloudFront)
x-cache-hit
MISS
x-debug-auth
off
x-amz-cf-pop
BRU50-C1
x-request-host
kasperskycontenthub.com
x-amz-cf-id
V60m8b0ZnA4Ez5QiottmuQTi2cWBrp_wxtrmvz9Nz2kpWpItgAmxDw==
expires
Wed, 25 Mar 2020 10:23:29 GMT
jquery.js
threatpost.com/wp-includes/js/jquery/
95 KB
37 KB
Script
General
Full URL
https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:07 GMT
Content-Encoding
gzip
Last-Modified
Wed, 18 Dec 2019 22:32:15 GMT
Server
nginx
ETag
W/"5dfaa8ef-17a69"
Transfer-Encoding
chunked
Content-Type
application/x-javascript
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 31 Mar 2020 18:47:07 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
175 KB
55 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/kaspersky-cookies-notification/scripts/alert_text.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert.js,wp-content/plugins/honeypot-comments/public/assets/js/public.js,wp-content/plugins/kspr_twitter_pullquote/js/kaspersky-twitter-pullquote.js,wp-content/themes/threatpost-2018/assets/js/main.js,wp-content/themes/threatpost-2018/assets/js/loadmore.js,wp-content/plugins/kaspersky-social-sharing/assets/js/social-share.js&ver=456b3244
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:1a00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
f89d17dc2e4ecb385243b7b4cdaf5d8d9f6d4b9829e2be80afb66d01721835e3
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 10:26:17 GMT
content-encoding
gzip
age
30050
x-cache
Hit from cloudfront
status
200
content-length
55884
last-modified
Tue, 24 Mar 2020 10:23:18 GMT
server
nginx
cache-control
max-age=86400
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 7d12bef71f48487e9202b581d949876e.cloudfront.net (CloudFront)
x-cache-hit
HIT
x-debug-auth
off
x-amz-cf-pop
BRU50-C1
x-request-host
kasperskycontenthub.com
x-amz-cf-id
ptdPhYpsjuXbnAYyQP1PeH13irfj96JttT2sD8xtHw76_pZWf-t6GA==
expires
Wed, 25 Mar 2020 10:25:10 GMT
/
kasperskycontenthub.com/
0
398 B
Script
General
Full URL
https://kasperskycontenthub.com/?dm=ed1f9e435dc885292eab65620c51f3fb&action=load&blogid=103&siteid=1&t=1891179132&back=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 18:47:07 GMT
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
Server
nginx
X-Frame-Options
SAMEORIGIN
Content-Type
application/javascript
x-cache-hit
HIT
Transfer-Encoding
chunked
X-Debug-Auth
off
Connection
close
X-Request-Host
kasperskycontenthub.com
X-XSS-Protection
1; mode=block
avatar_default.jpg
i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/
Redirect Chain
  • https://secure.gravatar.com/avatar/fd862bb16bd9638c650113a83d17452f?s=60&d=https%3A%2F%2Fkasperskycontenthub.com%2Fwp-content%2Fthemes%2Fkaspersky-root%2Fassets%2Fimages%2Favatar_default.jpg&r=g
  • https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
65 B
65 B
Image
General
Full URL
https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.2 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
i0.wp.com
Software
nginx /
Resource Hash
3a90c56bbc2ea3fae7e089cc529bc02869c5035ee31c3111d829b9ae974cf42d

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
404
x-nc
HIT ams 8
date
Tue, 24 Mar 2020 18:47:07 GMT
server
nginx
content-type
text/html; charset=utf-8

Redirect headers

x-nc
HIT lb6.dfw.gravatar.com, BYPASS fra 1
date
Tue, 24 Mar 2020 18:47:07 GMT
last-modified
Wed, 11 Jan 1984 08:00:00 GMT
server
nginx
location
https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
content-type
text/html; charset=utf-8
status
302
cache-control
max-age=300
link
<https://www.gravatar.com/avatar/fd862bb16bd9638c650113a83d17452f?s=60&d=https%3A%2F%2Fkasperskycontenthub.com%2Fwp-content%2Fthemes%2Fkaspersky-root%2Fassets%2Fimages%2Favatar_default.jpg&r=g>; rel="canonical"
content-length
0
expires
Tue, 24 Mar 2020 18:52:07 GMT
iot_botnet.png
media.threatpost.com/wp-content/uploads/sites/103/2016/10/06233258/
78 KB
79 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2016/10/06233258/iot_botnet.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:8c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c3865d841c271c716a713910ad664d2f256b150a01d589cc16787159e4536a78

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 23 Mar 2020 20:37:05 GMT
via
1.1 5755f825ee6ab59b8a6349608c249e4e.cloudfront.net (CloudFront), 1.1 4f6b42c00be2b57f5f03a09501620501.cloudfront.net (CloudFront)
last-modified
Tue, 03 Jul 2018 01:08:18 GMT
server
AmazonS3
age
79803
etag
"fe7eaf2a67a21e96b62aa88052f8a3a9"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, BRU50-C1
accept-ranges
bytes
content-length
79910
x-amz-cf-id
oWXTU1lhZRketFeTouq1_FB8tWb6j3BBs8gWA_r7E4e_POm3IYStFg==
expires
Wed, 03 Jul 2019 01:08:16 GMT
subscribe2.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/
8 KB
9 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/subscribe2.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:8c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
aa64fa30a3263fa3105736228a6feaaa4f7d32d8ef96b12e56f6fb95511b66a7

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Fri, 13 Dec 2019 01:15:03 GMT
via
1.1 2dd06bdee724b9634ae1c7344568391c.cloudfront.net (CloudFront), 1.1 4f6b42c00be2b57f5f03a09501620501.cloudfront.net (CloudFront)
last-modified
Tue, 19 Feb 2019 20:14:58 GMT
server
AmazonS3
age
8875925
etag
"5ba45563f793f39ef6baf02645651654"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
LHR3-C1, BRU50-C1
accept-ranges
bytes
content-length
8281
x-amz-cf-id
gFuWuZWEETI1Dt2ZuIX2hww7oNyjO7zzYf-cGE8A4CwOwXoA2zyTsg==
expires
Wed, 19 Feb 2020 20:14:57 GMT
iot-uk-law-540x270.jpeg
media.threatpost.com/wp-content/uploads/sites/103/2020/01/27084825/
46 KB
46 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/01/27084825/iot-uk-law-540x270.jpeg
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:8c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3cedf3e0c5857028c85cc32c680685193777dec55c2766cd0a7801f748bb5a62

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 17 Feb 2020 05:54:50 GMT
via
1.1 62dc260e32d7b9197a4511447f6a264a.cloudfront.net (CloudFront), 1.1 4f6b42c00be2b57f5f03a09501620501.cloudfront.net (CloudFront)
last-modified
Mon, 27 Jan 2020 13:48:28 GMT
server
AmazonS3
age
3156738
etag
"a34c482bfdf8a5da55f656dc3ed347ee"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA6-C1, BRU50-C1
accept-ranges
bytes
content-length
46643
x-amz-cf-id
uNtmLU_IYhfDzy80QUHxMJarXbUnVq3JCEoIIUNpt2xxR1EDjmkerg==
expires
Tue, 26 Jan 2021 13:48:25 GMT
botnet_700_420-540x270.png
media.threatpost.com/wp-content/uploads/sites/103/2019/12/24125234/
243 KB
243 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/12/24125234/botnet_700_420-540x270.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:8c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
99ddf47d1970efe8a4d4904940552998d1c426605609c87229f5314d6c29dde7

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Fri, 14 Feb 2020 04:07:09 GMT
via
1.1 62dc260e32d7b9197a4511447f6a264a.cloudfront.net (CloudFront), 1.1 4f6b42c00be2b57f5f03a09501620501.cloudfront.net (CloudFront)
last-modified
Tue, 24 Dec 2019 17:52:38 GMT
server
AmazonS3
age
3422399
etag
"42616a662117c5099fc51a1578887065"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA6-C1, BRU50-C1
accept-ranges
bytes
content-length
248392
x-amz-cf-id
kuQAnto9S8Sg18Rz1qS8FjWbqQ2JTT_ZIKjiVhlNbF3sLHi-0LOgIQ==
expires
Wed, 23 Dec 2020 17:52:34 GMT
amd-540x270.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/03/09102326/
30 KB
30 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/03/09102326/amd-540x270.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:8c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f8242ad84364a7685273fe4a3bf00c5cf90d5d016b3fe88dfc9b4566222be6d4

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 09 Mar 2020 15:42:00 GMT
via
1.1 c714e4f593454d65f62cf3fecf756a4c.cloudfront.net (CloudFront), 1.1 4f6b42c00be2b57f5f03a09501620501.cloudfront.net (CloudFront)
last-modified
Mon, 09 Mar 2020 14:23:30 GMT
server
AmazonS3
age
1307108
etag
"ef2d375fc58380c62358e256a372b7a1"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1, BRU50-C1
accept-ranges
bytes
content-length
30738
x-amz-cf-id
bwW9J1i_g11nouzlAnkrNQ6VeTPGtCc_aaENC-OmHLMJJLcFrwvk9A==
expires
Tue, 09 Mar 2021 14:23:26 GMT
api.js
www.google.com/recaptcha/
674 B
550 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?hl=en
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
beb58d113da73001dfcbbb97b0e041c737361f1ae0050e6c60c96c14d69a46a7
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
content-security-policy
frame-ancestors 'self'
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
447
x-xss-protection
1; mode=block
expires
Tue, 24 Mar 2020 18:47:07 GMT
data-center-64x64.png
media.threatpost.com/wp-content/uploads/sites/103/2020/01/15162631/
8 KB
9 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/01/15162631/data-center-64x64.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:8c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1d36800d5a9c72e02424db4f2ee2d3e3391388e8b7e863533f73c788df14ab5e

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Sun, 16 Feb 2020 06:15:20 GMT
via
1.1 a75b67932d84d80b40e12159613deb17.cloudfront.net (CloudFront), 1.1 4f6b42c00be2b57f5f03a09501620501.cloudfront.net (CloudFront)
last-modified
Wed, 15 Jan 2020 21:26:52 GMT
server
AmazonS3
age
3241908
etag
"93668d327fc4fcc8e57177484d96236e"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1, BRU50-C1
accept-ranges
bytes
content-length
8414
x-amz-cf-id
OkUF69-JFd8xXNqbvq_96V30qcCZaljjkC8k1jTDBqXv9CRBvZ4uvQ==
expires
Thu, 14 Jan 2021 21:26:49 GMT
cyber-threat-2020-64x64.png
media.threatpost.com/wp-content/uploads/sites/103/2019/10/25090853/
3 KB
4 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/10/25090853/cyber-threat-2020-64x64.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:8c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e69b4aedd4ba4df00f7340e4a299dacca0abd06295d6c871f6816ea07db2507c

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 31 Dec 2019 14:00:33 GMT
via
1.1 efed2d5ffeb697060f4a3aa73bdf068f.cloudfront.net (CloudFront), 1.1 4f6b42c00be2b57f5f03a09501620501.cloudfront.net (CloudFront)
last-modified
Fri, 25 Oct 2019 13:08:56 GMT
server
AmazonS3
age
7274795
etag
"97535062e07e5bd8bf0ddb185a9869c7"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA54, BRU50-C1
accept-ranges
bytes
content-length
3569
x-amz-cf-id
rXW5ZahohwJY7lVvsO-XBokeEAMoWb6t_KKPytpPx0fy34pC948Z1g==
expires
Sat, 24 Oct 2020 13:08:53 GMT
patches-64x64.png
media.threatpost.com/wp-content/uploads/sites/103/2017/05/06225026/
9 KB
9 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2017/05/06225026/patches-64x64.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:8c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b546be5b42d65b5d2eb3ef247886a1d692512462946bac11547df2a0a5ed02a2

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 21 Jan 2020 01:20:21 GMT
via
1.1 78059242182c195ff7f26013772da09a.cloudfront.net (CloudFront), 1.1 4f6b42c00be2b57f5f03a09501620501.cloudfront.net (CloudFront)
last-modified
Tue, 03 Jul 2018 01:47:16 GMT
server
AmazonS3
age
5506007
etag
"34fd711c1863cbefe6bf897a5665a720"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA6-C1, BRU50-C1
accept-ranges
bytes
content-length
8748
x-amz-cf-id
wblCJUWfnRs-sGrU6qPM9v5eMOrV4iNkevv-SMDpvFjwbiwAcub-lw==
expires
Wed, 03 Jul 2019 01:47:12 GMT
artificial_intelligence-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2018/10/01152243/
2 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2018/10/01152243/artificial_intelligence-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:8c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a968b405c5b4dcd85f76e5400c41930968710351102d83a80cf114ad7549b5d0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Thu, 26 Dec 2019 14:01:46 GMT
via
1.1 9132f1c6fe5ab3ea458d3abc7e3bc5d4.cloudfront.net (CloudFront), 1.1 4f6b42c00be2b57f5f03a09501620501.cloudfront.net (CloudFront)
last-modified
Mon, 01 Oct 2018 19:22:48 GMT
server
AmazonS3
age
7706722
etag
"a67a437ee807847e498f42bfe1dd14fa"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
LHR3-C1, BRU50-C1
accept-ranges
bytes
content-length
1834
x-amz-cf-id
6FFQnPEN1oXQSQzUZ5mMTzXeJ8kREWqRHz7FsnybPXrJ0Ih25Hebbg==
expires
Tue, 01 Oct 2019 19:22:43 GMT
Hacker-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/01/23110846/
1 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/01/23110846/Hacker-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:8c00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e3e05b274c76d548e39c6633af671d715bd1be28a929ab47a5ae8d29ff120df7

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 24 Dec 2019 14:05:10 GMT
via
1.1 b3f54d3c6a628831461cdc9d5d466584.cloudfront.net (CloudFront), 1.1 4f6b42c00be2b57f5f03a09501620501.cloudfront.net (CloudFront)
last-modified
Wed, 23 Jan 2019 16:08:49 GMT
server
AmazonS3
age
7879318
etag
"0c579c9f31a7fe9e5b94b47a6fd20620"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
LHR52-C1, BRU50-C1
accept-ranges
bytes
content-length
1393
x-amz-cf-id
EX4NNN5jRoy4Ig0rjcdqmOlWfdL1gGjW19vPQfM7IVnt3WG0NzQVvw==
expires
Thu, 23 Jan 2020 16:08:46 GMT
liveView.php
live.sekindo.com/live/
24 KB
7 KB
Script
General
Full URL
https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
298f1c12e434e2558245a1f41d9062f3a677bb434343e103be8bf7a5ced02541

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:07 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.15
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/javascript; charset=utf-8
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
2 KB
1 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/jquery.json.min.js&ver=456b3244
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:1a00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
a9f6c03ce6f4d1654f29f2136651e883198d509cb2e26af1c24b1f87b6ccae13
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 10:26:17 GMT
content-encoding
gzip
age
30050
x-cache
Hit from cloudfront
status
200
content-length
935
last-modified
Tue, 24 Mar 2020 10:23:15 GMT
server
nginx
cache-control
max-age=86400
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 7d12bef71f48487e9202b581d949876e.cloudfront.net (CloudFront)
x-cache-hit
MISS
x-debug-auth
off
x-amz-cf-pop
BRU50-C1
x-request-host
kasperskycontenthub.com
x-amz-cf-id
IMB0SamG4T4tCrFuV7qbPym8vAzPr7ZmO9GV0ACmBPkwGSfHHWlszg==
expires
Wed, 25 Mar 2020 10:26:17 GMT
gravityforms.min.js
threatpost.com/wp-content/plugins/gravityforms/js/
26 KB
10 KB
Script
General
Full URL
https://threatpost.com/wp-content/plugins/gravityforms/js/gravityforms.min.js?ver=2.2.6.5
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
a783d2ad42c380bc896219c080fa845d1e9f2e77483558103aeb296b95b85701

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:07 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 10:23:15 GMT
Server
nginx
ETag
W/"5e79df93-6923"
Transfer-Encoding
chunked
Content-Type
application/x-javascript
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 31 Mar 2020 18:47:07 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
6 KB
3 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/conditional_logic.min.js&ver=456b3244
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:1a00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
663ac3773e9741ad638447e6e9478f83e10e073c5ee433c5de3c640c7dae8c32
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 10:23:30 GMT
content-encoding
gzip
age
30217
x-cache
Hit from cloudfront
status
200
content-length
2338
last-modified
Tue, 24 Mar 2020 10:23:15 GMT
server
nginx
cache-control
max-age=86400
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 7d12bef71f48487e9202b581d949876e.cloudfront.net (CloudFront)
x-cache-hit
MISS
x-debug-auth
off
x-amz-cf-pop
BRU50-C1
x-request-host
kasperskycontenthub.com
x-amz-cf-id
veJypDRNHxqTRZXIl_mBU-bOv9wcrcg4QYTiQQUiltL57k2tSlfCEA==
expires
Wed, 25 Mar 2020 10:23:30 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
5 KB
2 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/placeholders.jquery.min.js&ver=456b3244
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:1a00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
d62a7b7ec5313469ebff5c006b9068dc44d6d1c122cf787ffa29a10113b34060
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 10:23:30 GMT
content-encoding
gzip
age
30217
x-cache
Hit from cloudfront
status
200
content-length
1747
last-modified
Tue, 24 Mar 2020 10:23:16 GMT
server
nginx
cache-control
max-age=86400
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 7d12bef71f48487e9202b581d949876e.cloudfront.net (CloudFront)
x-cache-hit
MISS
x-debug-auth
off
x-amz-cf-pop
BRU50-C1
x-request-host
kasperskycontenthub.com
x-amz-cf-id
SLsMdtlnHlNarP2NuO4CI5COlqvaJZI5EX-03msKzNe9yGse9MfUuw==
expires
Wed, 25 Mar 2020 10:23:30 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
2 KB
1 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/js/wp-embed.min.js,wp-content/plugins/akismet/_inc/form.js&ver=456b3244
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:1a00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
a2e2059610101cb4718d6d9cf8d6e44243838304968710f35ed7f44188a9c279
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 10:25:10 GMT
content-encoding
gzip
age
30117
x-cache
Hit from cloudfront
status
200
content-length
947
last-modified
Wed, 18 Dec 2019 22:32:15 GMT
server
nginx
cache-control
max-age=86400
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 7d12bef71f48487e9202b581d949876e.cloudfront.net (CloudFront)
x-cache-hit
MISS
x-debug-auth
off
x-amz-cf-pop
BRU50-C1
x-request-host
kasperskycontenthub.com
x-amz-cf-id
Dz_VfonV3rV4fHKGj-DOwBalR-UDLaQmEG_kQjRtGyg9OAxlfQRDaQ==
expires
Wed, 25 Mar 2020 10:25:10 GMT
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/
53 KB
15 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.5.39 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-84-5-39.lhr62.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
92236ba12e109fff1e82ecabec1eda229af59c8374c54374a38a46dc01f53559

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Sun, 01 Mar 2020 09:11:19 GMT
content-encoding
gzip
age
2021749
x-cache
Hit from cloudfront
status
200
content-length
14481
x-amz-meta-git_commit
0d4dfcb
last-modified
Mon, 20 Jan 2020 21:00:33 GMT
server
AmazonS3
etag
"bf1a2a1d4ffb353d268fccfda0736572"
x-amz-version-id
PGsbLvp7r6PsyaqOJTHRTfOBKlgvnkI7
via
1.1 fce73a5f84ba5b26f15a077c70bc9a61.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
LHR62-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
CQwYkCUhPjooyUV71N_ZpwD_FlP1_df1XYZJoEiIy1bjjFGdr4HC2A==
bl-88d2de2-61a6b07d.js
tagan.adlightning.com/math-aids-threatpost/
78 KB
30 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-88d2de2-61a6b07d.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.5.39 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-84-5-39.lhr62.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ceadb197b513e112160f4dc29d2d6bddf731c821f9f9f582410d116efd24af96

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:21:13 GMT
content-encoding
gzip
age
8755
x-cache
Hit from cloudfront
status
200
content-length
30149
x-amz-meta-git_commit
88d2de2
last-modified
Tue, 24 Mar 2020 16:20:47 GMT
server
AmazonS3
etag
"644996cb0aa655923f5457d64bedb1c7"
x-amz-version-id
xWXiZEve7WGoqNEunBY4Nq.xzhq5qfhH
via
1.1 fce73a5f84ba5b26f15a077c70bc9a61.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
LHR62-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
iJJ7Wo8Giwr2SgUJcWVKS3R7wt6r1dfDm3HPLRrOhbr55Sl8XYD2SA==
pubads_impl_2020030501.js
securepubads.g.doubleclick.net/gpt/
165 KB
60 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
sffe /
Resource Hash
8ee04e0441c9e51785d17ac835a93cf4d30d90826f87350b42ba233496a26f55
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Sec-Fetch-Dest
script
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Tue, 24 Mar 2020 18:47:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 05 Mar 2020 14:08:10 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
61481
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:07 GMT
integrator.sync.js
adservice.google.de/adsid/
113 B
178 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.sync.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ea03bfd7fdda1eac185ebc3e8e74b33065b04c8e0adc48cbbd4136748dbd2742
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
108
x-xss-protection
0
fastlane.json
fastlane.rubiconproject.com/a/api/
306 B
1 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=2&alt_size_ids=55%2C57&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&tk_flint=pbjs_lite_v3.8.0&x_source.tid=47dd748e-315b-46d2-90e5-05563fe88dd3&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.2420746450195086
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.141 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
22cc7f4dd5b0a3b9977cad0083c2dcd2c9b6040b339e9e74630e4d90534cadf5

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:08 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=474
Content-Length
306
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
241 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=15&alt_size_ids=16&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&tk_flint=pbjs_lite_v3.8.0&x_source.tid=28d86c6a-2edc-4bdc-9746-b295b0c6e9a6&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.960962354614584
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.141 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
f9d25db6f85e7d7acb8091c7870634ff4ff8de2f5a4f2fd5b3bad409c8c23da5

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:08 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=356
Content-Length
241
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
261 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509506&size_id=15&alt_size_ids=10&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&tk_flint=pbjs_lite_v3.8.0&x_source.tid=a2ab200f-39be-4dcd-82e0-5a69c24c34b9&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.08308826328011842
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.141 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
5b931396d733457ca4488ba0368ed446c1f8566b2b437d60fd5b8774037ec459

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:08 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=403
Content-Length
261
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
261 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=15&alt_size_ids=10&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&tk_flint=pbjs_lite_v3.8.0&x_source.tid=a2ab200f-39be-4dcd-82e0-5a69c24c34b9&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.4952698487588083
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.141 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT, US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
b31480f52a0e924961de723e86d9bd444e53ab24a35be5f1b5cff1c8f77465df

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:08 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=186
Content-Length
261
Expires
Wed, 17 Sep 1975 21:32:10 GMT
prebid
ib.adnxs.com/ut/v3/
373 B
1 KB
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.83 , Netherlands, ASN29990 (ASN-APPNEX, US),
Reverse DNS
250.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
7c3c363546731a646fe0cb8c82eb280aa7f8dda715ef10091e643614ccac4307
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:10 GMT
X-Proxy-Origin
194.187.251.57; 194.187.251.57; 250.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.136:80
AN-X-Request-Uuid
0464429b-0695-4dcd-ad3c-6d6c8ddb6d26
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
373
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
arj
teachingaids-d.openx.net/w/1.0/
174 B
569 B
XHR
General
Full URL
https://teachingaids-d.openx.net/w/1.0/arj?ju=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ch=UTF-8&res=1600x1200x24&ifr=false&tz=-60&tws=1600x1200&be=1&bc=hb_pb_3.0.1&dddid=47dd748e-315b-46d2-90e5-05563fe88dd3%2C47dd748e-315b-46d2-90e5-05563fe88dd3%2C28d86c6a-2edc-4bdc-9746-b295b0c6e9a6%2Ca2ab200f-39be-4dcd-82e0-5a69c24c34b9%2Ca2ab200f-39be-4dcd-82e0-5a69c24c34b9&nocache=1585075627954&schain=1.0%2C1!admetricspro.com%2C1005%2C1%2C%2C%2C&aus=728x90%2C970x250%2C970x90%7C728x90%2C970x250%2C970x90%7C300x250%2C336x280%7C300x250%2C300x600%7C300x250%2C300x600&divIds=div-gpt-ad-6794670-2%2Cdiv-gpt-ad-6794670-2%2Cdiv-gpt-ad-6794670-3%2Cdiv-gpt-ad-6794670-5%2Cdiv-gpt-ad-6794670-5&auid=540932704%2C540932709%2C540932713%2C540932715%2C540932720&
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.179.0 /
Resource Hash
243448746996297140b1eeedf67e673acac21fae54b42097f5c47f72a20bf145

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
content-encoding
gzip
server
OXGW/16.179.0
status
200
vary
Accept, Accept-Encoding
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
164
via
1.1 google
expires
Mon, 26 Jul 1997 05:00:00 GMT
v2
e.serverbid.com/api/
16 B
168 B
XHR
General
Full URL
https://e.serverbid.com/api/v2
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
134.209.131.220 North Bergen, United States, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
/
Resource Hash
903eb8f1cc364e01930ba03579f049a72794aa91d1a5842a2edb6365e436bb7c

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
200
date
Tue, 24 Mar 2020 18:47:07 GMT
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
content-length
16
vary
Origin
content-type
application/json
ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
prebid
ib.adnxs.com/ut/v3/
376 B
1 KB
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.83 , Netherlands, ASN29990 (ASN-APPNEX, US),
Reverse DNS
250.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
61aed36d035ecade513055ad0a20630a44051b2f6e8458bd5b5c1ef2d3ad53cc
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:10 GMT
X-Proxy-Origin
194.187.251.57; 194.187.251.57; 250.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.55:80
AN-X-Request-Uuid
ed3c0931-78d7-4174-b6d5-40b5ef5af590
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
376
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
cygnus
as-sec.casalemedia.com/
25 B
987 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=438654&v=7.2&r=%7B%22id%22%3A%2230153f809bb731c%22%2C%22imp%22%3A%5B%7B%22id%22%3A%2231d0b1eafbe2f06%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438654%22%2C%22sid%22%3A%22728x90%22%7D%2C%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%22322577b1c1f372a%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438649%22%2C%22sid%22%3A%22300x250%22%7D%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%2233bafb229e7a069%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438650%22%2C%22sid%22%3A%22300x250%22%7D%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%7D%5D%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F%22%7D%2C%22ext%22%3A%7B%22source%22%3A%22prebid%22%7D%2C%22source%22%3A%7B%22ext%22%3A%7B%22schain%22%3A%7B%22ver%22%3A%221.0%22%2C%22complete%22%3A1%2C%22nodes%22%3A%5B%7B%22asi%22%3A%22admetricspro.com%22%2C%22sid%22%3A%221005%22%2C%22hp%22%3A1%7D%5D%7D%7D%7D%7D&ac=j&sd=1&
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.185.51 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-51.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
8c6b62b06c7ea3afe81774c506cce348d9bfeaa72ac1f27025f5b68f13f4dbcc

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:08 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
45
Expires
Tue, 24 Mar 2020 18:47:08 GMT
bid
ap.lijit.com/rtb/
47 B
723 B
XHR
General
Full URL
https://ap.lijit.com/rtb/bid?src=prebid_prebid_3.8.0
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
216.52.2.30 , United States, ASN29791 (VOXEL-DOT-NET, US),
Reverse DNS
Software
nginx /
Resource Hash
3533f435b73600efac0f925d6e302de8c2b72303e7c1f0f2bccfb3dfa6421d9e

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Date
Tue, 24 Mar 2020 18:47:08 GMT
Content-Encoding
gzip
Server
nginx
Vary
Accept-Encoding, User-Agent
Access-Control-Allow-Methods
GET, POST, DELETE, PUT
Content-Type
application/json
Access-Control-Allow-Origin
https://threatpost.com
Access-Control-Allow-Credentials
true
X-Sovrn-Pod
ad_ap6ams1
Access-Control-Allow-Headers
X-Requested-With, Content-Type
Content-Length
65
translator
hbopenbid.pubmatic.com/
0
115 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Tue, 24 Mar 2020 18:47:08 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
gtm.js
www.googletagmanager.com/
71 KB
24 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
d8313e2445f2a598fa325438da046d8335091dd9f45d6ed7d45996c12f2af678
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:08 GMT
content-encoding
br
status
200
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
24358
x-xss-protection
0
last-modified
Tue, 24 Mar 2020 18:00:00 GMT
server
Google Tag Manager
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Tue, 24 Mar 2020 18:47:08 GMT
icons.svg
threatpost.com/wp-content/themes/threatpost-2018//assets/sprite/
11 KB
4 KB
Other
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018//assets/sprite/icons.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
76ba07e059d9e2113f9c940f1a31efc95bd9d5badd68bbc3637177e892a08099

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:08 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 10:23:19 GMT
Server
nginx
ETag
W/"5e79df97-2b9f"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 31 Mar 2020 18:47:08 GMT
icons.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/
11 KB
4 KB
Other
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/icons.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
76ba07e059d9e2113f9c940f1a31efc95bd9d5badd68bbc3637177e892a08099

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:08 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 10:23:18 GMT
Server
nginx
ETag
W/"5e79df96-2b9f"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 31 Mar 2020 18:47:08 GMT
recaptcha__en.js
www.gstatic.com/recaptcha/releases/P6KLRNy7h3K160ZmYNUOAce7/
260 KB
93 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/P6KLRNy7h3K160ZmYNUOAce7/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?hl=en
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b2d6fcca7b06d9b949f7f407e9229e0323cb2a75cb6ee4ad35b53e25cf161605
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 16:31:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 23 Mar 2020 04:07:14 GMT
server
sffe
age
94558
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
94799
x-xss-protection
0
expires
Tue, 23 Mar 2021 16:31:10 GMT
logo.png
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
19 KB
19 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/logo.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
39af7c1116fb967a330e8770f775e6b5ee871add01ed45c98a1634911cebfb0a

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1585045399
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:08 GMT
Last-Modified
Tue, 24 Mar 2020 10:23:19 GMT
Server
nginx
ETag
"5e79df97-4a32"
Content-Type
image/png
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
18994
Expires
Tue, 31 Mar 2020 18:47:08 GMT
museosans-300-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-300-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
45ddc09b0ad6ab916bd9a0282070b161045e186fc025303f4aa1aa821fc45ac7

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1585045399
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:08 GMT
Last-Modified
Tue, 24 Mar 2020 10:23:18 GMT
Server
nginx
ETag
"5e79df96-51b8"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20920
Expires
Wed, 24 Mar 2021 18:47:08 GMT
museosans-700-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-700-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
ae00ae9c862bc8b8923efd1d9a18befa912678a869d4dd01179a59ed3de731be

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1585045399
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:08 GMT
Last-Modified
Tue, 24 Mar 2020 10:23:18 GMT
Server
nginx
ETag
"5e79df96-51a4"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20900
Expires
Wed, 24 Mar 2021 18:47:08 GMT
museosans-100-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-100-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
06fc565587b8b700936a1677218cb269a6cc31ca5f701eb45461e86a3d54d5c7

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1585045399
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:08 GMT
Last-Modified
Tue, 24 Mar 2020 10:23:18 GMT
Server
nginx
ETag
"5e79df96-50c8"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20680
Expires
Wed, 24 Mar 2021 18:47:08 GMT
museosans-500-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-500-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
2de77164bb9924542e1dea4ee4a0ff27d40b51a3d7939dac7db11a95045c9b7d

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1585045399
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:08 GMT
Last-Modified
Tue, 24 Mar 2020 10:23:18 GMT
Server
nginx
ETag
"5e79df96-5194"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20884
Expires
Wed, 24 Mar 2021 18:47:08 GMT
museosans-300italic-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
23 KB
23 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-300italic-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
f8a2b5b62eb722c3379b30cf0cc58d3176ee6be48036d6ad2aa838d2029c4189

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1585045399
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:08 GMT
Last-Modified
Tue, 24 Mar 2020 10:23:18 GMT
Server
nginx
ETag
"5e79df96-5bac"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
23468
Expires
Wed, 24 Mar 2021 18:47:08 GMT
mail-plane-light.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
828 B
722 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/mail-plane-light.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
5a7ed822968963e31d88424c96387ad9f4fd4f4b5a5b581a33f65e3784d162cf

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1585045399
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:08 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 10:23:18 GMT
Server
nginx
ETag
W/"5e79df96-33c"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 31 Mar 2020 18:47:08 GMT
twitter-blue.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
868 B
847 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/twitter-blue.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
420508fc523520f35de5c851905543294123d7676b5a5668744691f2abe9e730

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1585045399
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:08 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 10:23:18 GMT
Server
nginx
ETag
W/"5e79df96-364"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 31 Mar 2020 18:47:08 GMT
museosans-700italic-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
15 KB
16 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-700italic-webfont.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
859faa9b9ed0990288b2f393a102b1fe2668ac79088b113b6f0beaee521221eb

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1585045399
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:08 GMT
Last-Modified
Tue, 24 Mar 2020 10:23:18 GMT
Server
nginx
ETag
"5e79df96-3dcc"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
15820
Expires
Wed, 24 Mar 2021 18:47:08 GMT
liveView.php
live.sekindo.com/live/ Frame EAEA
2 KB
1 KB
Script
General
Full URL
https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1585075627&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
f70a134da30da931f07ec3bc26eb59331f65c5c366333b5abca6cfb70e5c0eb0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:07 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.15
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/javascript; charset=utf-8
mail-plane-large-dark.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
812 B
722 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/mail-plane-large-dark.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
a9d2b2df99c1a115d5394c70a898d8801092208dc582f8bd6fb01b35c30d6b22

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1585045399
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:09 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24 Mar 2020 10:23:18 GMT
Server
nginx
ETag
W/"5e79df96-32c"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Tue, 31 Mar 2020 18:47:09 GMT
logo-white.png
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
10 KB
10 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/logo-white.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e4058d4ee9da1ceaddfa91ddb63650ba67285f1bbfee487d9dfe648bced669a0

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1585045399
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:09 GMT
Last-Modified
Tue, 24 Mar 2020 10:23:18 GMT
Server
nginx
ETag
"5e79df96-260a"
Content-Type
image/png
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
9738
Expires
Tue, 31 Mar 2020 18:47:09 GMT
fontawesome-webfont.woff2
assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/fonts/
75 KB
76 KB
Font
General
Full URL
https://assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/fonts/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:1a00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe

Request headers

Referer
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=456b3244
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 10 Sep 2019 00:45:02 GMT
via
1.1 fb48b5d9efb59feb57513ac91c796649.cloudfront.net (CloudFront)
age
16999326
x-cache
Hit from cloudfront
status
200
content-length
77160
pragma
public
last-modified
Mon, 09 Sep 2019 14:29:03 GMT
server
nginx
etag
"5d7661af-12d68"
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000, public
x-amz-cf-pop
BRU50-C1
accept-ranges
bytes
x-amz-cf-id
jcNeZTIL8P5dQP7OgVpEzk7y-gd00i30sYLAxU3xdeFIRLh3vjEqkg==
expires
Wed, 09 Sep 2020 00:45:02 GMT
photo-newsletter.jpg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
83 KB
83 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/photo-newsletter.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
940e0c3385928422aae38e1a74f1d84b462d8ce1a056c686fde505a0bf3162bb

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Tue, 24 Mar 2020 18:47:10 GMT
Last-Modified
Tue, 24 Mar 2020 10:23:18 GMT
Server
nginx
ETag
"5e79df96-14c88"
Content-Type
image/jpeg
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
85128
Expires
Tue, 31 Mar 2020 18:47:10 GMT
anchor
www.google.com/recaptcha/api2/ Frame 6E5C
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=P6KLRNy7h3K160ZmYNUOAce7&theme=standard&size=normal&cb=c21nk2vnzo2y
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-VSvOgGUQyHvxc/I7plyLFg' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=P6KLRNy7h3K160ZmYNUOAce7&theme=standard&size=normal&cb=c21nk2vnzo2y
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Tue, 24 Mar 2020 18:47:08 GMT
content-security-policy
script-src 'report-sample' 'nonce-VSvOgGUQyHvxc/I7plyLFg' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
10193
server
GSE
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
ADTECH;apid=1Add24e316-6dff-11ea-b70e-12358a211a00;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1Add24e316-6dff-11ea-b70e-12358a211a00;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=15...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1Add24e316-6dff-11ea-b70e-12358a211a00;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1Add24e316-6dff-11ea-b70e-12358a211a00;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1Add24e316-6dff-11ea-b70e-12358a211a00;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Add24f8b0-6dff-11ea-9b84-1245d65848a4;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1Add24f8b0-6dff-11ea-9b84-1245d65848a4;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=15...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1Add24f8b0-6dff-11ea-9b84-1245d65848a4;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1Add24f8b0-6dff-11ea-9b84-1245d65848a4;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1Add24f8b0-6dff-11ea-9b84-1245d65848a4;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Add2501a2-6dff-11ea-aff6-1212911483a0;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1Add2501a2-6dff-11ea-aff6-1212911483a0;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=15...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1Add2501a2-6dff-11ea-aff6-1212911483a0;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1Add2501a2-6dff-11ea-aff6-1212911483a0;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1Add2501a2-6dff-11ea-aff6-1212911483a0;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Add252f24-6dff-11ea-a1fd-12495d14311c;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1Add252f24-6dff-11ea-a1fd-12495d14311c;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=15...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1Add252f24-6dff-11ea-a1fd-12495d14311c;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1Add252f24-6dff-11ea-a1fd-12495d14311c;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1Add252f24-6dff-11ea-a1fd-12495d14311c;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=15...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
/
graph.facebook.com/
81 B
525 B
XHR
General
Full URL
https://graph.facebook.com/?id=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:800e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
590bb20df1ee6e8f73217756993f3a43ab448cfa37383a03bb1c1dedaae466ad
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload
etag
"212def2993b7d77b04214dcc70e403edbc637d02"
x-app-usage
{"call_count":0,"total_cputime":0,"total_time":0}
status
200
x-fb-rev
1001888771
alt-svc
h3-27=":443"; ma=3600
content-length
81
pragma
no-cache
x-fb-debug
9Jy+2oVe+HYWciNj/4VeYCQTVDxECERiKM4ApiwrKsdHhEtgZotmKYv7ltDByLJtgJaJs0ngsCBBf7/0FXp8Uw==
x-fb-trace-id
CrWjtQftKvJ
date
Tue, 24 Mar 2020 18:47:08 GMT, Tue, 24 Mar 2020 18:47:08 GMT
content-type
application/json
access-control-allow-origin
*
x-fb-request-id
Ax-UkITKcygFScHFkaSSg82
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.12
expires
Sat, 01 Jan 2000 00:00:00 GMT
share
www.linkedin.com/countserv/count/
0
0
Script
General
Full URL
https://www.linkedin.com/countserv/count/share?url=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&format=jsonp&callback=jQuery112408219893813200332_1585075627968&_=1585075627969
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:11:101::b93f:9001 , Ireland, ASN14413 (LINKEDIN, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

info.json
www.reddit.com/api/
102 B
1 KB
XHR
General
Full URL
https://www.reddit.com/api/info.json?url=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.53.140 Manchester, United Kingdom, ASN54113 (FASTLY, US),
Reverse DNS
Software
snooserv /
Resource Hash
f4f2c0a4763f01ee2b13b4f8189e6fd5f32bd704d71fed8d0f11883de9724198
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 18:47:08 GMT
via
1.1 varnish
x-content-type-options
nosniff
x-cache
MISS
status
200
content-length
102
x-xss-protection
1; mode=block
x-served-by
cache-man4127-MAN
x-moose
majestic
expires
-1
server
snooserv
x-timer
S1585075628.283022,VS0,VE117
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
X-Moose
cache-control
private, s-maxage=0, max-age=0, must-revalidate, no-store, max-age=0, must-revalidate
x-ua-compatible
IE=edge
accept-ranges
bytes
x-cache-hits
0
analytics.js
www.google-analytics.com/
44 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
eaf1b128b927ac2868755cb7366d35554255c8af362235afe270f9614f8c806d
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 06 Feb 2020 00:21:02 GMT
server
Golfe2
age
513
date
Tue, 24 Mar 2020 18:38:35 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
18174
expires
Tue, 24 Mar 2020 20:38:35 GMT
quant.js
secure.quantserve.com/
13 KB
6 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.143 , United Kingdom, ASN27281 (QUANTCAST, US),
Reverse DNS
Software
QS /
Resource Hash
e8d7c60749c1d62942a8e0a6f901800bd14ff3094251373626cd99a8875c6391
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 18:47:08 GMT
Content-Encoding
gzip
Last-Modified
Tue, 24-Mar-2020 18:47:08 GMT
Server
QS
Etag
M0-56c8c653
Vary
Accept-Encoding
Strict-Transport-Security
max-age=86400
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
keep-alive
Content-Length
5651
Expires
Tue, 31 Mar 2020 18:47:08 GMT
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:08 GMT
content-encoding
gzip
age
37959
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-fra19150-FRA
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1585075628.276971,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes
DetectGDPR2.v1.0.js
live.sekindo.com/content/ClientDetections/ Frame EAEA
8 KB
3 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/DetectGDPR2.v1.0.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1585075627&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
ace61d80f3fe90bbb02ab328d9705b57a9c8a95d3a0bf6b4cd510d4dacd033df

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 18:47:08 GMT
Content-Encoding
gzip
Last-Modified
Sun, 26 Jan 2020 18:48:12 GMT
Server
nginx
ETag
W/"5e2ddeec-211f"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Wed, 24 Mar 2021 18:47:08 GMT
iab_consent_sdk.v1.0.js
live.sekindo.com/content/ClientDetections/ Frame EAEA
19 KB
6 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/iab_consent_sdk.v1.0.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1585075627&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
a3336e3373c170b40764f5a62d121335bec4243b0034e561937194dfe2e413fd

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 18:47:07 GMT
Content-Encoding
gzip
Last-Modified
Wed, 12 Feb 2020 15:01:36 GMT
Server
nginx
ETag
W/"5e441350-4be0"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Wed, 24 Mar 2021 18:47:07 GMT
DetectGDPR.v1.0.js
live.sekindo.com/content/ClientDetections/ Frame EAEA
7 KB
3 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/DetectGDPR.v1.0.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1585075627&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
993ebc45d9927d420801f05819222e8cc1aa523187e4c0b290df02b23ce18093

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 18:47:07 GMT
Content-Encoding
gzip
Last-Modified
Sun, 26 Jan 2020 11:58:13 GMT
Server
nginx
ETag
W/"5e2d7ed5-1d87"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Wed, 24 Mar 2021 18:47:07 GMT
hls.0.12.4_1.min.js
live.sekindo.com/content/video/hls/ Frame EAEA
247 KB
85 KB
Script
General
Full URL
https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1585075627&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
7d0492c66125b1c2bdc419641e41542857e7d90e323d355ee0b8bb268da121fb

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 18:47:07 GMT
Content-Encoding
gzip
Last-Modified
Mon, 06 Jan 2020 15:31:55 GMT
Server
nginx
ETag
W/"5e1352eb-3dcb9"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Wed, 24 Mar 2021 18:47:07 GMT
prebidVid.2.44.3_2.min.js
live.sekindo.com/content/prebid/ Frame EAEA
267 KB
99 KB
Script
General
Full URL
https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1585075627&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
4ee36d77a67f176a8468c3fafd5c230a2b8584293b81221b004619e700f84106

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 18:47:08 GMT
Content-Encoding
gzip
Last-Modified
Thu, 30 Jan 2020 06:21:36 GMT
Server
nginx
ETag
W/"5e3275f0-42b3f"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Wed, 24 Mar 2021 18:47:08 GMT
liveVideo.php
live.sekindo.com/live/ Frame EAEA
353 KB
103 KB
Script
General
Full URL
https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D32345F32307D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e7a55ac12464&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.82740020751953&geoLong=4.3480000495910645&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1585075627&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
3c008d7c02810881f795ed4e64d33e24e204056f58632b95304ef7429c98db6d

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Tue, 24 Mar 2020 18:47:07 GMT
Content-Encoding
gzip
Server
nginx
X-Powered-By
PHP/7.3.15
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&aip=1&a=859632365&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ul=en-us&de=UTF-8&dt=Hacker...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-35676203-21&cid=1066081866.1585075628&jid=912452835&_gid=2059936311.1585075628&gjid=1530187708&_v=j81&z=1994047704
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1066081866.1585075628&jid=912452835&_v=j81&z=1994047704
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1066081866.1585075628&jid=912452835&_v=j81&z=1994047704&slf_rd=1&random=3803922350
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1066081866.1585075628&jid=912452835&_v=j81&z=1994047704&slf_rd=1&random=3803922350
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1066081866.1585075628&jid=912452835&_v=j81&z=1994047704&slf_rd=1&random=3803922350
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ADTECH;apid=1Add24f8b0-6dff-11ea-9b84-1245d65848a4;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/
606 B
737 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1Add24f8b0-6dff-11ea-9b84-1245d65848a4;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=47b7f72e0e2ac0e;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
da63e3adb43aec5d42f99e8a7de34af2a235500e291fe8ab064b47fd57c79209

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
606
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Add2501a2-6dff-11ea-aff6-1212911483a0;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/
604 B
735 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1Add2501a2-6dff-11ea-aff6-1212911483a0;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=48a77434b978cde;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
3f414e9995a99f5a231d3724f66eadd186f36d85171e9e1d0d58ffb711b0e381

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
604
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Add252f24-6dff-11ea-a1fd-12495d14311c;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/
606 B
737 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1Add252f24-6dff-11ea-a1fd-12495d14311c;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=49956f650bd8efa;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
58f2eefaf6b24b6bab8e3e024135ac1d8164110ac2069bd9192cae06357cfc50

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
606
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Add24e316-6dff-11ea-b70e-12358a211a00;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/
606 B
761 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1Add24e316-6dff-11ea-b70e-12358a211a00;cfp=1;rndc=1585075627;v=2;cmd=bid;cors=yes;alias=45fcdd1790eedc9;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
26bd8ec976d5c80dbf8350e43c625ac30fc302d63107bd0cd51d8bd7dd1f90c1

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
606
expires
Mon, 15 Jun 1998 00:00:00 GMT
apstag.js
c.amazon-adsystem.com/aax2/ Frame EAEA
87 KB
25 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D32345F32307D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e7a55ac12464&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.82740020751953&geoLong=4.3480000495910645&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.159.242 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-159-242.mxp64.r.cloudfront.net
Software
Server /
Resource Hash
ac2a58f9d55c4642121cfb6f7e213cbc882bbdd75ef171ca8a07ed982ef693ce

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 23 Mar 2020 22:00:54 GMT
content-encoding
gzip
server
Server
age
74773
etag
1dcfbf3986ee8b9c3abbc67eb808ab43
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=86400
x-amz-cf-pop
MXP64-C2
accept-ranges
bytes
x-amz-cf-id
7WOlJPkrRu7JKlCVUJ2-iDUGtlZd8yYz8BYTbFfe3Z0RJRqa20WDDQ==
via
1.1 ea6b6651a564f3c1a19b54389d1f51e9.cloudfront.net (CloudFront)
rules-p-_7kVx0t9Jqj90.js
rules.quantcount.com/
3 B
354 B
Script
General
Full URL
https://rules.quantcount.com/rules-p-_7kVx0t9Jqj90.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21d7:ee00:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:46:30 GMT
via
1.1 d04998a67c7a3fb6819bd5fdd0bbe125.cloudfront.net (CloudFront)
last-modified
Fri, 03 Mar 2017 23:52:35 GMT
server
AmazonS3
age
39
etag
"8a80554c91d9fca8acb82f023de02f11"
x-cache
Error from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=300
x-amz-cf-pop
BRU50-C1
accept-ranges
bytes
content-length
3
x-amz-cf-id
TO5k4AQRTo3ME24s7miMRnGeYSKtBQ8d8iBa337i4b4lsdUbius9GA==
bframe
www.google.com/recaptcha/api2/ Frame 2B86
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/bframe?hl=en&v=P6KLRNy7h3K160ZmYNUOAce7&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=hnpukau13w7h
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-JvJRnWxOQ2AsdbTmrqw4iw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/bframe?hl=en&v=P6KLRNy7h3K160ZmYNUOAce7&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=hnpukau13w7h
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Tue, 24 Mar 2020 18:47:08 GMT
content-security-policy
script-src 'report-sample' 'nonce-JvJRnWxOQ2AsdbTmrqw4iw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
1180
server
GSE
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
adsct
t.co/i/
43 B
448 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=ntt0j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.133 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 24 Mar 2020 18:47:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=0
content-length
65
x-xss-protection
0
x-response-time
122
pragma
no-cache
last-modified
Tue, 24 Mar 2020 18:47:08 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
8cfac8ef5228eac3235b629f51cf64a9
x-transaction
0049506100e2ca43
expires
Tue, 31 Mar 1981 05:00:00 GMT
css
fonts.googleapis.com/ Frame D757
2 KB
684 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto&display=swap
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D32345F32307D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e7a55ac12464&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.82740020751953&geoLong=4.3480000495910645&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
00d4fbacbadc6ecbd73be323ec77febf3d856ce00dc5334d06462a315c7da8e7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
x-xss-protection
0
last-modified
Tue, 24 Mar 2020 18:47:08 GMT
server
ESF
date
Tue, 24 Mar 2020 18:47:08 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Tue, 24 Mar 2020 18:47:08 GMT
css
fonts.googleapis.com/ Frame EA21
2 KB
638 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto&display=swap
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D32345F32307D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e7a55ac12464&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.82740020751953&geoLong=4.3480000495910645&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
00d4fbacbadc6ecbd73be323ec77febf3d856ce00dc5334d06462a315c7da8e7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
x-xss-protection
0
last-modified
Tue, 24 Mar 2020 18:47:08 GMT
server
ESF
date
Tue, 24 Mar 2020 18:47:08 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Tue, 24 Mar 2020 18:47:08 GMT
placeHolder.png
live.sekindo.com/content/video/splayer/assets/
23 KB
24 KB
Image
General
Full URL
https://live.sekindo.com/content/video/splayer/assets/placeHolder.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
76102878c1198de858725194952ba1c6b35bdee0f870cc6a124e93d17385e64e

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Tue, 24 Mar 2020 18:47:07 GMT
Last-Modified
Sun, 11 Jun 2017 08:04:05 GMT
Server
nginx
ETag
"593cf975-5dbf"
Content-Type
image/png
Cache-Control
no-cache, private
Accept-Ranges
bytes
Content-Length
23999
Expires
Tue, 24 Mar 2020 18:47:06 GMT
vid5e798c8b791f9355055399.jpg
video.sekindo.com/uploads/cn10/video/users/converted/24485/video1523972806/ Frame EA21
24 KB
24 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn10/video/users/converted/24485/video1523972806/vid5e798c8b791f9355055399.jpg?cbuster=1585024141
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
cb772e2fd5777f6e47265c075172199c9d3349972751c0c171fe28986078e5e8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Tue, 24 Mar 2020 18:46:39 GMT
Last-Modified
Tue, 24 Mar 2020 04:29:29 GMT
Server
Tengine
ETag
"5e798ca9-605f"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
24671
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e755144f170e200424424.jpg
video.sekindo.com/uploads/cn4/video/users/converted/24485/video1523972806/ Frame EA21
17 KB
17 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn4/video/users/converted/24485/video1523972806/vid5e755144f170e200424424.jpg?cbuster=1584746821
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
44d4b687ba92f18a62c140badb059a79b9f7b8de696a38b8b462498a7c9e0317
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Tue, 24 Mar 2020 18:46:39 GMT
Last-Modified
Sat, 21 Mar 2020 08:19:52 GMT
Server
Tengine
ETag
"5e75ce28-42bc"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
17084
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e7497d367e55463572644.jpg
video.sekindo.com/uploads/cn5/video/users/converted/24485/video1523972806/ Frame EA21
18 KB
18 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn5/video/users/converted/24485/video1523972806/vid5e7497d367e55463572644.jpg?cbuster=1584699348
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
1375c3a601c8c119942e35a8a9b340c0a44c53b15983e961295f04dc66889da9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Tue, 24 Mar 2020 18:46:39 GMT
Last-Modified
Fri, 20 Mar 2020 16:35:26 GMT
Server
Tengine
ETag
"5e74f0ce-47da"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
18394
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e7497d4446f4940112160.jpg
video.sekindo.com/uploads/cn5/video/users/converted/24485/video1523972806/ Frame EA21
21 KB
22 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn5/video/users/converted/24485/video1523972806/vid5e7497d4446f4940112160.jpg?cbuster=1584699350
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
175c4ee607cf88107cf9044684b875a2c51df553b60071c649ea7e1707d6cdca
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Tue, 24 Mar 2020 18:46:39 GMT
Last-Modified
Fri, 20 Mar 2020 16:38:17 GMT
Server
Tengine
ETag
"5e74f179-5547"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
21831
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e71c75337a14771087703.jpg
video.sekindo.com/uploads/cn4/video/users/converted/24485/video1523972806/ Frame EA21
26 KB
27 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn4/video/users/converted/24485/video1523972806/vid5e71c75337a14771087703.jpg?cbuster=1584514900
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
8fa3dc8d99f9c768dab8377000d306d6c3795c024993ab8a7f42e29f5f236ddd
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Tue, 24 Mar 2020 18:46:39 GMT
Last-Modified
Wed, 18 Mar 2020 07:02:09 GMT
Server
Tengine
ETag
"5e71c771-6929"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
26921
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e755143ae5c1045852669.jpg
video.sekindo.com/uploads/cn4/video/users/converted/24485/video1523972806/ Frame EA21
12 KB
12 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn4/video/users/converted/24485/video1523972806/vid5e755143ae5c1045852669.jpg?cbuster=1584746820
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
7fe9c9bddddeedcfcc45dadb0f0c5f57cce1393013fff5d2c85ec6e9556d1414
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Tue, 24 Mar 2020 18:46:39 GMT
Last-Modified
Sat, 21 Mar 2020 08:19:02 GMT
Server
Tengine
ETag
"5e75cdf6-3019"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
12313
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e798c8a7e83c869954127.jpg
video.sekindo.com/uploads/cn10/video/users/converted/24485/video1523972806/ Frame EA21
19 KB
20 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn10/video/users/converted/24485/video1523972806/vid5e798c8a7e83c869954127.jpg?cbuster=1585024139
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
dbfb38204a6d1e81907454eee4714c5b26d74f7b6b9a250d31030cbac677c2ce
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Tue, 24 Mar 2020 18:46:39 GMT
Last-Modified
Tue, 24 Mar 2020 04:29:09 GMT
Server
Tengine
ETag
"5e798c95-4d9c"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
19868
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e6c0a471826b519440665.jpg
video.sekindo.com/uploads/cn7/video/users/converted/24485/video1523972806/ Frame EA21
16 KB
17 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn7/video/users/converted/24485/video1523972806/vid5e6c0a471826b519440665.jpg?cbuster=1584138823
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
62c8b5e7b9b91b059e48e9ebb828509fcdbc1833196e0a5f06f023440a239b8d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Tue, 24 Mar 2020 18:46:39 GMT
Last-Modified
Fri, 13 Mar 2020 22:39:49 GMT
Server
Tengine
ETag
"5e6c0bb5-4115"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
16661
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e78c63388ed7519841362.jpg
video.sekindo.com/uploads/cn3/video/users/converted/24485/video1523972806/ Frame EA21
20 KB
20 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn3/video/users/converted/24485/video1523972806/vid5e78c63388ed7519841362.jpg?cbuster=1584973364
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
a7b094f48e6774d82dfc7864e438d35675e5dad0ba6f3222a8003e9a932f104e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Tue, 24 Mar 2020 18:46:39 GMT
Last-Modified
Mon, 23 Mar 2020 14:23:17 GMT
Server
Tengine
ETag
"5e78c655-4fb6"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
20406
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e79415165edb982443193.jpg
video.sekindo.com/uploads/cn2/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame EA21
15 KB
16 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn2/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e79415165edb982443193.jpg?cbuster=1585004887
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
24aae0e7015f71a5530c7b28a09feca195e6bf8dfba899cb29a8cf795045d8b7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Tue, 24 Mar 2020 18:46:39 GMT
Last-Modified
Mon, 23 Mar 2020 23:09:06 GMT
Server
Tengine
ETag
"5e794192-3d39"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
15673
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e798c8b791f9355055399.jpg
video.sekindo.com/uploads/cn10/video/users/converted/24485/video1523972806/ Frame D757
24 KB
24 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn10/video/users/converted/24485/video1523972806/vid5e798c8b791f9355055399.jpg?cbuster=1585024141
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
cb772e2fd5777f6e47265c075172199c9d3349972751c0c171fe28986078e5e8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://amli.sekindo.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Tue, 24 Mar 2020 18:46:39 GMT
Last-Modified
Tue, 24 Mar 2020 04:29:29 GMT
Server
Tengine
ETag
"5e798ca9-605f"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
24671
Expires
Thu, 31 Dec 2037 23:55:55 GMT
truncated
/ Frame D757
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame D757
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
liveView.php
live.sekindo.com/live/ Frame EAEA
65 KB
3 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=1&vid_playbackMethod=auto&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn10%2Fvideo%2Fusers%2Fconverted%2F24485%2Fvideo1523972806%2Fvid5e798c8b791f9355055399.mp4&vid_content_id=717401&vid_content_desc=Three+Things+Investors+Should+Look+at+Now&vid_content_title=Three+Things+Investors+Should+Look+at+Now&vid_content_duration=371&debugInformation=&x=400&y=225&fpl=0&pubUrl=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D32345F32307D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&isApp=0&geoLati=50.82740020751953&geoLong=4.3480000495910645&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e7a55ac12464&cbuster=1585075628556&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D32345F32307D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e7a55ac12464&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.82740020751953&geoLong=4.3480000495910645&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
214febabb047aec1a8d7e1984e58168dc32df169eb7b814048b7fc0bb9bfda90

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:08 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.15
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
2833
liveView.php
live.sekindo.com/live/ Frame EAEA
65 KB
3 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=1&vid_playbackMethod=auto&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn10%2Fvideo%2Fusers%2Fconverted%2F24485%2Fvideo1523972806%2Fvid5e798c8b791f9355055399.mp4&vid_content_id=717401&vid_content_desc=Three+Things+Investors+Should+Look+at+Now&vid_content_title=Three+Things+Investors+Should+Look+at+Now&vid_content_duration=371&debugInformation=&x=320&y=180&fpl=0&pubUrl=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D32345F32307D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&isApp=0&geoLati=50.82740020751953&geoLong=4.3480000495910645&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e7a55ac12464&cbuster=1585075628556&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D32345F32307D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e7a55ac12464&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.82740020751953&geoLong=4.3480000495910645&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
bcd22c02b2aafc3f3cb6ac081ca4d92cd02e5ca1eae28feefbbaf5865e5ece15

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:07 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.15
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
2932
liveView.php
live.sekindo.com/live/ Frame EAEA
23 KB
2 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=0&vid_playbackMethod=auto&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn10%2Fvideo%2Fusers%2Fconverted%2F24485%2Fvideo1523972806%2Fvid5e798c8b791f9355055399.mp4&vid_content_id=717401&vid_content_desc=Three+Things+Investors+Should+Look+at+Now&vid_content_title=Three+Things+Investors+Should+Look+at+Now&vid_content_duration=371&debugInformation=&x=400&y=225&fpl=0&pubUrl=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D32345F32307D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&isApp=0&geoLati=50.82740020751953&geoLong=4.3480000495910645&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e7a55ac12464&cbuster=1585075628557&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D32345F32307D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e7a55ac12464&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.82740020751953&geoLong=4.3480000495910645&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
266887488e5c432a84f53a82f22f20e6599a88ade02cca0caac11f99993fcaf8

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:08 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.15
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
1746
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/ Frame EAEA
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.159.242 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-159-242.mxp64.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 07:11:41 GMT
content-encoding
gzip
vary
Origin
age
41727
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Thu, 05 Mar 2020 08:28:46 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 13234883000891123bda3fd8d846da9d.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
MXP64-C2
x-amz-cf-id
rXsbcE5KI20K1xNTn_Qh542OfQljbLyg18SsEhiDaNVGxhy3q99NXQ==
translator
hbopenbid.pubmatic.com/ Frame EAEA
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Tue, 24 Mar 2020 18:47:08 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
openrtb
ads.adaptv.advertising.com/rtb/ Frame EAEA
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=TeachingAidsLLC
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.58.103.169 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-58-103-169.eu-central-1.compute.amazonaws.com
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://threatpost.com
Access-Control-Allow-Credentials
true
Server
adaptv/1.0
Connection
keep-alive
Content-Length
0
Content-Type
application/json
ADTECH;apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/
606 B
737 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc;cfp=1;rndc=1585075628;v=2;cmd=bid;cors=yes;alias=464c3f018acf601;misc=1585075627955
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
71e93cedbe0324984f8346b5eebcdcf4830ffbd900b1ded1426cbf128cbfe795

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
606
expires
Mon, 15 Jun 1998 00:00:00 GMT
liveView.php
live.sekindo.com/live/ Frame EAEA
23 KB
2 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=0&vid_playbackMethod=auto&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn10%2Fvideo%2Fusers%2Fconverted%2F24485%2Fvideo1523972806%2Fvid5e798c8b791f9355055399.mp4&vid_content_id=717401&vid_content_desc=Three+Things+Investors+Should+Look+at+Now&vid_content_title=Three+Things+Investors+Should+Look+at+Now&vid_content_duration=371&debugInformation=&x=320&y=180&fpl=0&pubUrl=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D32345F32307D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&isApp=0&geoLati=50.82740020751953&geoLong=4.3480000495910645&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e7a55ac12464&cbuster=1585075628712&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D32345F32307D7B7331323334383830387D7B4338357D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e7a55ac12464&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=50.82740020751953&geoLong=4.3480000495910645&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
fdb82b8fc87670f882faec7b5667b536c85646076b988cf1a8e666264a4f6c37

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:08 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.15
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
1739
chunklist_640.m3u8
video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/ Frame EAEA
2 KB
2 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/chunklist_640.m3u8
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
6c26b1460fb85e6a1eb93c649654b25a301779ad7b88692baae825089bd38a08

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 18:46:39 GMT
Last-Modified
Tue, 24 Mar 2020 04:29:58 GMT
Server
Tengine
ETag
"5e798cc6-7f3"
Content-Type
application/vnd.apple.mpegurl
Access-Control-Allow-Origin
*
Expires
Tue, 31 Mar 2020 18:46:39 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
2035
X-Proxy-Cache
HIT
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/ Frame D757
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Roboto&display=swap
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 27 Feb 2020 08:47:06 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:50 GMT
server
sffe
age
2282402
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
11016
x-xss-protection
0
expires
Fri, 26 Feb 2021 08:47:06 GMT
pixel;r=508689792;source=gtm;rf=0;a=p-_7kVx0t9Jqj90;url=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F;fpan=1;fpa=P0-662566833-1585075628814;ns=0;ce=1;qjs=1;qv=0e9a7...
pixel.quantserve.com/
35 B
658 B
Image
General
Full URL
https://pixel.quantserve.com/pixel;r=508689792;source=gtm;rf=0;a=p-_7kVx0t9Jqj90;url=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F;fpan=1;fpa=P0-662566833-1585075628814;ns=0;ce=1;qjs=1;qv=0e9a7da-20191205140709;cm=;ref=;je=0;sr=1600x1200x24;enc=n;dst=1;et=1585075628814;tzo=-60;ogl=image.https%3A%2F%2Fmedia%252Ethreatpost%252Ecom%2Fwp-content%2Fuploads%2Fsites%2F103%2F2016%2F10%2F06233258%2Fiot_b%2Ctype.article%2Ctitle.Hackers%20Actively%20Exploit%200-Day%20in%20CCTV%20Camera%20Hardware%2Cdescription.Criminals%20behind%20botnets%20Chalubo%252C%20FBot%20and%20Moobot%20attack%20unpatched%20vulnerabiliti%2Curl.https%3A%2F%2Fthreatpost%252Ecom%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.203 , United Kingdom, ASN27281 (QUANTCAST, US),
Reverse DNS
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:08 GMT
Server
QS
Strict-Transport-Security
max-age=86400
P3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
27 KB
8 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=1126878839814847&correlator=510519910573296&output=ldjh&impl=fifs&adsid=NT&eid=21062832%2C21065392%2C21065733&vrg=2020030501&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200324&iu_parts=21707124336%2CThreatPost-970x250-ATF%2CThreatPost-300x250-ATF%2CThreatPost-300x600-ATF%2CThreatPost-2x2-Skin&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3%2C%2F0%2F4&prev_iu_szs=728x90%7C970x250%7C970x90%2C300x250%7C336x280%2C300x250%7C300x600%2C2x2&eri=1&cust_params=urlhost%3Dhttps%253A%252F%252Fthreatpost.com%252F%26urlpath%3D%252Fhackers-exploited-0-day-cctv-camera%252F154051%252F%26urlquery%3Dgoogfc%26contentid%3D154051%26category%3Diot%26contenttags%3Dbotnets%252Ccctv-cameras%252Cchalubo%252Cddos%252Cdvr%252Cfbot%252Cinternet-of-things%252Ciot%252Cip-video-camera%252Clilin%252Cmirai-botnet%252Cmoobot%252Cnetwork-time-protocol%252Cntpdate%252Cqihoo-360%252Cvulnerability&cookie_enabled=1&bc=31&abxe=1&lmt=1585075628&dt=1585075628871&dlt=1585075627289&idt=572&frm=20&biw=1585&bih=1200&oid=3&adxs=429%2C1075%2C1075%2C0&adys=10%2C257%2C1508%2C0&adks=1015519800%2C654286612%2C375389812%2C3385906655&ucis=1%7C2%7C3%7C4&ifi=1&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&dssz=44&icsg=11275075776&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=728x90%7C300x250%7C300x250%7C1585x2&msz=728x90%7C300x250%7C300x250%7C1585x2&ga_vid=1066081866.1585075628&ga_sid=1585075629&ga_hid=859632365&fws=0%2C0%2C0%2C0&ohw=0%2C0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
b3252dc15ade618ee5f4368e8ff43cb0ece419fb294b2d89e7ffd7324d799304
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
7834
x-xss-protection
0
google-lineitem-id
5256160727,5256232715,5192770279,5283645110
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138298726560,138298747257,138290162637,138301519116
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://threatpost.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020030501.js
securepubads.g.doubleclick.net/gpt/
69 KB
25 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
sffe /
Resource Hash
ffdc18ac8f47bcd50dd9c33532c334e7073717a62b367d95b9cb1561048547dc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 05 Mar 2020 14:08:10 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
25689
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:08 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

translator
hbopenbid.pubmatic.com/ Frame EAEA
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Tue, 24 Mar 2020 18:47:08 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
auction
prebid-server.rubiconproject.com/openrtb2/ Frame EAEA
141 B
359 B
XHR
General
Full URL
https://prebid-server.rubiconproject.com/openrtb2/auction
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.29.128.237 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-29-128-237.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
e0668514bcf0f3726383419dc2940c0359b295c0ba2ee85a5da2760cb5347539

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
content-encoding
gzip
status
200
content-type
application/json
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
146
expires
0
prebid
ib.adnxs.com/ut/v3/ Frame EAEA
144 B
838 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.83 , Netherlands, ASN29990 (ASN-APPNEX, US),
Reverse DNS
250.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
aca021e739e999cc58a14fe7dad5be232334344aed02086f50cd117bae17aae3
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:10 GMT
X-Proxy-Origin
194.187.251.57; 194.187.251.57; 250.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.133:80
AN-X-Request-Uuid
54d05682-6c74-40cc-b43f-ecb38f8b3ad6
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
144
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
cygnus
as-sec.casalemedia.com/ Frame EAEA
25 B
987 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=435870&v=8.1&r=%7B%22id%22%3A%22118e9c38c5c763a%22%2C%22imp%22%3A%5B%7B%22id%22%3A%221263ab2c7a28b07%22%2C%22ext%22%3A%7B%22siteID%22%3A%22435870%22%2C%22sid%22%3A%22320x180%22%7D%2C%22bidfloor%22%3A1.6%2C%22bidfloorcur%22%3A%22USD%22%2C%22video%22%3A%7B%22mimes%22%3A%5B%22video%2Fmp4%22%2C%22application%2Fjavascript%22%5D%2C%22minduration%22%3A1%2C%22maxduration%22%3A200%2C%22api%22%3A%5B1%2C2%5D%2C%22protocols%22%3A%5B1%2C2%2C3%2C4%2C5%2C6%5D%2C%22linearity%22%3A1%2C%22startdelay%22%3A0%2C%22skip%22%3A1%2C%22w%22%3A320%2C%22h%22%3A180%2C%22placement%22%3A1%7D%7D%2C%7B%22id%22%3A%22130260b20e63661%22%2C%22ext%22%3A%7B%22siteID%22%3A%22435871%22%2C%22sid%22%3A%22320x180%22%7D%2C%22bidfloor%22%3A1.6%2C%22bidfloorcur%22%3A%22USD%22%2C%22video%22%3A%7B%22mimes%22%3A%5B%22video%2Fmp4%22%2C%22application%2Fjavascript%22%5D%2C%22minduration%22%3A1%2C%22maxduration%22%3A200%2C%22api%22%3A%5B1%2C2%5D%2C%22protocols%22%3A%5B1%2C2%2C3%2C4%2C5%2C6%5D%2C%22linearity%22%3A1%2C%22startdelay%22%3A0%2C%22skip%22%3A1%2C%22w%22%3A320%2C%22h%22%3A180%2C%22placement%22%3A1%7D%7D%5D%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F%22%7D%2C%22ext%22%3A%7B%22source%22%3A%22prebid%22%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%2C%22user%22%3A%7B%22ext%22%3A%7B%22consent%22%3A%22%22%7D%7D%7D&ac=j&sd=1&nf=1&
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.185.51 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-51.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
a573aad8fd29d67a44e34bad6891443684b930d87b417caa37ffe5dd836e3232

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:09 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
45
Expires
Tue, 24 Mar 2020 18:47:09 GMT
avjp
teachingaids-d.openx.net/v/1.0/ Frame EAEA
92 B
295 B
XHR
General
Full URL
https://teachingaids-d.openx.net/v/1.0/avjp?ju=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ch=UTF-8&res=1600x1200x24&ifr=true&tz=-60&tws=1600x1200&be=1&bc=hb_pb_3.0.1&dddid=b7fdcb87-b4f8-4527-b645-1ea8ebf1ac4a&nocache=1585075628900&gdpr_consent=&gdpr=1&schain=1.0%2C1!admetricspro.com%2C1005%2C1%2C%2C%2C&skip=1&auid=540882778&vwd=320&vht=180&
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.179.0 /
Resource Hash
004e5faf0bf890f61697daeede9f21826affd1137fb2cb58eaf4719937a04a14

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:08 GMT
via
1.1 google
server
OXGW/16.179.0
status
200
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
92
expires
Mon, 26 Jul 1997 05:00:00 GMT
openrtb
ads.adaptv.advertising.com/rtb/ Frame EAEA
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=TeachingAidsLLC
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.58.103.169 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-58-103-169.eu-central-1.compute.amazonaws.com
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://threatpost.com
Access-Control-Allow-Credentials
true
Server
adaptv/1.0
Connection
keep-alive
Content-Length
0
Content-Type
application/json
w_640_000.ts
video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/ Frame EAEA
369 KB
370 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/w_640_000.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
19ae4e2281a2da072731703b255c552800f0da3449996102d18ff60d61be87b7

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 18:46:39 GMT
Last-Modified
Tue, 24 Mar 2020 04:29:41 GMT
Server
Tengine
ETag
"5e798cb5-5c590"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Tue, 31 Mar 2020 18:46:39 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
378256
X-Proxy-Cache
HIT
8d87efbf-d78a-4bd2-8b5a-ee9f3faff4aa
https://threatpost.com/ Frame EAEA
63 KB
0
Other
General
Full URL
blob:https://threatpost.com/8d87efbf-d78a-4bd2-8b5a-ee9f3faff4aa
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e1c3c2dafe2208caea4f809f414a89a9d256deb8671e1c5d49bff9a873782796

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
worker

Response headers

Content-Length
64352
Content-Type
text/javascript
w_640_001.ts
video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/ Frame EAEA
388 KB
389 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/w_640_001.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
31436801f0715fa81180681d78854e4cdb053ae83bca28591be3fe4dee7d72e2

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 18:46:39 GMT
Last-Modified
Tue, 24 Mar 2020 04:29:41 GMT
Server
Tengine
ETag
"5e798cb5-61134"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Tue, 31 Mar 2020 18:46:39 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
397620
X-Proxy-Cache
HIT
liveView.php
live.sekindo.com/live/ Frame EA21
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=16&serverTime=1585075628&s=0&sta=12348808&x=320&y=180&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&isApp=0&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e7a55ac12464&contentFileId=717401&mediaPlayListId=5946&playerVer=3.0.0&contentMatchType=&isExcludeFromOpt=0&cbuster=1585075629253&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:08 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.15
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
bl-88d2de2-61a6b07d.js
tagan.adlightning.com/math-aids-threatpost/ Frame ECBA
78 KB
30 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-88d2de2-61a6b07d.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.5.39 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-84-5-39.lhr62.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ceadb197b513e112160f4dc29d2d6bddf731c821f9f9f582410d116efd24af96

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:21:13 GMT
content-encoding
gzip
age
8757
x-cache
Hit from cloudfront
status
200
content-length
30149
x-amz-meta-git_commit
88d2de2
last-modified
Tue, 24 Mar 2020 16:20:47 GMT
server
AmazonS3
etag
"644996cb0aa655923f5457d64bedb1c7"
x-amz-version-id
xWXiZEve7WGoqNEunBY4Nq.xzhq5qfhH
via
1.1 fce73a5f84ba5b26f15a077c70bc9a61.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
LHR62-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
3fhKsNkMma6eEBMikBxyfw5jidF94TCFPpAC_j11XMisUhRFDZwDvQ==
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/ Frame ECBA
53 KB
15 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.5.39 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-84-5-39.lhr62.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
92236ba12e109fff1e82ecabec1eda229af59c8374c54374a38a46dc01f53559

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Sun, 01 Mar 2020 09:11:19 GMT
content-encoding
gzip
age
2021751
x-cache
Hit from cloudfront
status
200
content-length
14481
x-amz-meta-git_commit
0d4dfcb
last-modified
Mon, 20 Jan 2020 21:00:33 GMT
server
AmazonS3
etag
"bf1a2a1d4ffb353d268fccfda0736572"
x-amz-version-id
PGsbLvp7r6PsyaqOJTHRTfOBKlgvnkI7
via
1.1 fce73a5f84ba5b26f15a077c70bc9a61.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
LHR62-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
m9Viu25u3cCdoEUNJGEC675MLf3kRWCGR3W8wT1LzuXScnoBvFZFRQ==
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/ Frame ECBA
107 KB
38 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
400ae0fc65252bff6eb5b2e93816010a7f15a0424b76239e2de8d6bf89806aa3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
39002
x-xss-protection
0
server
cafe
etag
7784257106377462153
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 24 Mar 2020 18:47:09 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame ECBA
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5a1b118736ba9dc41f144f350574bec748a1ba0e8b355a99cbfe570ad236b50e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1584962844677376"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28201
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:09 GMT
osd.js
www.googletagservices.com/activeview/js/current/
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
351e508c1da4f9d1535747086accb41121466a52044aa868eba4a36009fdb101
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1584962844677376"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
27941
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:09 GMT
bl-88d2de2-61a6b07d.js
tagan.adlightning.com/math-aids-threatpost/ Frame 78A7
78 KB
30 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-88d2de2-61a6b07d.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.5.39 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-84-5-39.lhr62.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ceadb197b513e112160f4dc29d2d6bddf731c821f9f9f582410d116efd24af96

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:21:13 GMT
content-encoding
gzip
age
8757
x-cache
Hit from cloudfront
status
200
content-length
30149
x-amz-meta-git_commit
88d2de2
last-modified
Tue, 24 Mar 2020 16:20:47 GMT
server
AmazonS3
etag
"644996cb0aa655923f5457d64bedb1c7"
x-amz-version-id
xWXiZEve7WGoqNEunBY4Nq.xzhq5qfhH
via
1.1 fce73a5f84ba5b26f15a077c70bc9a61.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
LHR62-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
kFKUfA1EQN-xcRkrp_IULdqXIBW_GaJcbdlLhjZRINyU4wagez81hA==
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/ Frame 78A7
53 KB
15 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.5.39 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-84-5-39.lhr62.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
92236ba12e109fff1e82ecabec1eda229af59c8374c54374a38a46dc01f53559

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Sun, 01 Mar 2020 09:11:19 GMT
content-encoding
gzip
age
2021751
x-cache
Hit from cloudfront
status
200
content-length
14481
x-amz-meta-git_commit
0d4dfcb
last-modified
Mon, 20 Jan 2020 21:00:33 GMT
server
AmazonS3
etag
"bf1a2a1d4ffb353d268fccfda0736572"
x-amz-version-id
PGsbLvp7r6PsyaqOJTHRTfOBKlgvnkI7
via
1.1 fce73a5f84ba5b26f15a077c70bc9a61.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
LHR62-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
jssUYKkkk2oxW5ofL8jCl7H2IsG0cVJSFJfx6qwR6VbDrRIPGep6oQ==
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/ Frame 78A7
107 KB
38 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
400ae0fc65252bff6eb5b2e93816010a7f15a0424b76239e2de8d6bf89806aa3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
39002
x-xss-protection
0
server
cafe
etag
7784257106377462153
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 24 Mar 2020 18:47:09 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 78A7
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5a1b118736ba9dc41f144f350574bec748a1ba0e8b355a99cbfe570ad236b50e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1584962844677376"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28201
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:09 GMT
bl-88d2de2-61a6b07d.js
tagan.adlightning.com/math-aids-threatpost/ Frame 3B87
78 KB
30 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-88d2de2-61a6b07d.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.5.39 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-84-5-39.lhr62.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ceadb197b513e112160f4dc29d2d6bddf731c821f9f9f582410d116efd24af96

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:21:13 GMT
content-encoding
gzip
age
8757
x-cache
Hit from cloudfront
status
200
content-length
30149
x-amz-meta-git_commit
88d2de2
last-modified
Tue, 24 Mar 2020 16:20:47 GMT
server
AmazonS3
etag
"644996cb0aa655923f5457d64bedb1c7"
x-amz-version-id
xWXiZEve7WGoqNEunBY4Nq.xzhq5qfhH
via
1.1 fce73a5f84ba5b26f15a077c70bc9a61.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
LHR62-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
ydNEFMDYhEj5z1nJzZBkEx6sfB_IKpvXiWrvMQ5Q_ukW3nFrjyUc5g==
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/ Frame 3B87
53 KB
15 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.5.39 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-84-5-39.lhr62.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
92236ba12e109fff1e82ecabec1eda229af59c8374c54374a38a46dc01f53559

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Sun, 01 Mar 2020 09:11:19 GMT
content-encoding
gzip
age
2021751
x-cache
Hit from cloudfront
status
200
content-length
14481
x-amz-meta-git_commit
0d4dfcb
last-modified
Mon, 20 Jan 2020 21:00:33 GMT
server
AmazonS3
etag
"bf1a2a1d4ffb353d268fccfda0736572"
x-amz-version-id
PGsbLvp7r6PsyaqOJTHRTfOBKlgvnkI7
via
1.1 fce73a5f84ba5b26f15a077c70bc9a61.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
LHR62-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
R_buKGAYwdgZvI6onF_9tQYL69tYe9EpHcDo_p7SkKPPH60dFufQfw==
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/ Frame 3B87
107 KB
38 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
400ae0fc65252bff6eb5b2e93816010a7f15a0424b76239e2de8d6bf89806aa3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
39002
x-xss-protection
0
server
cafe
etag
7784257106377462153
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 24 Mar 2020 18:47:09 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 3B87
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5a1b118736ba9dc41f144f350574bec748a1ba0e8b355a99cbfe570ad236b50e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1584962844677376"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28201
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:09 GMT
bl-88d2de2-61a6b07d.js
tagan.adlightning.com/math-aids-threatpost/ Frame 3203
78 KB
30 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-88d2de2-61a6b07d.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.5.39 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-84-5-39.lhr62.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ceadb197b513e112160f4dc29d2d6bddf731c821f9f9f582410d116efd24af96

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 16:21:13 GMT
content-encoding
gzip
age
8757
x-cache
Hit from cloudfront
status
200
content-length
30149
x-amz-meta-git_commit
88d2de2
last-modified
Tue, 24 Mar 2020 16:20:47 GMT
server
AmazonS3
etag
"644996cb0aa655923f5457d64bedb1c7"
x-amz-version-id
xWXiZEve7WGoqNEunBY4Nq.xzhq5qfhH
via
1.1 fce73a5f84ba5b26f15a077c70bc9a61.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
LHR62-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
-rS-ef1C5DuJvJoqoQRaVX9w1Fjo1OFq_2zQ9rLLYKYQ-U5o7o2NmQ==
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/ Frame 3203
53 KB
15 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.84.5.39 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-84-5-39.lhr62.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
92236ba12e109fff1e82ecabec1eda229af59c8374c54374a38a46dc01f53559

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Sun, 01 Mar 2020 09:11:19 GMT
content-encoding
gzip
age
2021751
x-cache
Hit from cloudfront
status
200
content-length
14481
x-amz-meta-git_commit
0d4dfcb
last-modified
Mon, 20 Jan 2020 21:00:33 GMT
server
AmazonS3
etag
"bf1a2a1d4ffb353d268fccfda0736572"
x-amz-version-id
PGsbLvp7r6PsyaqOJTHRTfOBKlgvnkI7
via
1.1 fce73a5f84ba5b26f15a077c70bc9a61.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
LHR62-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
8c7qsjJGJozjgdZ6Rp5l0UA5bjNJKl8kNCKnnUYElO1P0H-Umbdz_w==
amp4ads-host-v0.js
cdn.ampproject.org/rtv/012003101714470/
20 KB
8 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012003101714470/amp4ads-host-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c2b0d171a4179bf00898c430c1c15464e528aff5762fc70a5d02184834c82eff
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
5799
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
7178
x-xss-protection
0
server
sffe
date
Tue, 24 Mar 2020 17:10:30 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"9d3d923337ef7e9b"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 24 Mar 2021 17:10:30 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame ECBA
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssfE8_NxmIprYyepH12ihSvZN0GMnPVAmpBeCxwPqU-GLyik41DXIyn73pl-QARdvv4q13ZqFj65DHYQ51IRb-KkmPad_Rp34rsz-a4x9nyfvFoYMX11g-1A-DTT1XBNKMIYXA0u3J2Fw6CquqcSHQf9rzXTAGpKK_QYN10jeS4rKDx-_ntlLOf4fknfbkrb-IAg-eYpgrzy-SSysFfHtidjy_jLqrBBZqA1tMb0A6APymRSykohzViGR7t7amTM6rwC51psCu9yY1UkwMzYj-K-hq8&sai=AMfl-YSYE4Y_zkXqLPEfXnlVTqTniYBlxvvv4D6zla-6dxZ5CGroshoZyIX0zm7ah9DHQgTMGzwYPQBFK1b26qtIQ-mGXfJ1y0OwFxtbKtcj&sig=Cg0ArKJSzNHaEnvugkNtEAE&urlfix=1&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

timing-allow-origin
*
date
Tue, 24 Mar 2020 18:47:09 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:09 GMT
truncated
/ Frame ECBA
210 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
02f8c292f95fb64bf86125ef49e641520948b595cf5a2cf506d003cb8a8fcc06

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 78A7
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvbbbbrA4xNMwpCpNHEWKSVHvG5mI8zJtNwXRQw5YKNxZUV_d9LFbmmLRfcxMXU1vpijtZTXV2PnhKkuuVAvzDVjAKuv9HNqwdH4pP1vzRJjU9RJBGswB_jI6j0D3ow8w0BKr-iqtw64bn24SMsyJzKiAsz2-C7aLJR2GCYRTqPdqC1mERNhSx8WOYcdni23IuOULdo2OMVb2Gm4OhqSDfqGFV8QjXVNbGuEurnzIBokE1t-HVabPyO30BPY1s-8WLO6hRcay2rpR7wQh4HHMcKhUj_&sai=AMfl-YRESiPY2ypYXZ2W7QheMI_u6x-oNP01SKRCTv5kaVgFWa9PWucMCfjLw8K0WzykHl4LtN3X48TJ1oB4-nEY4mrQYbWjCSReRYgOKGXR&sig=Cg0ArKJSzElMAAD3KqVSEAE&urlfix=1&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

timing-allow-origin
*
date
Tue, 24 Mar 2020 18:47:09 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:09 GMT
truncated
/ Frame 78A7
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e5846f7e105a0a639861c22aa7e7fd0a0105046602e28acec3b771afc5828567

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
integrator.js
adservice.google.de/adsid/ Frame ECBA
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame ECBA
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/ Frame ECBA
224 KB
84 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a369e130c680ce4782af107acfcac873193d111897fb92351f12453ea11a19e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
85397
x-xss-protection
0
server
cafe
etag
2345445785748755544
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 24 Mar 2020 18:47:09 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20200316/r20190131/ Frame 0F48
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20200316/r20190131/zrt_lookup.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20200316/r20190131/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUnnCVSIGq3AVQTh9BN8WcvoEoSW3cqagZQvPf0z1dqr-A2_tu2qAO3cmI20
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Tue, 17 Mar 2020 01:35:31 GMT
expires
Tue, 31 Mar 2020 01:35:31 GMT
content-type
text/html; charset=UTF-8
etag
17714563530871986051
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
4497
x-xss-protection
0
cache-control
public, max-age=1209600
age
666698
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
integrator.js
adservice.google.de/adsid/ Frame 78A7
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 78A7
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/ Frame 78A7
224 KB
84 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a369e130c680ce4782af107acfcac873193d111897fb92351f12453ea11a19e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
85397
x-xss-protection
0
server
cafe
etag
2345445785748755544
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 24 Mar 2020 18:47:09 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 3B87
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssQOSaMmidUdn78U4Aga37VNoeJ7fKOL23VJu9nw0HqYIur07RM-AKqDoRkDx45CEM02bbCnOPG7DuRyFYZhOAv0ageS9AHlnlDL-PLLuk1YGnDW19RtriIzrt86Z4dVIxZrxMFvBFuaAUfMhV1CvLNF92G1Iu-u9tsDC3_0sO4mL7muzHImUSNWhPRJUS107uedMjQ4NWXAWRitYKVa6Au9sKsdIZ-myEwCFi4dUVvwBXARDEbCSbfGNepainYlYqu9pS38ZSDVAIPT60HeshFEFwa&sai=AMfl-YQqptA4980WQRzuxGIXKchY-jwMBOaOMnwXOjVGl34Vw6xy3yUkodE4NCawv3ZcS7_vpibhANFYrzt0evHUl1UaUwZeUX4L6zDPZFYz&sig=Cg0ArKJSzAk4k-3HAD6BEAE&urlfix=1&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

timing-allow-origin
*
date
Tue, 24 Mar 2020 18:47:09 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
truncated
/ Frame 3B87
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a9f4f57448272dc66a3ea986c5985adf82fb730fdb35ab10c00fb554427d8adb

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/012003101714470/ Frame 3203
200 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012003101714470/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4486f4e70d7321e8f64da51c38b50767e846bdaf4ef3441d628f27a4f8952c10
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
script
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16891
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
55811
x-xss-protection
0
server
sffe
date
Tue, 24 Mar 2020 14:05:38 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"789295de90cb321e"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 24 Mar 2021 14:05:38 GMT
amp4ads-v0.js
cdn.ampproject.org/rtv/012003101714470/ Frame 3203
200 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012003101714470/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4486f4e70d7321e8f64da51c38b50767e846bdaf4ef3441d628f27a4f8952c10
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16891
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
55811
x-xss-protection
0
server
sffe
date
Tue, 24 Mar 2020 14:05:38 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"789295de90cb321e"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 24 Mar 2021 14:05:38 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012003101714470/v0/ Frame 3203
92 KB
28 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012003101714470/v0/amp-analytics-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e17e03dc3ff1767a8d185975a2bf392068a0b2f2848503c38ceaa3f10fb0ea84
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
16883
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28328
x-xss-protection
0
server
sffe
date
Tue, 24 Mar 2020 14:05:46 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"f4788313c10056ed"
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 24 Mar 2021 14:05:46 GMT
7464639028652035684
tpc.googlesyndication.com/simgad/ Frame 3203
330 B
478 B
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7464639028652035684
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f19e7ee6cdf20bd478c037707c447b7cd469051de4dadeac32a795efb463c2e2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Fri, 06 Mar 2020 09:43:39 GMT
x-content-type-options
nosniff
age
1587810
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
330
x-xss-protection
0
last-modified
Tue, 28 Jan 2020 23:02:00 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 06 Mar 2021 09:43:39 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 3203
0
57 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss1z46X2PyE2cEgm0cKOS5wt4hvDJzwyYlX2PzmGJkt8cRMNRWPvMAtbKuvKrvj9mIrQeeWx-6S5ZuYtxG0lN5fZTnsLv8OKj_1z0jlUDZDTDnNQy5p1RQ9tZQCBvXMN6Wfa7SYdgpvov1j3jOaxqjHrxbXne_ejOIC1spbvcLxUHmw8Tfq_qtQDq7xXLeRs7goBxYloH_9l_r0XPmdqrnwOcOT2xouwMbE9a4JV0BGh16U-M6vmmNR6r4WjIIgdj4eyQYB0ohfKpch2iBScQ&sai=AMfl-YTJBX6qrWNFifBiAyKZRHIA1fWCMeMbVnqusn8wreOfJvWMzsRaRS2vV-t9dg_JN81oE_WWqzVX36KEOEoi_YQIBMcH6p9MyKmxPd8p&sig=Cg0ArKJSzM0u1jv81LlSEAE&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
truncated
/ Frame 3203
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5bd1b1e2b8ab205ff6589aca6d343dd6736923186d1e1f436d338e30ab85acf9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
integrator.js
adservice.google.de/adsid/ Frame 3B87
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 3B87
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/ Frame 3B87
224 KB
84 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a369e130c680ce4782af107acfcac873193d111897fb92351f12453ea11a19e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
85397
x-xss-protection
0
server
cafe
etag
2345445785748755544
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Tue, 24 Mar 2020 18:47:09 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame B484
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=90&slotname=5620800026&adk=2236077833&adf=3173046725&w=970&psa=0&guci=1.2.0.0.2.2.0.0&format=970x90&url=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1585075629471&bpp=17&bdt=144&fdt=184&idt=184&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&correlator=2572689394282&frm=23&ife=4&pv=2&ga_vid=1066081866.1585075628&ga_sid=1585075630&ga_hid=2126302693&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=308&ady=10&biw=1585&bih=1200&isw=970&ish=90&ifk=3361072646&scr_x=0&scr_y=0&oid=3&pvsid=736344778191518&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C970%2C90&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.9yn3pv4m2iwl&fsb=1&dtd=194
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-7500593236707325&output=html&h=90&slotname=5620800026&adk=2236077833&adf=3173046725&w=970&psa=0&guci=1.2.0.0.2.2.0.0&format=970x90&url=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1585075629471&bpp=17&bdt=144&fdt=184&idt=184&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&correlator=2572689394282&frm=23&ife=4&pv=2&ga_vid=1066081866.1585075628&ga_sid=1585075630&ga_hid=2126302693&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=308&ady=10&biw=1585&bih=1200&isw=970&ish=90&ifk=3361072646&scr_x=0&scr_y=0&oid=3&pvsid=736344778191518&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C970%2C90&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.9yn3pv4m2iwl&fsb=1&dtd=194
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUnnCVSIGq3AVQTh9BN8WcvoEoSW3cqagZQvPf0z1dqr-A2_tu2qAO3cmI20
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Tue, 24 Mar 2020 18:47:09 GMT
server
cafe
content-length
204
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame ECBA
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
351e508c1da4f9d1535747086accb41121466a52044aa868eba4a36009fdb101
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1584962844677376"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
27941
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:09 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame D0F9
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=280&slotname=7077012612&adk=2662501839&adf=3173046724&w=336&psa=0&guci=1.2.0.0.2.2.0.0&format=336x280&url=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1585075629564&bpp=5&bdt=229&fdt=159&idt=159&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&correlator=2572689394282&frm=23&ife=4&pv=1&ga_vid=1066081866.1585075628&ga_sid=1585075630&ga_hid=188924414&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1057&ady=257&biw=1585&bih=1200&isw=336&ish=280&ifk=3935297907&scr_x=0&scr_y=0&eid=21065725&oid=3&pvsid=1175099316616374&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C336%2C280&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.xbj4dnyou7q0&fsb=1&dtd=164
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-7500593236707325&output=html&h=280&slotname=7077012612&adk=2662501839&adf=3173046724&w=336&psa=0&guci=1.2.0.0.2.2.0.0&format=336x280&url=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1585075629564&bpp=5&bdt=229&fdt=159&idt=159&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&correlator=2572689394282&frm=23&ife=4&pv=1&ga_vid=1066081866.1585075628&ga_sid=1585075630&ga_hid=188924414&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1057&ady=257&biw=1585&bih=1200&isw=336&ish=280&ifk=3935297907&scr_x=0&scr_y=0&eid=21065725&oid=3&pvsid=1175099316616374&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C336%2C280&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.xbj4dnyou7q0&fsb=1&dtd=164
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUnnCVSIGq3AVQTh9BN8WcvoEoSW3cqagZQvPf0z1dqr-A2_tu2qAO3cmI20
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Tue, 24 Mar 2020 18:47:10 GMT
server
cafe
content-length
29012
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame 78A7
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
351e508c1da4f9d1535747086accb41121466a52044aa868eba4a36009fdb101
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1584962844677376"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
27941
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:09 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 6E8F
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=600&slotname=7785652766&adk=2248810365&adf=3173046723&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1585075629630&bpp=5&bdt=290&fdt=132&idt=132&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&correlator=2572689394282&frm=23&ife=4&pv=1&ga_vid=1066081866.1585075628&ga_sid=1585075630&ga_hid=1944273300&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1075&ady=1538&biw=1585&bih=1200&isw=300&ish=600&ifk=3946578095&scr_x=0&scr_y=0&eid=21064802&oid=3&pvsid=3685369569621237&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C600&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.mljhqseoq30k&btvi=1&fsb=1&dtd=135
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-7500593236707325&output=html&h=600&slotname=7785652766&adk=2248810365&adf=3173046723&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x600&url=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1585075629630&bpp=5&bdt=290&fdt=132&idt=132&shv=r20200316&cbv=r20190131&ptt=9&saldr=aa&correlator=2572689394282&frm=23&ife=4&pv=1&ga_vid=1066081866.1585075628&ga_sid=1585075630&ga_hid=1944273300&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1075&ady=1538&biw=1585&bih=1200&isw=300&ish=600&ifk=3946578095&scr_x=0&scr_y=0&eid=21064802&oid=3&pvsid=3685369569621237&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C600&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.mljhqseoq30k&btvi=1&fsb=1&dtd=135
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUnnCVSIGq3AVQTh9BN8WcvoEoSW3cqagZQvPf0z1dqr-A2_tu2qAO3cmI20
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Tue, 24 Mar 2020 18:47:10 GMT
server
cafe
content-length
204
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame 3B87
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
351e508c1da4f9d1535747086accb41121466a52044aa868eba4a36009fdb101
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1584962844677376"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
27941
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:09 GMT
7464639028652035684
tpc.googlesyndication.com/simgad/ Frame 3203
330 B
391 B
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7464639028652035684
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012003101714470/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f19e7ee6cdf20bd478c037707c447b7cd469051de4dadeac32a795efb463c2e2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Fri, 06 Mar 2020 09:43:39 GMT
x-content-type-options
nosniff
age
1587810
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
330
x-xss-protection
0
last-modified
Tue, 28 Jan 2020 23:02:00 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 06 Mar 2021 09:43:39 GMT
w_640_002.ts
video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/ Frame EAEA
359 KB
359 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/w_640_002.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
2e996835b77eb2332b08200758e813b3df76d240bde5a5f6f205a19915c601d8

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 18:46:40 GMT
Last-Modified
Tue, 24 Mar 2020 04:29:42 GMT
Server
Tengine
ETag
"5e798cb6-59af8"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Tue, 31 Mar 2020 18:46:40 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
367352
X-Proxy-Cache
HIT
pd
u.openx.net/w/1.0/ Frame 73C2
0
0
Document
General
Full URL
https://u.openx.net/w/1.0/pd?gdpr=1&gdpr_consent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.179.0 /
Resource Hash

Request headers

:method
GET
:authority
u.openx.net
:scheme
https
:path
/w/1.0/pd?gdpr=1&gdpr_consent=
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
i=713e5777-d00b-0a10-0d6e-6bd70184b03c|1585075628
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

status
200
vary
Accept, Accept-Encoding
set-cookie
i=713e5777-d00b-0a10-0d6e-6bd70184b03c|1585075628; Version=1; Expires=Wed, 24-Mar-2021 18:47:09 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None pd=v2|1585075629|mOgikimWiygu; Version=1; Expires=Wed, 08-Apr-2020 18:47:09 GMT; Max-Age=1296000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.179.0
p3p
CP="CUR ADM OUR NOR STA NID"
date
Tue, 24 Mar 2020 18:47:09 GMT
content-type
text/html
content-length
373
content-encoding
gzip
via
1.1 google
alt-svc
clear
usync.html
eus.rubiconproject.com/ Frame 1199
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?gdpr=1&gdpr_consent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.78.125 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-78-125.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
khaos=K8693Q59-24-1NRK; rsid=1|AIfsdBUO++vuGxiryvY+NyL0uYVhZ/St03A+TpDyVQ1yr4T5MwT6QMScCrOK5+LIKUjy2mCqC2K2RBmUMyiRFxj1oVYGhl0PykR7JZiIexk6pm/GC88NaPeTSs/Z; ses15=; vis15=300372^1; audit=1|hLZGFuTafB30ObPadqs+WG2GJI/YgkPnjvbpa5Rt5xnQpWtZ2ZG7xED3pCcW8TpHcpj76PKZXj8oT2OqK/B16qwRNgFmLHdP
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Wed, 04 Mar 2020 22:48:14 GMT
Content-Encoding
gzip
Content-Length
7619
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=52018
Expires
Wed, 25 Mar 2020 09:14:08 GMT
Date
Tue, 24 Mar 2020 18:47:10 GMT
Connection
keep-alive
Vary
Accept-Encoding
sync
ups.analytics.yahoo.com/ups/57304/ Frame EAEA
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=adaptv_dbm&google_cm&google_sc
  • https://pixel.advertising.com/ups/57304/sync?uid=CAESEMmB-6kQpsEwUgPSwT2vilI&google_cver=1
  • https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESEMmB-6kQpsEwUgPSwT2vilI&google_cver=1&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
0
977 B
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESEMmB-6kQpsEwUgPSwT2vilI&google_cver=1&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
3.126.56.137 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-56-137.eu-central-1.compute.amazonaws.com
Software
ATS/7.1.2.106 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 18:47:10 GMT
Server
ATS/7.1.2.106
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Tue, 24 Mar 2020 18:47:10 GMT
strict-transport-security
max-age=31536000
content-length
0
location
https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESEMmB-6kQpsEwUgPSwT2vilI&google_cver=1&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
%7Bcombo_uid%7D
pr-bh.ybp.yahoo.com/sync/adaptv_ortb/ Frame EAEA
43 B
778 B
Image
General
Full URL
https://pr-bh.ybp.yahoo.com/sync/adaptv_ortb/%7Bcombo_uid%7D
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1288:110:c305::8000 , United Kingdom, ASN34010 (YAHOO-IRD, GB),
Reverse DNS
Software
ATS /
Resource Hash
48a33ca9f42b91902d57ad8ac52e1ce32b92c8c10c732f2dbb6fe960ebfd9438
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 24 Mar 2020 18:47:10 GMT
referrer-policy
strict-origin-when-cross-origin
server
ATS
age
0
expect-ct
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
strict-transport-security
max-age=31536000
content-type
image/gif
status
200
x-content-type-options
nosniff
content-length
43
x-xss-protection
1; mode=block
expires
Thu, 01 Jan 1970 00:00:00 GMT
sync
ups.analytics.yahoo.com/ups/55953/ Frame EAEA
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=adaptv&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=adaptv&ttd_tpi=1
  • https://pixel.advertising.com/ups/55953/sync?uid=91434c76-4f6d-4f3e-a41b-8e4bdc41b313&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=91434c76-4f6d-4f3e-a41b-8e4bdc41b313
  • https://ups.analytics.yahoo.com/ups/55953/sync?uid=91434c76-4f6d-4f3e-a41b-8e4bdc41b313&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=91434c76-4f6d-4f3e-a41b-8e4bdc41b313&apid=1Add55dab6-6dff-11ea...
0
977 B
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/55953/sync?uid=91434c76-4f6d-4f3e-a41b-8e4bdc41b313&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=91434c76-4f6d-4f3e-a41b-8e4bdc41b313&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
3.126.56.137 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-56-137.eu-central-1.compute.amazonaws.com
Software
ATS/7.1.2.106 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 18:47:10 GMT
Server
ATS/7.1.2.106
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Tue, 24 Mar 2020 18:47:10 GMT
strict-transport-security
max-age=31536000
content-length
0
location
https://ups.analytics.yahoo.com/ups/55953/sync?uid=91434c76-4f6d-4f3e-a41b-8e4bdc41b313&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=91434c76-4f6d-4f3e-a41b-8e4bdc41b313&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
sync
sync.adap.tv/ Frame EAEA
Redirect Chain
  • https://sync-tm.everesttech.net/upi/pid/m7y5t93k?redir=https%3A%2F%2Fsync.adap.tv%2Fsync%3Ftype%3Dgif%26key%3Dtubemogul%26uid%3D%24%7BUSER_ID%7D
  • https://sync-tm.everesttech.net/ct/upi/pid/m7y5t93k?redir=https%3A%2F%2Fsync.adap.tv%2Fsync%3Ftype%3Dgif%26key%3Dtubemogul%26uid%3D%24%7BUSER_ID%7D&_test=XnpVrgAAAGm_blk2
  • https://sync.adap.tv/sync?type=gif&key=tubemogul&uid=XnpVrgAAAGm_blk2&_test=XnpVrgAAAGm_blk2
0
0

sodar
pagead2.googlesyndication.com/getconfig/ Frame ECBA
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gda&tv=r20200316&st=env
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
6a9d575f1eeaf77ac3085921c21fe1ab9e0039ede18826189916454644a713ee
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 24 Mar 2020 18:47:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5167
x-xss-protection
0
w_640_003.ts
video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/ Frame EAEA
372 KB
372 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/w_640_003.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
8d02ac0f9b18382f6e0a77a8e59e1de9afbbc485ba432e8a7592d599c5d402b4

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 18:46:40 GMT
Last-Modified
Tue, 24 Mar 2020 04:29:42 GMT
Server
Tengine
ETag
"5e798cb6-5ce60"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Tue, 31 Mar 2020 18:46:40 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
380512
X-Proxy-Cache
HIT
sodar2.js
tpc.googlesyndication.com/sodar/ Frame ECBA
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:10 GMT
sodar
pagead2.googlesyndication.com/getconfig/ Frame 3B87
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gda&tv=r20200316&st=env
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
8fcfec8a293ad93dacd261048d81ecdc36c2432c1d15b7ec143d622204086a9e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 24 Mar 2020 18:47:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5200
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/ Frame 3B87
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:10 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 2732
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Tue, 24 Mar 2020 18:26:49 GMT
expires
Wed, 24 Mar 2021 18:26:49 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1221
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 5746
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Tue, 24 Mar 2020 18:26:49 GMT
expires
Wed, 24 Mar 2021 18:26:49 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1221
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
w_640_004.ts
video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/ Frame EAEA
374 KB
374 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/w_640_004.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
18203c6af9ea3f703b09ee30418aec2104fa7fb7ea432aab8c8e6f2316ac08e3

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 18:46:40 GMT
Last-Modified
Tue, 24 Mar 2020 04:29:42 GMT
Server
Tengine
ETag
"5e798cb6-5d730"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Tue, 31 Mar 2020 18:46:40 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
382768
X-Proxy-Cache
HIT
gen_204
pagead2.googlesyndication.com/pagead/ Frame ECBA
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gda_r20200316&jk=736344778191518&bg=!EhGlEQlYzLprjm75CScCAAAAYlIAAAAXmQFgw7TjZQ-Usnesso6ykBcJ8w-UaMTQaT2E7hEV50prjKQDsKVLziOJ9lhjRGlgIJU_GhrGNxYwsrDUvBlurWgFeQiFhU7AwtfkbJynSJUuSE6ym53QFQIqXoSGkP3iNpir_deNHLCExkz4JH4UxKccXZ44unCD4m_tixLiNoy-10JrfhpBGWHnW4o3HdaerTQ4rsEMLhrbjl9YpuK-fTtinZPaXgL8ibuOKWNjWIghZ72sU8vf4fEdsCpR8f0YOLk2iUaZr0FF69BjP1pZoCJzWk6GWbTBbyZWk9vcj0UAvCJPIziiCRpKFgxkL6T2Sf9o3VafRZoI0tM-isZsTXtRE54JbE3beH0RK4J_tTyev5pVBx1YsGpHdUa4h_siTEfEq4IgzVVewYyZ9scEk3clPktixRzQD4AUMcoZxWmIyNnUSQ7rGViMSztjuRGgzw2XHBXHQB3AEb5INlQKMAEB1w
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:10 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
gen_204
pagead2.googlesyndication.com/pagead/ Frame 3B87
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gda_r20200316&jk=3685369569621237&bg=!UlGlUUlY-7Jj1l4KQ98CAAAAX1IAAAASmQFgiei_mgyh2WaFJZfx3qhbM9r2-cK_a5wRg6_GysRZ_6ibQbTLwwkejkSOD_2yAu6Pd1Pami0ydpHEJmMF_cJDpoREpHaLE0YMtkyCmeWXgVYS3AJTMLEFoUgPjdelVDf0bubG5ygqTHCJqh5fRwPc1KxXjIFPCASn3th03IiqZLsYlUnaI17DFaFpqtvQ9MI1jUN3Whi3_H_ZzAFyB-FcI2XlbfftMxP2hcv5W907pAQZceUkXgx87wR6AsjqoA_TwL0KWPtRRukGPWFuYKM-KuCYa2-8j5HQls92i5qQcyRgGMsddM30Ou2c8OlmRkp3wpjmJqTNp9C6cp1TUOKcA0RW4urLMgCLgmC_C1v7nCM6CKimBSVcScZTGAPXKMTzJ32ooVjbrFK7JkW1DEd4pvISmASaWm7WheH1LS7Rt1C7zFVaUXa9LX2KE17n4MlDANM2n87ncJp_VPvcKgRrQQ
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:10 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
w_640_005.ts
video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/ Frame EAEA
363 KB
364 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/w_640_005.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
9d6f96b1bb39fdedff61acd664cec741f4e610510dfebc101c57e192800ae447

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 18:46:40 GMT
Last-Modified
Tue, 24 Mar 2020 04:29:42 GMT
Server
Tengine
ETag
"5e798cb6-5ad54"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Tue, 31 Mar 2020 18:46:40 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
372052
X-Proxy-Cache
HIT
liveView.php
live.sekindo.com/live/ Frame EA21
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=36&serverTime=1585075628&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&isApp=0&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e7a55ac12464&contentFileId=0&mediaPlayListId=0&cbuster=1585075630751&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:09 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.15
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
activeview
pagead2.googlesyndication.com/pcs/ Frame ECBA
42 B
115 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuNLHWC9U0PgTiOe3q078j6EM3bhfJ6lCHu1AH4yBn16skKxQBmH9k3zD4TzZfeyXVZtFtjh1fedC9Kna1kxyMMuXGW6cpfsnLczwb5bcU&sig=Cg0ArKJSzGdO5XVL0iAPEAE&adk=1015519800&tt=-1&bs=1585%2C1200&mtos=1016,1016,1016,1016,1016&tos=1016,0,0,0,0&p=10,308,100,1278&mcvt=1016&rs=0&ht=0&tfs=330&tls=1346&mc=1&lte=0&bas=0&bac=0&met=ie&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1585075629333&dlt&rpt=156&isd=0&msd=0&ext&xdi=0&ps=1585%2C3975&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-13-7-12-12-0-0-0&tvt=1341&is=970%2C90&iframe_loc=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&r=v&id=osdim&vs=4&uc=13&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200323
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:10 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 78A7
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstYWPVlASG6ShACgJITxn8u_uCxMBNZFivZ_rLFfEEb5-EVx-Ol28SNpl18hssu09IcVfzJ5KQfS4Tj1qS0J32EKzbF0jcP2K4XVdvpAz0&sig=Cg0ArKJSzACIRikF_8BjEAE&adk=654286612&tt=-1&bs=1585%2C1200&mtos=1016,1016,1016,1016,1016&tos=1016,0,0,0,0&p=257,1057,537,1393&mcvt=1016&rs=0&ht=0&tfs=299&tls=1315&mc=1&lte=0&bas=0&bac=0&met=ie&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1585075629338&dlt&rpt=232&isd=0&msd=0&ext&xdi=0&ps=1585%2C3975&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-13-5-12-12-0-0-0&tvt=1312&is=336%2C280&iframe_loc=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&r=v&id=osdim&vs=4&uc=13&upc=0&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200323
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:10 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 3203
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsugE1ImL6hzAoRlNQ4E-WO_tkJbPTHqo9-EmeiGS2q0eb0FVR_J8A3bMaKfY2DB68128rcMSXerX7vJoq-4s8mh0XSy7OwbyUtb3BWnKoo&sig=Cg0ArKJSzMOHv7_KNPgzEAE&id=ampim&o=0,0&d=2,2&ss=1600,1200&bs=1600,1200&mcvt=1001&mtos=0,0,1001,1001,1001&tos=0,0,1001,0,0&tfs=96&tls=1097&g=100&h=100&tt=1097&r=v&adk=3385906655&avms=ampa
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:10 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
async_usersync.html
acdn.adnxs.com/ib/static/usersync/v3/ Frame AB38
0
0
Document
General
Full URL
https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.184.231 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-184-231.deploy.static.akamaitechnologies.com
Software
nginx/1.13.10 /
Resource Hash

Request headers

Host
acdn.adnxs.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

Server
nginx/1.13.10
Content-Type
text/html
Last-Modified
Fri, 20 May 2016 02:07:09 GMT
Vary
Accept-Encoding
ETag
W/"573e714d-3e3"
Access-Control-Allow-Origin
*
Content-Encoding
gzip
Content-Length
506
Cache-Control
max-age=31536000
Expires
Wed, 24 Mar 2021 18:47:11 GMT
Date
Tue, 24 Mar 2020 18:47:11 GMT
Connection
keep-alive
2000891.html
serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/ Frame E825
Redirect Chain
  • https://sync.serverbid.com/ss/2000891.html
  • https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
0
0
Document
General
Full URL
https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload

Request headers

Host
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

Date
Tue, 24 Mar 2020 18:47:12 GMT
Connection
Keep-Alive
Accept-Ranges
bytes
Cache-Control
max-age=7012
Content-Length
4947
Content-Type
text/html
Last-Modified
Wed, 20 Nov 2019 20:29:05 GMT
ETag
"1b0ebac83fe30af80513039edbdf566f"
x-amz-request-id
tx000000000000027d53950-005e791f94-340a218-nyc3a
Strict-Transport-Security
max-age=15552000; includeSubDomains; preload
Vary
Access-Control-Request-Headers,Access-Control-Request-Method,Origin
X-HW
1585075632.dop042.pa1.t,1585075632.cds015.pa1.shn,1585075632.dop042.pa1.t,1585075632.cds030.pa1.c

Redirect headers

status
302
content-length
0
location
https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
cache-control
no-cache
Cookie set beacon
ap.lijit.com/ Frame 1ACC
Redirect Chain
  • https://ap.lijit.com/beacon?informer=13394437
  • https://ap.lijit.com/beacon?informer=13394437&dnr=1
0
0
Document
General
Full URL
https://ap.lijit.com/beacon?informer=13394437&dnr=1
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
216.52.2.30 , United States, ASN29791 (VOXEL-DOT-NET, US),
Reverse DNS
Software
nginx / raptor
Resource Hash

Request headers

Host
ap.lijit.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
ljt_reader=9313d5703e2d9953ea8f3f8a
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

Server
nginx
Date
Tue, 24 Mar 2020 18:47:11 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Vary
Accept-Encoding
X-Application-Context
application:prod:9080
Expires
Fri, 20 Mar 2009 00:00:00 GMT
Set-Cookie
ljtrtbexp=eJxlj0EOgDAIBP%2FSs4dCgYJfM%2F7dRE%2BMx4HMslxDximeoem65BjaMaLz6rhhy8QeuiC%2BqvZvknCQkbiRyEx0TAM7GPkKX7%2B9S%2Bh8GY0XfEMfQ55VZ4fv7f%2F7Afr9Ue4%3D;Path=/;Domain=.lijit.com;Expires=Wed, 24-Mar-2021 18:47:11 GMT;Max-Age=31536000;Secure;SameSite=None ljt_reader=9313d5703e2d9953ea8f3f8a;Path=/;Domain=.lijit.com;Expires=Wed, 24-Mar-2021 18:47:11 GMT;Max-Age=31536000;Secure;SameSite=None
Cache-Control
private, no-cache, no-store, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
Pragma
no-cache
P3P
CP="CUR ADM OUR NOR STA NID"
X-Powered-By
raptor
Content-Encoding
gzip
X-Sovrn-Pod
ad_ap6ams1

Redirect headers

Server
nginx
Date
Tue, 24 Mar 2020 18:47:11 GMT
Content-Length
0
X-Application-Context
application:prod:9080
Set-Cookie
ljt_reader=9313d5703e2d9953ea8f3f8a;Path=/;Domain=.lijit.com;Expires=Wed, 24-Mar-2021 18:47:11 GMT;Max-Age=31536000;Secure;SameSite=None
Expires
Fri, 20 Mar 2009 00:00:00 GMT
Cache-Control
private, no-cache, no-store, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
Pragma
no-cache
P3P
CP="CUR ADM OUR NOR STA NID"
Location
https://ap.lijit.com/beacon?informer=13394437&dnr=1
X-Powered-By
raptor
X-Sovrn-Pod
ad_ap6ams1
usync.html
eus.rubiconproject.com/ Frame EF19
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.78.125 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-78-125.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
khaos=K8693Q59-24-1NRK; rsid=1|AIfsdBUO++vuGxiryvY+NyL0uYVhZ/St03A+TpDyVQ1yr4T5MwT6QMScCrOK5+LIKUjy2mCqC2K2RBmUMyiRFxj1oVYGhl0PykR7JZiIexk6pm/GC88NaPeTSs/Z; ses15=; vis15=300372^1; audit=1|hLZGFuTafB30ObPadqs+WG2GJI/YgkPnjvbpa5Rt5xnQpWtZ2ZG7xED3pCcW8TpHcpj76PKZXj8oT2OqK/B16qwRNgFmLHdP; pux=1512%3D89659%262231%3D89659%262307%3D89659%262974%3D89659%263778%3D89659%26goog%3D89659%26idl%3D89659%26brx%3D89659%26
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Wed, 04 Mar 2020 22:48:14 GMT
Content-Encoding
gzip
Content-Length
7619
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=52017
Expires
Wed, 25 Mar 2020 09:14:08 GMT
Date
Tue, 24 Mar 2020 18:47:11 GMT
Connection
keep-alive
Vary
Accept-Encoding
showad.js
ads.pubmatic.com/AdServer/js/ Frame C5B0
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/showad.js
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.184.244 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-184-244.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
KTPCACOOKIE=YES; KADUSERCOOKIE=4E20C777-B89C-429B-BAA7-56556856F98E
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

Last-Modified
Tue, 04 Feb 2020 05:12:07 GMT
ETag
"13006b6-9f85-59db914d12ccf"
Server
Apache/2.2.15 (CentOS)
Accept-Ranges
bytes
Content-Encoding
gzip
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
14955
Content-Type
text/html; charset=UTF-8
Cache-Control
public, max-age=20044
Expires
Wed, 25 Mar 2020 00:21:15 GMT
Date
Tue, 24 Mar 2020 18:47:11 GMT
Connection
keep-alive
Vary
Accept-Encoding
pd
eu-u.openx.net/w/1.0/ Frame A9A5
0
0
Document
General
Full URL
https://eu-u.openx.net/w/1.0/pd?plm=6&ph=e1b1f5e1-3c2c-4287-9806-317cfbf3bd12&gdpr=1
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.179.0 /
Resource Hash

Request headers

:method
GET
:authority
eu-u.openx.net
:scheme
https
:path
/w/1.0/pd?plm=6&ph=e1b1f5e1-3c2c-4287-9806-317cfbf3bd12&gdpr=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
i=713e5777-d00b-0a10-0d6e-6bd70184b03c|1585075628; pd=v2|1585075629|mOgikimWiygu
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

status
200
vary
Accept, Accept-Encoding
set-cookie
i=713e5777-d00b-0a10-0d6e-6bd70184b03c|1585075628; Version=1; Expires=Wed, 24-Mar-2021 18:47:11 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None pd=v2|1585075629.2|kimWiymOgugi.fcgqsLomgen0; Version=1; Expires=Wed, 08-Apr-2020 18:47:11 GMT; Max-Age=1296000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.179.0
p3p
CP="CUR ADM OUR NOR STA NID"
date
Tue, 24 Mar 2020 18:47:11 GMT
content-type
text/html
content-length
355
content-encoding
gzip
via
1.1 google
alt-svc
clear
sync
ups.analytics.yahoo.com/ups/55965/
Redirect Chain
  • https://pixel.quantserve.com/pixel/p-NcBg8UA4xqUFp.gif?idmatch=0&gdpr=1&gdpr_consent=
  • https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=JdtDeCWLFXo92hcscoxZISaIECA9jEx4ct8OZrI7
  • https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=JdtDeCWLFXo92hcscoxZISaIECA9jEx4ct8OZrI7&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
0
1 KB
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=JdtDeCWLFXo92hcscoxZISaIECA9jEx4ct8OZrI7&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
3.126.56.137 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-56-137.eu-central-1.compute.amazonaws.com
Software
ATS/7.1.2.106 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 18:47:11 GMT
Server
ATS/7.1.2.106
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Tue, 24 Mar 2020 18:47:11 GMT
strict-transport-security
max-age=31536000
content-length
0
location
https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=JdtDeCWLFXo92hcscoxZISaIECA9jEx4ct8OZrI7&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
generic
match.adsrvr.org/track/cmf/
70 B
264 B
Image
General
Full URL
https://match.adsrvr.org/track/cmf/generic?ttd_pid=aoladtech&gdpr=1&gdpr_consent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.51.104.248 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-51-104-248.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
8d70b3e6badb6973663b398d297bb32eaedd08826a1af98d0a1cfce5324ffce0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:11 GMT
x-aspnet-version
4.0.30319
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
status
200
cache-control
private,no-cache, must-revalidate
content-type
image/gif
content-length
70
sync
ups.analytics.yahoo.com/ups/56465/
Redirect Chain
  • https://pixel.advertising.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=
  • https://ups.analytics.yahoo.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
  • https://pr-bh.ybp.yahoo.com/sync/adtech/1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc?gdpr=1&gdpr_consent=
  • https://pixel.advertising.com/ups/56465/sync?uid=y-R6_ZvSl1lxlqgjNLNgRkBYwCD.3kdNEsNCAm&_origin=0&nsync=0
  • https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-R6_ZvSl1lxlqgjNLNgRkBYwCD.3kdNEsNCAm&_origin=0&nsync=0&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
0
1 KB
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-R6_ZvSl1lxlqgjNLNgRkBYwCD.3kdNEsNCAm&_origin=0&nsync=0&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
3.126.56.137 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-56-137.eu-central-1.compute.amazonaws.com
Software
ATS/7.1.2.106 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 18:47:12 GMT
Server
ATS/7.1.2.106
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Tue, 24 Mar 2020 18:47:12 GMT
strict-transport-security
max-age=31536000
content-length
0
location
https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-R6_ZvSl1lxlqgjNLNgRkBYwCD.3kdNEsNCAm&_origin=0&nsync=0&apid=1Add55dab6-6dff-11ea-bcc7-12d2f833f2cc
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
sodar
pagead2.googlesyndication.com/getconfig/ Frame 78A7
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gda&tv=r20200316&st=env
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200316/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
b64e632381eae4431ae9e9534fb226c89cdce6adb8d7995b2a7219d225a2ae72
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 24 Mar 2020 18:47:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5204
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/ Frame 78A7
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:13 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 5969
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Tue, 24 Mar 2020 18:26:49 GMT
expires
Wed, 24 Mar 2021 18:26:49 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1224
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
gen_204
pagead2.googlesyndication.com/pagead/ Frame 78A7
0
49 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gda_r20200316&jk=1175099316616374&bg=!r6ylrLRY6Z9jRLZjN3wCAAAARVIAAAAPmQFgehSthUUhx8iJqQmrbMroyaZ7622zDqdYk8IF3zL97d3Nsosq3rHrW2w9yk25JiVX6Hp4gY6hU-iW7JF0F_vs3a5DVW7-EPTDJcp8OntCvCdZF-tcIHzm-H5Pp3ib-IJP-y0okFjo1SDV9veZO1PIbzqkUajOpoZ_BZHwdvxA2fwM79DXRQnw03KppeHhytaF08eJa9N336YkLI__74_1dFFkncYYFraB_96nQebnqy5HocK-V37IY7270_ci0XnfvLwE4gcB7PZceAGhOqaSK1ZVgLMvJWwty0l-zYjFgS-8sgagdTeWQYjYXnvFmcKntc4v0hN-UoQsm5YoaW-2LPE34ZWtL2tOm6E-ikqotFk-aOK11GA05GB6Ai5WThev6NqkBnu8vp60KWLuQ96nZOL7uYmDWZdYB0WET_EbQc-18ZH4B9c8o964C3BwgJdSohXmMEXRjgiZ-SYdlhCKDg
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:13 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
liveView.php
live.sekindo.com/live/ Frame EA21
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1585075628&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&isApp=0&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e7a55ac12464&contentFileId=0&mediaPlayListId=0&dur=500&cbuster=1585075633743&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:13 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.15
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
w_640_006.ts
video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/ Frame EAEA
360 KB
361 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/w_640_006.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
1affed7e5f42562e068efff71459d5edaaa76b1a2eac22665b6b8d72f895b0de

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 18:46:45 GMT
Last-Modified
Tue, 24 Mar 2020 04:29:43 GMT
Server
Tengine
ETag
"5e798cb7-5a194"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Tue, 31 Mar 2020 18:46:45 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
369044
X-Proxy-Cache
HIT
liveView.php
live.sekindo.com/live/ Frame EA21
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=25&serverTime=1585075628&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&isApp=0&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e7a55ac12464&contentFileId=0&mediaPlayListId=0&dur=1000&cbuster=1585075638535&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:17 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.15
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
liveView.php
live.sekindo.com/live/ Frame EA21
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1585075628&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&isApp=0&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e7a55ac12464&contentFileId=0&mediaPlayListId=0&dur=500&cbuster=1585075638743&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:18 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.15
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
adsct
analytics.twitter.com/i/
31 B
651 B
Script
General
Full URL
https://analytics.twitter.com/i/adsct?p_id=Twitter&p_user_id=0&txn_id=ntt0j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.67 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
57
x-xss-protection
0
x-response-time
123
pragma
no-cache
last-modified
Tue, 24 Mar 2020 18:47:19 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
application/javascript;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
53ee5aeb912fda8446b0e798e44ecee8
x-transaction
00fa9f750032360c
expires
Tue, 31 Mar 1981 05:00:00 GMT
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020030501&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
c39647f8577504046212013754dbcb5d5dea39ebdc45e633159e920c24db0f34
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Tue, 24 Mar 2020 18:47:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5160
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 24 Mar 2020 18:47:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Tue, 24 Mar 2020 18:47:19 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame B117
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Tue, 24 Mar 2020 18:26:49 GMT
expires
Wed, 24 Mar 2021 18:26:49 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1230
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gpt_2020030501&jk=1126878839814847&bg=!bW6lbnZYXg32NMc-wOgCAAAAiFIAAAAWmQFaZrZhD0Sv-useTliDbrdFfJ4cHc8lxQxz3l1bUJ6G2SW7xDsw7MrcqaFQV0ycDI69D-Mja-qbpoHRp0o2jPVRdvwbVAgcEcjvOs4hDbeMGIzNeC7Y4EtXva3kswJChEwsxG6qyn8Bk2pcCsJaZxCGjg5FkXRIuj3fx9rqtjyBhrietgBEBd6hKxIIeB7-QdH26RkylHdIG0CUZ-Jt2JxbJ4MIFwvMKtKjCMk9EYtDOEMZdVoL2o0h4OPi1gzczDrgag8WkJWQa_kSsroFZTBiU1w4aNcRTm01-C-EhGZJrMUQSvJ2YqR_8DUGx2U8FGcM_ds9q6JYrNWwG4EgUTUA9Fzw5q_E0L9FPiPQ0IQLKRHxiBJAeEL9jBEshnYW9B-bmVfR4o98FMHjQMSPYNQTIEPd73A7_QttglGnXbCKX4VJuuaFhcCAXjSSrHY7ANP2JvWDSNV6Xx6n_g
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:19 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
w_640_007.ts
video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/ Frame EAEA
355 KB
355 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/w_640_007.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
96a342304afa4515dfd20d2fff006b548c9179af9f4a2befc6797886ee4bf3d1

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 18:46:52 GMT
Last-Modified
Tue, 24 Mar 2020 04:29:43 GMT
Server
Tengine
ETag
"5e798cb7-58a14"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Tue, 31 Mar 2020 18:46:52 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
363028
X-Proxy-Cache
HIT
openrtb
ads.adaptv.advertising.com/rtb/ Frame EAEA
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=TeachingAidsLLC
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.58.103.169 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-58-103-169.eu-central-1.compute.amazonaws.com
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://threatpost.com
Access-Control-Allow-Credentials
true
Server
adaptv/1.0
Connection
keep-alive
Content-Length
0
Content-Type
application/json
cygnus
as-sec.casalemedia.com/ Frame EAEA
24 B
986 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?s=435870&v=8.1&r=%7B%22id%22%3A%22229e3b136b6251%22%2C%22imp%22%3A%5B%7B%22id%22%3A%222308e61d585c153%22%2C%22ext%22%3A%7B%22siteID%22%3A%22435870%22%2C%22sid%22%3A%22320x180%22%7D%2C%22bidfloor%22%3A1.6%2C%22bidfloorcur%22%3A%22USD%22%2C%22video%22%3A%7B%22mimes%22%3A%5B%22video%2Fmp4%22%2C%22application%2Fjavascript%22%5D%2C%22minduration%22%3A1%2C%22maxduration%22%3A200%2C%22api%22%3A%5B1%2C2%5D%2C%22protocols%22%3A%5B1%2C2%2C3%2C4%2C5%2C6%5D%2C%22linearity%22%3A1%2C%22startdelay%22%3A0%2C%22skip%22%3A1%2C%22w%22%3A320%2C%22h%22%3A180%2C%22placement%22%3A1%7D%7D%5D%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F%22%7D%2C%22ext%22%3A%7B%22source%22%3A%22prebid%22%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%2C%22user%22%3A%7B%22ext%22%3A%7B%22consent%22%3A%22%22%7D%7D%7D&ac=j&sd=1&nf=1&
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.101.185.51 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-101-185-51.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
95ac51782d5a2c9e4d3bc428e4528636aaf9b3c9a3230614262ac1fdcd91a21a

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:23 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Content-Length
44
Expires
Tue, 24 Mar 2020 18:47:23 GMT
prebid
ib.adnxs.com/ut/v3/ Frame EAEA
143 B
837 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.83 , Netherlands, ASN29990 (ASN-APPNEX, US),
Reverse DNS
250.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
de8cd4998a41314f66ecce7188157f2449814cfb58403bb2d8a557d8ebfd5f79
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:25 GMT
X-Proxy-Origin
194.187.251.57; 194.187.251.57; 250.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.111:80
AN-X-Request-Uuid
2aeee88d-f869-4dc0-b2f2-905bbf25e456
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
143
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
translator
hbopenbid.pubmatic.com/ Frame EAEA
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Tue, 24 Mar 2020 18:47:23 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
avjp
teachingaids-d.openx.net/v/1.0/ Frame EAEA
92 B
292 B
XHR
General
Full URL
https://teachingaids-d.openx.net/v/1.0/avjp?ju=https%3A%2F%2Fthreatpost.com%2Fhackers-exploited-0-day-cctv-camera%2F154051%2F&ch=UTF-8&res=1600x1200x24&ifr=true&tz=-60&tws=1600x1200&be=1&bc=hb_pb_3.0.1&dddid=d0458f5f-5799-4c77-9c92-d991bd631694&nocache=1585075643053&gdpr_consent=&gdpr=1&schain=1.0%2C1!admetricspro.com%2C1005%2C1%2C%2C%2C&skip=1&auid=540882779&vwd=320&vht=180&
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.179.0 /
Resource Hash
004e5faf0bf890f61697daeede9f21826affd1137fb2cb58eaf4719937a04a14

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:23 GMT
via
1.1 google
server
OXGW/16.179.0
status
200
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
92
expires
Mon, 26 Jul 1997 05:00:00 GMT
auction
prebid-server.rubiconproject.com/openrtb2/ Frame EAEA
141 B
360 B
XHR
General
Full URL
https://prebid-server.rubiconproject.com/openrtb2/auction
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.29.128.237 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-29-128-237.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
2470d66287b840af6616c47a0ae2fa18692ec61d1791d37b7f141f227a8dd06b

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Tue, 24 Mar 2020 18:47:23 GMT
content-encoding
gzip
status
200
content-type
application/json
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
147
expires
0
liveView.php
live.sekindo.com/live/ Frame EA21
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1585075628&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&isApp=0&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e7a55ac12464&contentFileId=0&mediaPlayListId=0&dur=500&cbuster=1585075643743&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:23 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.15
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
w_640_008.ts
video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/ Frame EAEA
375 KB
376 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn10/video/users/hls/24485/video1523972806/vid5e798c8b791f9355055399.mp4/w_640_008.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.127.19.170 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
7520e628358a01af2da8d6b101deea4541a2b6efffe9fa55263b4aae7ab6ab66

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 24 Mar 2020 18:46:57 GMT
Last-Modified
Tue, 24 Mar 2020 04:29:43 GMT
Server
Tengine
ETag
"5e798cb7-5dd10"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Tue, 31 Mar 2020 18:46:57 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
384272
X-Proxy-Cache
HIT
liveView.php
live.sekindo.com/live/ Frame EA21
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=25&serverTime=1585075628&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&isApp=0&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e7a55ac12464&contentFileId=0&mediaPlayListId=0&dur=1000&cbuster=1585075648534&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:27 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.15
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
liveView.php
live.sekindo.com/live/ Frame EA21
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1585075628&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&isApp=0&userIpAddr=194.187.251.57&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e7a55ac12464&contentFileId=0&mediaPlayListId=0&dur=500&cbuster=1585075648743&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.220.204.204 Amsterdam, Netherlands, ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.15
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Tue, 24 Mar 2020 18:47:28 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.15
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
sync.adap.tv
URL
https://sync.adap.tv/sync?type=gif&key=tubemogul&uid=XnpVrgAAAGm_blk2&_test=XnpVrgAAAGm_blk2

Verdicts & Comments Add Verdict or Comment

252 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate string| gAMP_urlhost string| gAMP_urlpath string| gAMP_urlquery string| gAMP_contentid string| gAMP_category string| gAMP_contenttags object| HC_0xcc15 function| HC_0x21ca object| xop function| 2pkv9xhkcg0 boolean| vjk7ey1xlog object| 69h0d6c17uo number| kPrebidTimeout number| kRefreshPollTime number| gRefreshCount number| gOXRefreshCount boolean| gRefreshDebug boolean| gPrebidDebug number| k60SecondRefreshInterval number| k90SecondRefreshInterval number| k120SecondRefreshInterval number| k180SecondRefreshInterval number| kDoNotRefresh number| kDefaultRefreshInterval object| gSChainNodes undefined| gGDPR_forceLocale boolean| gGDPR_silentNoConsent boolean| gGDPR_forceNoConsent string| gGDPR_logoURL undefined| kAmazonPublisherID object| ad728x90ATF object| ad300x250ATF object| ad300x250ATF2 object| ad728x90ATFTAB object| ad300x250ATFTAB object| ad300x250ATF2TAB object| ad320x50ATF object| ad300x250ATFM object| ad300x250ATF2M object| ad2x2skin number| gBrowserWidth object| desktopAdUnits object| tabletAdUnits object| mobileAdUnits object| gAllSlotData number| gAllSlotCount object| OX_dfp_ads number| minWidth boolean| disableBids object| googletag object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleTokenSync object| Ew_0x3c5c function| Ew_0x47dc function| xblocker object| eH_0x4539 function| eH_0x54df function| xblacklist number| google_srt undefined| google_measure_js_timing object| __core-js_shared__ object| core undefined| __cmp function| pbjsChunk object| pbjs object| _pbjsGlobals object| gRefreshSlots object| gRefreshIDs object| gRefreshTimes object| gRefreshIntervals object| gThisRefreshIDs object| gThisRefreshSlots boolean| gInitialLoad object| gPBJSTimeoutTimer object| gAmazonSlots object| gAmazonBids boolean| gAmazonBidsBack boolean| gOpenXBidsBack boolean| gPrebidBidsBack function| amp_getBidsForAllChannels function| amp_dumpTable function| amp_getBestBids function| amp_dumpBids function| amp_dumpWins function| customOxTargeting function| openXRefreshCallback function| sendAdserverRequest function| checkIfAllBidsBack function| amazonBidsBack function| pbjsBidsBack function| bidsTimeout function| sendBidRequests function| amp_refreshAllSlots function| amp_refreshSlots function| refreshAdSlots function| injectReportAdStyles function| addLoadEvent function| insertAfter function| configureAdSlot function| getCookie undefined| $ function| jQuery object| gdprDynamicStrings object| kss object| gdprStrings function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill object| dataLayer object| gf_global object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client object| viewPortSize object| debugIp object| debugId function| constructsekindoParent279 function| gformBindFormatPricingFields function| Currency function| gformCleanNumber function| gformGetDecimalSeparator function| gformIsNumber function| gformIsNumeric function| gformDeleteUploadedFile function| gformIsHidden function| gformCalculateTotalPrice function| gformGetShippingPrice function| gformGetFieldId function| gformCalculateProductPrice function| gformGetProductQuantity function| gformIsProductSelected function| gformGetBasePrice function| gformFormatMoney function| gformFormatPricingField function| gformToNumber function| gformGetPriceDifference function| gformGetOptionLabel function| gformGetProductIds function| gformGetPrice function| gformRegisterPriceField function| gformInitPriceFields function| gformShowPasswordStrength function| gformPasswordStrength function| gformAddListItem function| gformDeleteListItem function| gformAdjustClasses function| gformToggleIcons function| gformMatchCard function| gformFindCardType function| gformToggleCreditCard function| gformInitChosenFields function| gformInitCurrencyFormatFields function| gformFormatNumber function| getMatchGroups function| gf_get_field_number_format function| renderRecaptcha function| gformValidateFileSize function| gformInitSpinner function| gformAddSpinner function| gf_raw_input_change function| gf_get_input_id_by_html_id function| gf_get_form_id_by_html_id function| gf_get_ids_by_html_id function| gf_input_change function| gformExtractFieldId function| gformExtractInputIndex function| rgars function| rgar object| _gformPriceFields undefined| _anyProductSelected function| GFCalc object| gform undefined| __gf_keyup_timeout object| gfMultiFileUploader function| gf_apply_rules function| gf_check_field_rule function| gf_apply_field_rule function| gf_get_field_action function| gf_is_match function| gf_is_match_checkable function| gf_is_match_default function| gf_format_number function| gf_try_convert_float function| gf_matches_operation function| gf_get_value function| gf_do_field_action function| gf_do_next_button_action function| gf_do_action function| gf_reset_to_default undefined| __gf_timeout_handle object| Placeholders object| ak_js object| commentForm undefined| replyRowContainer undefined| children object| wp object| jQuery112408219893813200332 object| gf_form_conditional_logic string| gf_number_format function| do_callback object| google_tag_manager object| recaptcha object| closure_lm_852542 function| jQuery112408219893813200332_1585075627968 string| GoogleAnalyticsObject function| ga object| _qevents function| twq object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| twttr function| quantserve function| __qc object| ezt object| _qoptions boolean| sekindoFlowingPlayerOn number| __google_ad_urls_id number| google_unique_id function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| __google_ad_urls object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| google_reactive_ads_global_state object| __AMP_LOG object| __AMP_ERRORS boolean| ampInaboxInitialized object| __AMP_MODE function| __AMP_REPORT_ERROR object| ampInaboxPositionObserver object| ampInaboxFrameOverlayManager object| AMP object| google_jobrunner object| google_ad_modifications number| google_global_correlator object| google_prev_clients object| GoogleGcLKhOms object| google_image_requests

4 Cookies

Domain/Path Name / Value
.openx.net/ Name: i
Value: 69a17b83-9c14-44e5-84a3-0772d6474518|1585075638
.pubmatic.com/ Name: pi
Value: 156212:4
.ads.pubmatic.com/ Name: KCCH
Value: YES
.pubmatic.com/ Name: KTPCACOOKIE
Value: YES

25 Console Messages

Source Level URL
Text
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 315)
Message:
gBrowserWidth =1600
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 340)
Message:
OpenX Slot defined for /21707124336/ThreatPost-970x250-ATF div-gpt-ad-6794670-2
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 340)
Message:
OpenX Slot defined for /21707124336/ThreatPost-300x250-ATF div-gpt-ad-6794670-3
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 340)
Message:
OpenX Slot defined for /21707124336/ThreatPost-300x600-ATF div-gpt-ad-6794670-5
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 340)
Message:
OpenX Slot defined for /21707124336/ThreatPost-2x2-Skin div-gpt-ad-6794670-1
console-api log URL: https://qd.admetricspro.com/js/threatpost/cmp.js(Line 3)
Message:
CMP: Locale=en-us gdpr= false
console-api log URL: https://qd.admetricspro.com/js/threatpost/cmp.js(Line 3)
Message:
GDPR is not applicable, skipping initialization of CMP
console-api log (Line 3)
Message:
Not calling apstag.init() typeof(kAmazonPublisherID)=undefined
console-api log (Line 3)
Message:
ENGINE: gSChainNodes found, prebid configured with 1 supply chain object(s)
console-api log (Line 3)
Message:
Initial Ad Load
console-api log (Line 3)
Message:
sendBidRequests() gPBJSTimeoutTimer=null pbjs.adserverRequestSent=undefined
console-api log (Line 3)
Message:
pbjs bids returned
console-api log (Line 3)
Message:
gPBJSTimeoutTimer cleared
console-api log (Line 3)
Message:
sendAdserverRequest(): pbjsBidsBack
console-api log (Line 3)
Message:
sendAdserverRequest()
console-api log (Line 3)
Message:
Not calling apstag.setDisplayBids() gAmazonBidsBack=false
console-api log (Line 3)
Message:
pbjs.getAdserverTargeting: >> Prebid
console-api log (Line 3)
Message:
[object Object]
console-api log (Line 3)
Message:
pbjs.getBidResponses:
console-api log (Line 3)
Message:
[object Object]
console-api log (Line 3)
Message:
gThisRefreshSlots=
console-api log (Line 3)
Message:
[object Object],[object Object],[object Object],[object Object]
console-api log (Line 3)
Message:
sendAdserverRequest(): ---> Calling googletag.pubads().refresh()
console-api log (Line 3)
Message:
console.groupEnd
console-api info URL: https://cdn.ampproject.org/rtv/012003101714470/amp4ads-v0.js(Line 407)
Message:
Powered by AMP ⚡ HTML – Version 2003101714470 https://threatpost.com/hackers-exploited-0-day-cctv-camera/154051/

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

acdn.adnxs.com
ads.adaptv.advertising.com
ads.pubmatic.com
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
analytics.twitter.com
ap.lijit.com
as-sec.casalemedia.com
assets.threatpost.com
c.amazon-adsystem.com
cdn.ampproject.org
cm.g.doubleclick.net
e.serverbid.com
eu-u.openx.net
eus.rubiconproject.com
fastlane.rubiconproject.com
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
graph.facebook.com
hbopenbid.pubmatic.com
i1.wp.com
ib.adnxs.com
kasperskycontenthub.com
live.sekindo.com
match.adsrvr.org
media.threatpost.com
pagead2.googlesyndication.com
pixel.advertising.com
pixel.quantserve.com
pr-bh.ybp.yahoo.com
prebid-server.rubiconproject.com
qd.admetricspro.com
rules.quantcount.com
secure.gravatar.com
secure.quantserve.com
securepubads.g.doubleclick.net
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
static.ads-twitter.com
stats.g.doubleclick.net
sync.adap.tv
sync.serverbid.com
t.co
tagan.adlightning.com
teachingaids-d.openx.net
threatpost.com
tpc.googlesyndication.com
u.openx.net
ups.analytics.yahoo.com
video.sekindo.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.gstatic.com
www.linkedin.com
www.reddit.com
sync.adap.tv
104.109.78.125
104.244.42.133
104.244.42.67
134.209.131.220
151.101.12.157
152.199.22.24
172.217.16.162
172.217.22.98
185.127.19.170
185.220.204.204
185.33.223.83
185.64.189.112
192.0.77.2
199.232.53.140
205.185.216.10
206.189.254.17
216.52.2.30
2600:9000:21d7:1a00:2:9275:3d40:93a1
2600:9000:21d7:8c00:0:5c46:4f40:93a1
2600:9000:21d7:ee00:6:44e3:f8c0:93a1
2606:4700:3036::6812:3967
2a00:1288:110:c305::8000
2a00:1450:4001:800::2008
2a00:1450:4001:806::2004
2a00:1450:4001:80b::2002
2a00:1450:4001:80b::200a
2a00:1450:4001:814::2003
2a00:1450:4001:817::200e
2a00:1450:4001:81b::2001
2a00:1450:4001:81e::2003
2a00:1450:4001:81f::2002
2a00:1450:4001:820::2003
2a00:1450:4001:821::2002
2a00:1450:400c:c06::9b
2a03:2880:f01c:800e:face:b00c:0:2
2a04:fa87:fffe::c000:4902
2a05:f500:11:101::b93f:9001
3.126.56.137
34.95.120.147
35.157.249.39
35.173.160.135
52.29.128.237
52.51.104.248
52.58.103.169
69.173.144.141
91.228.74.143
91.228.74.203
95.101.184.231
95.101.184.244
95.101.185.51
99.84.5.39
99.86.159.242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