Submitted URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/#ftag=RSSbaffb68\u003ehttps:/...
Effective URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Submission: On December 17 via api from US — Scanned from DE

Summary

This website contacted 42 IPs in 4 countries across 29 domains to perform 190 HTTP transactions. The main IP is 2a04:4e42:4c::666, located in United States and belongs to FASTLY, US. The main domain is www.zdnet.com.
TLS certificate: Issued by R3 on October 26th 2021. Valid for: 3 months.
This is the only time www.zdnet.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
19 2a04:4e42:4c:... 54113 (FASTLY)
5 2606:4700::68... 13335 (CLOUDFLAR...)
4 2606:4700:303... 13335 (CLOUDFLAR...)
3 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
2 35.172.51.102 14618 (AMAZON-AES)
1 2606:4700:10:... 13335 (CLOUDFLAR...)
3 151.101.66.154 54113 (FASTLY)
1 34.120.203.121 15169 (GOOGLE)
2 151.101.65.194 54113 (FASTLY)
14 142.250.185.66 15169 (GOOGLE)
3 65.9.64.109 16509 (AMAZON-02)
29 2.18.235.40 16625 (AKAMAI-AS)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
14 34.206.8.109 14618 (AMAZON-AES)
2 52.5.105.31 14618 (AMAZON-AES)
1 18.170.183.138 16509 (AMAZON-02)
2 3.11.215.107 16509 (AMAZON-02)
5 2a00:1450:400... 15169 (GOOGLE)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
5 2.16.107.105 20940 (AKAMAI-ASN1)
1 2 34.246.26.134 16509 (AMAZON-02)
1 4 172.217.18.102 15169 (GOOGLE)
17 52.6.9.44 14618 (AMAZON-AES)
5 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 3.127.116.150 16509 (AMAZON-02)
7 2a00:1450:400... 15169 (GOOGLE)
1 65.9.64.127 16509 (AMAZON-02)
3 2600:9000:211... 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
10 2a00:1450:400... 15169 (GOOGLE)
2 172.217.16.130 15169 (GOOGLE)
2 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
7 44.237.128.222 16509 (AMAZON-02)
3 34.149.12.213 15169 (GOOGLE)
1 151.101.66.137 54113 (FASTLY)
3 162.247.243.147 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
190 42
Apex Domain
Subdomains
Transfer
22 moatads.com
z.moatads.com
mb.moatads.com
geo.moatads.com
px.moatads.com
424 KB
20 zdnet.com
www.zdnet.com
urs.zdnet.com
373 KB
19 doubleclick.net
securepubads.g.doubleclick.net
ad.doubleclick.net
googleads4.g.doubleclick.net
208 KB
18 clipcentric.com
tr.clipcentric.com
ad.clipcentric.com
6 KB
18 googlesyndication.com
9156d071107c7ebb6fe2f6c2d881c783.safeframe.googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
110 KB
14 rvapps.io
ingest.make.rvapps.io
2 KB
12 adsafeprotected.com
pixel.adsafeprotected.com
static.adsafeprotected.com
dt.adsafeprotected.com
96 KB
10 moatpixel.com
redventuresgamdisplay60805146916.s.moatpixel.com
3 KB
5 doubleverify.com
cdn.doubleverify.com
tps.doubleverify.com
tpsc-eu3.doubleverify.com
95 KB
5 ampproject.org
cdn.ampproject.org
121 KB
5 akamaihd.net
clipcentric-a.akamaihd.net
1 MB
5 googletagservices.com
www.googletagservices.com
131 KB
5 cohesionapps.com
cdn.cohesionapps.com
taggy.cohesionapps.com
33 KB
5 cookielaw.org
cdn.cookielaw.org
116 KB
4 myfinance.com
static.myfinance.com
www.myfinance.com
66 KB
3 nr-data.net
bam-cell.nr-data.net
2 KB
3 redventures.io
at.adtech.redventures.io
179 KB
3 go-mpulse.net
c.go-mpulse.net
52 KB
2 gstatic.com
fonts.gstatic.com
32 KB
2 akstat.io
02179915.akstat.io
684dd331.akstat.io
708 B
2 google.com
adservice.google.com
www.google.com
2 KB
2 fastly.net
confiant-integrations.global.ssl.fastly.net
93 KB
2 myfidevs.io
a.myfidevs.io
166 B
1 newrelic.com
js-agent.newrelic.com
17 KB
1 2mdn.net
s0.2mdn.net
35 KB
1 clarium.io
protected-by.clarium.io
345 B
1 googleapis.com
fonts.googleapis.com
1 KB
1 google.de
adservice.google.de
792 B
1 onetrust.com
geolocation.onetrust.com
389 B
190 29
Domain Requested by
19 www.zdnet.com www.zdnet.com
17 tr.clipcentric.com www.zdnet.com
ad.clipcentric.com
15 px.moatads.com www.zdnet.com
14 ingest.make.rvapps.io www.zdnet.com
14 securepubads.g.doubleclick.net www.zdnet.com
www.googletagservices.com
10 redventuresgamdisplay60805146916.s.moatpixel.com www.zdnet.com
10 pagead2.googlesyndication.com ad.doubleclick.net
tpc.googlesyndication.com
www.zdnet.com
www.googletagservices.com
7 dt.adsafeprotected.com www.zdnet.com
7 tpc.googlesyndication.com www.zdnet.com
ad.doubleclick.net
tpc.googlesyndication.com
5 cdn.ampproject.org confiant-integrations.global.ssl.fastly.net
5 clipcentric-a.akamaihd.net www.zdnet.com
clipcentric-a.akamaihd.net
5 www.googletagservices.com www.zdnet.com
www.googletagservices.com
5 cdn.cookielaw.org www.zdnet.com
4 z.moatads.com www.zdnet.com
3 bam-cell.nr-data.net www.zdnet.com
3 static.adsafeprotected.com pixel.adsafeprotected.com
www.zdnet.com
3 ad.doubleclick.net 1 redirects www.zdnet.com
www.googletagservices.com
3 cdn.cohesionapps.com www.zdnet.com
cdn.cohesionapps.com
3 at.adtech.redventures.io www.zdnet.com
3 c.go-mpulse.net www.zdnet.com
c.go-mpulse.net
2 tpsc-eu3.doubleverify.com cdn.doubleverify.com
2 cdn.doubleverify.com ad.doubleclick.net
www.zdnet.com
2 googleads4.g.doubleclick.net ad.doubleclick.net
2 fonts.gstatic.com fonts.googleapis.com
2 pixel.adsafeprotected.com 1 redirects www.zdnet.com
2 geo.moatads.com z.moatads.com
2 taggy.cohesionapps.com www.zdnet.com
2 confiant-integrations.global.ssl.fastly.net www.zdnet.com
2 www.myfinance.com www.zdnet.com
2 a.myfidevs.io www.zdnet.com
2 static.myfinance.com www.zdnet.com
1 684dd331.akstat.io c.go-mpulse.net
1 www.google.com www.zdnet.com
1 js-agent.newrelic.com www.zdnet.com
1 tps.doubleverify.com cdn.doubleverify.com
1 s0.2mdn.net www.zdnet.com
1 ad.clipcentric.com clipcentric-a.akamaihd.net
1 protected-by.clarium.io www.zdnet.com
1 fonts.googleapis.com confiant-integrations.global.ssl.fastly.net
1 02179915.akstat.io www.zdnet.com
1 mb.moatads.com z.moatads.com
1 9156d071107c7ebb6fe2f6c2d881c783.safeframe.googlesyndication.com www.zdnet.com
1 adservice.google.com www.zdnet.com
1 adservice.google.de www.zdnet.com
1 urs.zdnet.com www.zdnet.com
1 geolocation.onetrust.com www.zdnet.com
190 46
Subject Issuer Validity Valid
*.zdnet.com
R3
2021-10-26 -
2022-01-24
3 months crt.sh
cookielaw.org
Cloudflare Inc ECC CA-3
2021-06-01 -
2022-05-31
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-06-18 -
2022-06-17
a year crt.sh
akstat.io
DigiCert SHA2 Secure Server CA
2021-06-08 -
2022-06-13
a year crt.sh
*.myfidevs.io
Amazon
2021-12-07 -
2023-01-04
a year crt.sh
onetrust.com
Cloudflare Inc ECC CA-3
2021-02-12 -
2022-02-11
a year crt.sh
at.adtech.redventures.io
R3
2021-12-04 -
2022-03-04
3 months crt.sh
*.freetls.fastly.net
GlobalSign Atlas R3 DV TLS CA 2020
2021-04-27 -
2022-05-29
a year crt.sh
*.g.doubleclick.net
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
cdn.cohesionapps.com
Amazon
2021-12-17 -
2023-01-14
a year crt.sh
moatads.com
DigiCert SHA2 Secure Server CA
2021-01-21 -
2022-01-25
a year crt.sh
*.google.de
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
*.google.com
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
ingest.make.rvapps.io
Amazon
2021-09-26 -
2022-10-24
a year crt.sh
*.taggy.cohesionapps.com
Amazon
2021-02-27 -
2022-03-28
a year crt.sh
*.moatads.com
DigiCert TLS RSA SHA256 2020 CA1
2021-05-25 -
2022-06-25
a year crt.sh
aka.clipcentric.com
R3
2021-11-20 -
2022-02-18
3 months crt.sh
fw.adsafeprotected.com
Amazon
2021-08-11 -
2022-09-09
a year crt.sh
clipcentric.com
Amazon
2021-02-05 -
2022-03-06
a year crt.sh
misc-sni.google.com
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
upload.video.google.com
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
protected-by.clarium.io
Gandi Standard SSL CA 2
2020-04-03 -
2022-04-26
2 years crt.sh
tpc.googlesyndication.com
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
static.adsafeprotected.com
Amazon
2021-09-05 -
2022-10-04
a year crt.sh
*.gstatic.com
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
*.doubleclick.net
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh
*.doubleverify.com
DigiCert SHA2 Secure Server CA
2021-01-10 -
2022-01-17
a year crt.sh
dt.adsafeprotected.com
Amazon
2021-11-19 -
2022-12-18
a year crt.sh
js-agent.newrelic.com
GlobalSign Atlas R3 DV TLS CA H2 2021
2021-10-06 -
2022-11-07
a year crt.sh
*.nr-data.net
DigiCert SHA2 Secure Server CA
2020-02-05 -
2022-02-08
2 years crt.sh
www.google.com
GTS CA 1C3
2021-11-29 -
2022-02-21
3 months crt.sh

This page contains 17 frames:

Primary Page: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Frame ID: 57EC96C6D7EDDF98222AF0D9E17F864D
Requests: 102 HTTP requests in this frame

Frame: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Frame ID: 2D97B336A6EA4135C4E444C7C2D693A3
Requests: 2 HTTP requests in this frame

Frame: https://9156d071107c7ebb6fe2f6c2d881c783.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Frame ID: FE09A587CB4D57177F4DBFD5061E77CD
Requests: 1 HTTP requests in this frame

Frame: https://cdn.cohesionapps.com/cohesion/xs2.html
Frame ID: 161DFD2CC986F696394693D93AFECF99
Requests: 2 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvC9bV6AhByVmCtCH2veZ0YOnTd_b7nadUbco8IydGexSOTVKT3wnoRC_SVjzQvRpX_NRrbvrVFigj9GLsqBUIssaW2hXHTDlfDXpgNoZ6JArgTwFiKr3bWL1OXskhEDN-ibwle0Ecef8Fz-4m5NIYjNOTrLsjGgzXTd6w55SNXmG_h3NqHilu6rWicGikO0mlrpawk2fA7LJYm1VgizYAnEvWZl8klR9SyX9aLXiR8aGgnbfjpPiiI4ATrufYh5LWTmcpEXhXfptHkxcI0rkOdpO1HbBDb9-o44WDvUTRnrdjGhFYrlTZ5Y-WKatFcgJ6Xm3WCqLGdzuZ7qOM&sai=AMfl-YRZrS-BGg5P105p9o_1WwK0ouPcXdKXzCZTYvOutP8PaywjjfXqypj-hYLcor1ISg37WfH5Np8tK5b4lgoASUDHWXxIufaO3g5Au7uDApm257_5NuxHXDCGcJHtxK4j&sig=Cg0ArKJSzABt0-hilTOIEAE&uach_m=[UACH]&urlfix=1&adurl=
Frame ID: 79F54BFFD887594360915E2F7630B3CC
Requests: 4 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv-4gxLm8GTnJs76YgEvMXoDECWSY60PZdi-8gFsKVi-lDKco9nqCvPFK2iz-Cz4Su9sTDhCqyQKzhADTqyoaWgB5TZ2Gr16obh9w3UhgZEFv3A_x8OSTJh3GqGuppyjWluaXJSgbRNC7n0uFlpWxN7OygCgP-ySvVgiiH38A-qbdGx4lIMrOaNcMqOKS5VbO5KL8wwDN84jcgAC8Nw5jTQapquvDutXN_vRHdfBhvPe-zZ5VVC9YohYFqjZ3qAlbTjugjvI0rVtTbaX_y80Whnk5ZAso1D8gamStcYfo75fxca5lmSxf-zRUAei1NpfbTsSXPVeAIZ62sBQKA2vZxE&sai=AMfl-YQfGmRVsYUr6B8lsEeJxd5PEEEOujBz8lMm5uGNQnFzm1rtmNcoUDQ13TZ1LphwXSiTaLK4-MbxMqmoBZ-1EKvFyCN9zhX-ST68fzboyl1-xBXhoO5OqI2X-49yBRs&sig=Cg0ArKJSzLiTWz2I0DvHEAE&uach_m=[UACH]&urlfix=1&adurl=
Frame ID: E22DF3A0EF62A1D6A2A4F06953A28956
Requests: 29 HTTP requests in this frame

Frame: data://truncated
Frame ID: C14C197B0E5C31902173FC9DEDF41CC1
Requests: 2 HTTP requests in this frame

Frame: data://truncated
Frame ID: 57C1988B2CB832C90953BF620E81C6FE
Requests: 4 HTTP requests in this frame

Frame: https://clipcentric-a.akamaihd.net/user-9/resources/ad.html
Frame ID: 05A4FA4672120D6EA31B592DA34EF23B
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvZqYr2Yp0SgtRgJ6FrKIvvH_eRV0C1Ge_UHpsLJUbkEWxFfwOKs5FTCwxFXuE5g3hLeFpqYXBrMUhgk2qjH5zW9N1fswej10NuvhOlu7kgqlqhlUyB2eJHlL7UOnoC2jftqXwQB4qGtdbSICm-9kqbHSC1aszQ3bizjbp6gZvD113NrHliJZ6dW1NT0TOv4EJimK8tt62QjcwYreAu5SxJivlnTYZzoqzUabsJrul3XKbQdMUCkLfdCkf_995N_QAPTR0MhpN_zhe49PlY1K-mj7mb-5w1j1IJq7OKw9uil2VGVYvOgxikjVChYDA3vrm3P5ibY9S5QzkE7LZO&sai=AMfl-YQV-Vf2G3oO6DZTMgfBgw6aRb4AQEB8F9gX2u5ouUA6HpDtiF4sRi_-9rYeJpdTHP3uoPH8J3K-xwif1PCroUPtHBoj4uJQKVi32Mw_zxavYCIi7V6d4yM_nK-mQxjD&sig=Cg0ArKJSzFE1G6JrAjioEAE&uach_m=[UACH]&urlfix=1&adurl=
Frame ID: C351D5D72DD19BB89B0E01D2E1FD8EF8
Requests: 16 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/002106010000999/amp4ads-v0.js
Frame ID: 390EEB090AE962D0BDC0809BEF0653D2
Requests: 14 HTTP requests in this frame

Frame: https://ad.clipcentric.com/user-9/resources/store.phtml?v200530
Frame ID: 8AD471BC779D198A16E2FD052A0A7777
Requests: 3 HTTP requests in this frame

Frame: https://static.adsafeprotected.com/sca.17.5.12.js
Frame ID: 4AF643E24DC63DFF615906CA72308ACA
Requests: 1 HTTP requests in this frame

Frame: https://cdn.doubleverify.com/dv-measurements1950.js
Frame ID: 90BFA46B4A68A72B8885B54E9B12FC93
Requests: 4 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Frame ID: 3B21AD02FE93A0FD2E92E5E028EAC34E
Requests: 3 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Frame ID: EF5137804C40FA34B4C38663D6726240
Requests: 2 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/aframe
Frame ID: DA8CD0D11AC6C6208FE59EFD2B6904B6
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

Suspected Iranian hackers target airline with new backdoor | ZDNet

Detected technologies

Overall confidence: 100%
Detected patterns
  • require.*\.js

Overall confidence: 100%
Detected patterns
  • 2mdn\.net

Overall confidence: 100%
Detected patterns
  • googlesyndication\.com/
  • 2mdn\.net

Overall confidence: 100%
Detected patterns
  • moatads\.com

Overall confidence: 100%
Detected patterns
  • cdn\.cookielaw\.org
  • otSDKStub\.js

Page Statistics

190
Requests

99 %
HTTPS

46 %
IPv6

29
Domains

46
Subdomains

42
IPs

4
Countries

3432 kB
Transfer

8266 kB
Size

29
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 80
  • https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=2098939339;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd= HTTP 302
  • https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_pre=CNeHo8HZ6vQCFdHouwgd__0MXg;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=2098939339;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=
Request Chain 127
  • https://pixel.adsafeprotected.com/rfw/st/903347/59128494/skeleton.js?ias_dspID=64&adsafe_url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&adsafe_type=abq&adsafe_url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F&adsafe_type=df&adsafe_jsinfo=,id:487cadf7-1844-da76-8043-d39dee1a12e4,c:x3eTvg,sl:inView,em:true,fr:true,thd:1,mn:app17ie,rg:ie,pt:1-5-15,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,br:u,abv:na,an:n,oam:0,nbld:0,mtim:100,fm:sRQDG2g+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C16%7C17,idMap:15*,pl:,rmeas:1,rend:1,renddet:IMG.qs,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,tt:rjss,et:115,oid:0523575b-5f2a-11ec-b685-0289e6fd96ae,v:19.8.273,sp:1,st:0,fwm:1,wr:1600.1200,sr:1600.1200,ov:0 HTTP 302
  • https://static.adsafeprotected.com/skeleton.js

190 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
209 KB
89 KB
Document
General
Full URL
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
5062bb11fa3492edfe303313e8717e8729a4f3f13d51aeddfb34c735c59f6b51
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

content-encoding
gzip
content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-type
text/html; charset=UTF-8
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
link
<https://www.zdnet.com/a/fly/css/core/main-61ec7c25fb-rev.css>; rel="preload"; as="style"; nopush
referrer-policy
no-referrer-when-downgrade
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-tx-id
b2fd01bb-4cbd-4482-b67b-806e7fce9e12
x-xss-protection
1; mode=block
date
Fri, 17 Dec 2021 11:11:00 GMT
via
1.1 varnish
cache-control
max-age=5400, private
expires
Fri, 17 Dec 2021 12:14:32 GMT
strict-transport-security
max-age=63072000; includeSubDomains; preload
accept-ranges
bytes
vary
Accept-Encoding, User-Agent
content-length
90215
main-61ec7c25fb-rev.css
www.zdnet.com/a/fly/css/core/
304 KB
53 KB
Stylesheet
General
Full URL
https://www.zdnet.com/a/fly/css/core/main-61ec7c25fb-rev.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
83575e34525331ea577205e94ffcb89cb9bb5cbb6e9f1c852dacaf941276de5b
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
53705
x-xss-protection
1; mode=block
last-modified
Thu, 16 Dec 2021 20:56:56 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
content-type
text/css
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 23 Dec 2021 20:58:43 GMT
otSDKStub.js
cdn.cookielaw.org/scripttemplates/
19 KB
7 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4d2a74d8b25e1ccd4b1294b0b937804bc24aeea7f46edad3f3c1f91604d2708c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
BXRr8anumVFsMvgN5QlueA==
age
8338
vary
Accept-Encoding
content-length
6508
x-ms-lease-status
unlocked
last-modified
Thu, 16 Dec 2021 21:12:11 GMT
server
cloudflare
etag
0x8D9C0D8BA367D8A
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
33055f87-f01e-0121-20e0-f2f382000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb54fccf1374b-MXP
optanon-v1.1.0.js
www.zdnet.com/a/privacy/optanon/
36 KB
10 KB
Script
General
Full URL
https://www.zdnet.com/a/privacy/optanon/optanon-v1.1.0.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
a0a97a5a7dc2b30e9a76ff211332f36d435293c19ed91ca1ad6a66adc1dc50cd
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
10444
x-xss-protection
1; mode=block
last-modified
Thu, 04 Mar 2021 19:22:21 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"46e2aa30cbebb708b5fc468d57d56d8b"
strict-transport-security
max-age=31536000
content-language
en
via
1.1 varnish
cache-control
public, max-age=86400
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
content-type
application/javascript
expires
Thu, 18 Nov 2021 07:05:01 GMT
controls-ce6ece0b43-rev.css
www.zdnet.com/a/fly/css/video/htmlPlayerControls/
25 KB
4 KB
Stylesheet
General
Full URL
https://www.zdnet.com/a/fly/css/video/htmlPlayerControls/controls-ce6ece0b43-rev.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
d32763388ba6d9bba0619b8912021d30345002aa0d5dcba3ce01a05da23f72db
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
4330
x-xss-protection
1; mode=block
last-modified
Thu, 16 Dec 2021 20:56:57 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
content-type
text/css
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 23 Dec 2021 20:58:43 GMT
charlie-osborne.jpg
www.zdnet.com/a/img/resize/c8ef739a72ea5f7507a32fca52940befe437ac45/2014/07/22/36b8334d-1175-11e4-9732-00505685119a/
924 B
1 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/c8ef739a72ea5f7507a32fca52940befe437ac45/2014/07/22/36b8334d-1175-11e4-9732-00505685119a/charlie-osborne.jpg?width=50&height=50&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
f6a1d1301a41d925a220c3cac7f9d927356bff1c809259b16601325663de156d
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
via
1.1 varnish
fastly-io-info
ifsz=11429 idim=350x250 ifmt=jpeg ofsz=924 odim=50x50 ofmt=webp
x-goog-meta-x-goog-reserved-source-generation
1588631330699120
fastly-stats
io=1
content-length
924
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"+syrtNFOJHcaa/T8DZP/qt2kgH1Jbet5hqlMrCh94N4"
vary
Accept-Encoding, Accept
strict-transport-security
max-age=31536000
content-language
en
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
content-type
image/webp
expires
Mon, 06 Dec 2021 09:31:39 GMT
charlie-osborne.jpg
www.zdnet.com/a/img/resize/ae8b429306581e2c4e0430de956e3cf4ec97dd0d/2014/07/22/36b8334d-1175-11e4-9732-00505685119a/
1 KB
2 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/ae8b429306581e2c4e0430de956e3cf4ec97dd0d/2014/07/22/36b8334d-1175-11e4-9732-00505685119a/charlie-osborne.jpg?width=70&height=70&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
c98713a27c661e04f9aecf37a7794088451f73bab4b9bb615ed29ff5a5fd75e1
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
via
1.1 varnish
fastly-io-info
ifsz=11429 idim=350x250 ifmt=jpeg ofsz=1362 odim=70x70 ofmt=webp
x-goog-meta-x-goog-reserved-source-generation
1588631330699120
fastly-stats
io=1
content-length
1362
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"WJx6jKkdQae/xT/2CLMZ+wj9F2L05l7GfidXOzIiG/Q"
vary
Accept-Encoding, Accept
strict-transport-security
max-age=31536000
content-language
en
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
content-type
image/webp
expires
Mon, 06 Dec 2021 09:31:39 GMT
require-2.1.2.js
www.zdnet.com/a/fly/js/libs/
16 KB
6 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/libs/require-2.1.2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
a70d5b9ad136255942779acf94da5cc72316fde5c10c5e7707d6f1888f43dcb8
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
6169
x-xss-protection
1; mode=block
last-modified
Tue, 14 Dec 2021 16:01:53 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"ef4ea9601b2a10c6fa6a76408a1d97b4"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 21 Dec 2021 18:20:59 GMT
inlineMedia_core.js
static.myfinance.com/widget/
184 KB
63 KB
Script
General
Full URL
https://static.myfinance.com/widget/inlineMedia_core.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6815:2b8a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c2898711aa44688968b5769b7ca3a50be196c4897657ab6ce34f215b07f455d
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
2845
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
x-amz-request-id
1PHGRHDNDSXVWJ5C
x-amz-id-2
udGKZpw9Mxc1b9v/KMLF3y4EIAFvbaTZ2FD0dXSvPwMzwBBmrsaTwpiCST4dU+yz6dWU5iPgHJg=
last-modified
Thu, 09 Dec 2021 19:58:40 GMT
server
cloudflare
etag
W/"874805badaa992bae7fba35738ee6edc"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=dEZy6ZSWOiL7HroqV%2BApBn7mIHSSVIq%2Fu5xZeLkNUqP25SdvaMbkHdw5%2B1%2B4ssjXBAp%2FOJSyJbQ0ot4BcJg32nxbxPjMLA%2B7UMMREUzHrA%2FryUZmb5htUP2Ojz7GLKbNHFSWiWVBw6jHI99d53MVdjs%2Bsg%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
vary
Accept-Encoding
cache-control
max-age=14400
cf-ray
6befb5500e7a83a6-MXP
YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
c.go-mpulse.net/boomerang/ Frame 2D97
205 KB
50 KB
Script
General
Full URL
https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00:1b8::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Akamai Resource Optimizer /
Resource Hash
09ebd7f407439990aac227e70da23e1a819e8e30282928e324370805f480bec4

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:11:01 GMT
Content-Encoding
br
Last-Modified
Thu, 14 Oct 2021 03:09:47 GMT
Server
Akamai Resource Optimizer
Vary
Accept-Encoding
Content-Type
application/javascript;charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800, s-maxage=604800
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
50393
truncated
/
31 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f3e2e0f12c5badfe408d69bf6c0fa9ce6247f9a45c849851a53b8647637cfcd0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
dfd272053c730cd470302af475eb401d9be41c81f0081c20d7910f6c12732c9d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
95783bf43b78701a92daf5ec7268db97c7144599c774821126b8cc5396724bfa

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
logo.png
www.zdnet.com/a/fly/1639688064-asset/bundles/zdnetcss/images/core/
4 KB
4 KB
Image
General
Full URL
https://www.zdnet.com/a/fly/1639688064-asset/bundles/zdnetcss/images/core/logo.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/a/fly/css/core/main-61ec7c25fb-rev.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
ff2ae991ac0efdb5ae8b4428ba8555a0aeb0fd94b8014ce290c484242c524097
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/a/fly/css/core/main-61ec7c25fb-rev.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

content-security-policy
default-src https://*.zdnet.com:*
via
1.1 varnish
last-modified
Thu, 16 Dec 2021 19:54:03 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
date
Fri, 17 Dec 2021 11:11:01 GMT
vary
Accept-Encoding, Accept
content-type
image/png
cache-control
max-age=31536000
strict-transport-security
max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
content-length
4105
x-xss-protection
1; mode=block
expires
Thu, 23 Dec 2021 20:08:24 GMT
Semibold.woff2
www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/
20 KB
20 KB
Font
General
Full URL
https://www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/Semibold.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
21c9c7889404394d4e4c780022b56b5fa39e83b19c34eb0508561a115a1dcc6a
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Origin
https://www.zdnet.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
content-length
20344
x-xss-protection
1; mode=block
last-modified
Fri, 12 Nov 2021 15:35:29 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"a96ff4477074c6395b7305d2d98fde8e"
strict-transport-security
max-age=31536000
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 16 Nov 2022 18:20:56 GMT
Regular.woff2
www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/
20 KB
20 KB
Font
General
Full URL
https://www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/Regular.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
7fa1c7b1686f9f116183456c39f7b3ed9cce063cfb428e575fe4a29ae05c4fa6
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Origin
https://www.zdnet.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
content-length
20256
x-xss-protection
1; mode=block
last-modified
Fri, 12 Nov 2021 15:35:30 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"2d636d9395b2da27ce67040250333ca4"
strict-transport-security
max-age=31536000
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 16 Nov 2022 18:20:56 GMT
inlineMedia.css
static.myfinance.com/widget/
3 KB
2 KB
Stylesheet
General
Full URL
https://static.myfinance.com/widget/inlineMedia.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6815:2b8a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c50d5d10df377bd960648973b53891bfcaf48f457503eed023ad2c29f28e49b2
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
4215
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
x-amz-request-id
E76KD9X4369F809W
x-amz-id-2
I9BCNhq0gyVdNzbblL6qPJ0SC3f2+Z8AtMKFBBafXrZQ4acHVQyzXrqKxTuU4HKyzLKxIVuN2Ds=
last-modified
Mon, 12 Jul 2021 14:22:18 GMT
server
cloudflare
etag
W/"528a38ce39fc58a866c1226253bbb189"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=eK%2B0pHWh1hzfMR7DGahJa4WQOJgzVFJ%2Btul0VOCU9quWmQxjTR8IcEDTYPcQX8EzZIPkb85hu49cpPkV%2F3FxLOfD5J%2FchHOdlkN9XAldsKh4w68apAN579uORUpvrL582qqs9AOj1n3%2F%2BY0J7eB%2FooGCYQ%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
text/css
vary
Accept-Encoding
cache-control
max-age=14400
cf-ray
6befb5500e7b83a6-MXP
e70f246a-fd9b-4805-9fd4-fcd89020aca5.json
cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/
3 KB
2 KB
XHR
General
Full URL
https://cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/e70f246a-fd9b-4805-9fd4-fcd89020aca5.json
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
eaf765d314b24473895a9ece61135d31023528c3b65129051b2c5a471d780604
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
xkIaWO5Hr0+rNu9IdoYHdw==
age
4792
vary
Accept-Encoding
content-length
1425
x-ms-lease-status
unlocked
last-modified
Thu, 08 Jul 2021 15:15:53 GMT
server
cloudflare
etag
0x8D94223473B0939
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
06042b04-c01e-000f-0c15-b63510000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb5505dd6374b-MXP
expires
Fri, 17 Dec 2021 15:11:01 GMT
main.default.js
www.zdnet.com/a/fly/046431-fly/js/
223 KB
70 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/046431-fly/js/main.default.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
022185811a029208da14948f296e29ce3ebb9aa90dfaf6a14570245e89a80165
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
71889
x-xss-protection
1; mode=block
last-modified
Thu, 16 Dec 2021 20:56:48 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 23 Dec 2021 20:58:44 GMT
config.json
c.go-mpulse.net/api/ Frame 2D97
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&d=www.zdnet.com&t=5465798&v=1.720.0&if=&sl=0&si=85f7e559-528b-4464-8c39-b67904e34ff8-r49b2d&plugins=ConfigOverride,Continuity,PageParams,IFrameDelay,AutoXHR,SPA,History,Angular,Backbone,Ember,RT,CrossDomain,BW,PaintTiming,NavigationTiming,ResourceTiming,Memory,CACHE_RELOAD,Errors,TPAnalytics,UserTiming,Akamai,Early,EventTiming,LOGN&acao=
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00:1b8::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
fc33d47d7d99444edfc2c3b689689266f6888e272d64122ad9b2f4b878ca5f5a

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:11:01 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json
Access-Control-Allow-Origin
*
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
803
record
a.myfidevs.io/ Frame
0
0
Preflight
General
Full URL
https://a.myfidevs.io/record
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.172.51.102 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-172-51-102.compute-1.amazonaws.com
Software
Python/3.7 aiohttp/3.7.4.post0 /
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
content-type,x-api-key
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
access-control-allow-origin
*
access-control-allow-credentials
true
access-control-allow-methods
POST
access-control-allow-headers
*
server
Python/3.7 aiohttp/3.7.4.post0
v1.5
www.myfinance.com/api/au/ Frame
0
0
Preflight
General
Full URL
https://www.myfinance.com/api/au/v1.5?imre=aHR0cHM6Ly93d3cuemRuZXQuY29tL2FydGljbGUvc3VzcGVjdGVkLWlyYW5pYW4taGFja2Vycy10YXJnZXQtYWlybGluZS13aXRoLW5ldy1iYWNrZG9vci8=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6815:2b8a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-type
text/html; charset=utf-8
vary
Origin
access-control-allow-credentials
true
access-control-allow-origin
https://www.zdnet.com
access-control-allow-headers
x-requested-with, content-type, accept, origin, authorization, x-csrftoken, x-api-key, Access-Control-Allow-Origin
access-control-allow-methods
DELETE, GET, OPTIONS, PATCH, POST, PUT
access-control-max-age
86400
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=IbAa326BnYclhH%2BHWpxyFXBUmauE5uHHwWtEmgrNkZHF4UrfF2VuOSBnQ3ikXDaVqFZyjv4dIg0dQjIeJSmFtKvdC4Nx5RLCmowNNSDPNkBqzV%2FKTNlcFX8LPueuVPRATuvnUdBjikE9gAdndUIUQw%3D%3D"}],"group":"cf-nel","max_age":604800}
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
strict-transport-security
max-age=15552000
x-content-type-options
nosniff
server
cloudflare
cf-ray
6befb550ce773748-MXP
content-encoding
br
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
record
a.myfidevs.io/
0
166 B
XHR
General
Full URL
https://a.myfidevs.io/record
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.172.51.102 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-172-51-102.compute-1.amazonaws.com
Software
Python/3.7 aiohttp/3.7.4.post0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept
application/json
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
x-api-key
yuH27H1QId6afXAojow6Tafi7Vw9v1spaLD5Yznw
Content-Type
application/json

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:11:01 GMT
access-control-allow-credentials
true
server
Python/3.7 aiohttp/3.7.4.post0
access-control-allow-headers
*
access-control-allow-methods
POST
v1.5
www.myfinance.com/api/au/
1 KB
1 KB
XHR
General
Full URL
https://www.myfinance.com/api/au/v1.5?imre=aHR0cHM6Ly93d3cuemRuZXQuY29tL2FydGljbGUvc3VzcGVjdGVkLWlyYW5pYW4taGFja2Vycy10YXJnZXQtYWlybGluZS13aXRoLW5ldy1iYWNrZG9vci8=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3037::6815:2b8a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6d1a540f77ea1e99ae96a091a65ab7f96de31b9ba602d6bd3a103bbfec3578d7
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

Accept
application/json
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
application/json

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
content-type
application/json
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
allow
POST, GET
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=pRW9zCvtlHNWBpth%2B%2BLzPJH8MPVSTMgP1Y3G1BcGIScRJqcoYuyayjqjnnJGDtsmGijZL5kZUNyB%2BNQ2OzjmeYI8ammUySvp76fCE2rn9amsAXnkDQopTXOwk%2BW3FisXwlsT6oREvdT9eUtlvbHPsw%3D%3D"}],"group":"cf-nel","max_age":604800}
content-language
en-us
access-control-allow-origin
https://www.zdnet.com
vary
Accept, Accept-Language, Origin, Cookie
cache-control
max-age=0, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cf-ray
6befb5539d7659d7-MXP
expires
Fri, 17 Dec 2021 11:11:01 GMT
location
geolocation.onetrust.com/cookieconsentpub/v1/geo/
189 B
389 B
Script
General
Full URL
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:b844 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0fbee1118e2f0183e4f02ad8968e1758861d8872550d2ced4eba3bd43b239118
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
strict-transport-security
max-age=31536000; includeSubDomains; preload
cf-ray
6befb550ad7f4e50-FRA
bidbarrel-zdnet-rv.min.js
at.adtech.redventures.io/lib/dist/prod/
607 KB
177 KB
Script
General
Full URL
https://at.adtech.redventures.io/lib/dist/prod/bidbarrel-zdnet-rv.min.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.66.154 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6c0cd7b80611259d4ccce9165e8b5dd062aad43e3e3e19a404fe967c49795d03

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
via
1.1 d8e97d2c28917e4c41ab79bb1e94b845.cloudfront.net (CloudFront), 1.1 varnish
age
520
x-cache
Hit from cloudfront, HIT
content-encoding
gzip
content-length
180330
x-served-by
cache-hhn4069-HHN
last-modified
Thu, 28 Oct 2021 17:15:17 GMT
server
AmazonS3
x-timer
S1639739461.235564,VS0,VE0
etag
"873be44731952ce6844f825d0be702dd"
vary
Accept-Encoding, Origin
content-type
application/javascript
cache-control
max-age=900, public, must-revalidate
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
x-amz-cf-id
VGH47jj9fjjwylFArcjvMsNzTAq38EztRwkp5ZRsemFUnWuRMR1s8Q==
x-cache-hits
2
urs.js
urs.zdnet.com/sdk/
50 KB
50 KB
Script
General
Full URL
https://urs.zdnet.com/sdk/urs.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.120.203.121 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
121.203.120.34.bc.googleusercontent.com
Software
/
Resource Hash
fb7a86f12d2f0ac2f4111c147415ab30f9c7d84c5e15faba3875fce7ce590127
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
via
1.1 google
last-modified
Tue, 12 Jan 2021 17:00:48 GMT
etag
"5ffdd5c0-c803"
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript
accept-ranges
bytes
alt-svc
clear
content-length
51203
mpulse-1.0.2.js
www.zdnet.com/a/fly/js/libs/
61 KB
12 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/libs/mpulse-1.0.2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
ea7373d7059ab32d4304249b48a91311f91d2dce5e1ebf10450f33f9a8c5f5ec
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
12449
x-xss-protection
1; mode=block
last-modified
Mon, 13 Dec 2021 22:34:51 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"148d7e6acc80b32c08a3cbf8e3164307"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 21 Dec 2021 05:39:11 GMT
otBannerSdk.js
cdn.cookielaw.org/scripttemplates/6.20.0/
376 KB
84 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/6.20.0/otBannerSdk.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
295c66c14524b77dd1271317457dec037b5ef0943da346b9b73681e54da826e0
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
jOOTzA5W9ewbfwCUPpt/mw==
age
3786
vary
Accept-Encoding
content-length
86053
x-ms-lease-status
unlocked
last-modified
Wed, 07 Jul 2021 06:41:48 GMT
server
cloudflare
etag
0x8D941124BEC2620
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
4aacb79a-501e-00a0-26ea-e71780000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb550de90374b-MXP
config.json
c.go-mpulse.net/api/v2/
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/v2/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&t=1639739461253&s=f9372093ead33b9e35ad994902ceb865809fbbefd5b6d9ca5a61e6aade1f9061
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00:1b8::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
e56f3949e057d8495ae2b8a1b165b24934fabf23bd452027b0b0de8309366e46

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:11:01 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
807
diff
at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/ Frame
0
0
Preflight
General
Full URL
https://at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/diff?variant=core
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.66.154 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
Google Frontend /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
*/*
Access-Control-Request-Method
GET
Access-Control-Request-Headers
cat,content-type,variant,version
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

content-type
text/html; charset=utf-8
x-dns-prefetch-control
off
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=15552000; includeSubDomains
x-download-options
noopen
x-content-type-options
nosniff
x-xss-protection
1; mode=block
access-control-allow-origin
https://www.zdnet.com
access-control-allow-headers
*
allow
GET,HEAD
etag
W/"8-ZRAf8oNBS3Bjb/SU2GYZCmbtmXg"
x-cloud-trace-context
c8f64e316ecfddcca0eeb953171a555e
server
Google Frontend
accept-ranges
bytes
date
Fri, 17 Dec 2021 11:11:01 GMT
via
1.1 varnish
x-served-by
cache-hhn4075-HHN
x-cache
MISS
x-cache-hits
0
x-timer
S1639739461.327654,VS0,VE112
vary
Accept-Encoding, Origin
content-length
8
config.js
confiant-integrations.global.ssl.fastly.net/J3UXFee1xclY-bfFlWh1mIZ_phU/gpt_and_prebid/
162 KB
32 KB
Script
General
Full URL
https://confiant-integrations.global.ssl.fastly.net/J3UXFee1xclY-bfFlWh1mIZ_phU/gpt_and_prebid/config.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.65.194 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
179bd9b6d13caa3731c8682e825e23a23ded22386a7f173abea0f4973f5502a8

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:11:01 GMT
Content-Encoding
gzip
Age
3572
X-Cache
HIT
Connection
keep-alive
Content-Length
32152
x-amz-id-2
c+Zpx5ULCL0TYEvw9X2PcFu6eVThr5oJQBLxUNGDFsIGklNeGV0npULycrz16qucEE/9ddpZ7oM=
X-Served-By
cache-cdg20735-CDG
Last-Modified
Fri, 17 Dec 2021 09:49:48 GMT
Server
AmazonS3
X-Timer
S1639739461.334302,VS0,VE0
ETag
"7088e0458cfff6b08311f19c9503048b"
x-amz-request-id
KKTMQ8G68H6FF3CC
Via
1.1 varnish
Cache-Control
public, max-age=900, stale-while-revalidate=3600
Accept-Ranges
bytes
Content-Type
text/javascript
X-Cache-Hits
34
diff
at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/
26 KB
3 KB
Fetch
General
Full URL
https://at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/diff?variant=core
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.66.154 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
Google Frontend /
Resource Hash
3e279129e0b32c21501807eddb0c582841a0536e6dac62169361c51d5a9baed1
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

cat
5zTciER5s
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
application/json
Accept
application/json
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
variant
core
version
rv2.25.6

Response headers

strict-transport-security
max-age=15552000; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
age
591
x-dns-prefetch-control
off
x-cache
HIT
ttl
900s
content-length
2720
x-xss-protection
1; mode=block
x-served-by
cache-hhn4075-HHN
access-control-allow-origin
*
server
Google Frontend
x-timer
S1639739461.447356,VS0,VE0
x-frame-options
SAMEORIGIN
date
Fri, 17 Dec 2021 11:11:01 GMT
x-download-options
noopen
vary
Accept-Encoding, Origin
content-type
application/json; charset=utf-8
via
1.1 varnish
x-cloud-trace-context
3de4a3abf1ef995dc548777037692a91
cache-control
max-age=900
etag
W/a2d3576aa9cd593699dde9d75b9183cf051d0dcf
accept-ranges
bytes
access-control-allow-headers
*
x-cache-hits
4
gpt.js
securepubads.g.doubleclick.net/tag/js/
78 KB
27 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
sffe /
Resource Hash
1907478e8fa62801a1db26be87cab0755288131c9c8e80320582e560825df3cc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1073 / 169 of 1000 / last-modified: 1639397097"
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
26912
x-xss-protection
0
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Fri, 17 Dec 2021 11:11:01 GMT
en.json
cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/069e0a06-a1be-44f5-9a8f-926f2985d489/
93 KB
20 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/069e0a06-a1be-44f5-9a8f-926f2985d489/en.json
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c83de3876b70820a0a835648010dc49a5600d6c3dd65f1a1e19ff44d33663083
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
AlmWtxV11YCExQkuyz0PJA==
age
6136
vary
Accept-Encoding
content-length
20136
x-ms-lease-status
unlocked
last-modified
Thu, 08 Jul 2021 15:15:59 GMT
server
cloudflare
etag
0x8D942234AE979B3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
3343f274-d01e-0054-6315-b6326c000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb5516f4e374b-MXP
expires
Fri, 17 Dec 2021 15:11:01 GMT
wrap.js
confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/
189 KB
61 KB
Script
General
Full URL
https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/wrap.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.65.194 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
80da370ad41bee2716b42d1583e139eac39f5c7c243c5fe6439b9754013116c6

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:11:01 GMT
Content-Encoding
gzip
Age
341
X-Cache
HIT
Connection
keep-alive
Content-Length
61460
x-amz-id-2
W7XJY6swrisomyWju+PT8GqF32h9RFEXT8zYyLwRzGYsnq9+0mh6I9edt8LusyWZrpZVrXTaVZM=
X-Served-By
cache-cdg20735-CDG
Last-Modified
Thu, 02 Dec 2021 17:00:39 GMT
Server
AmazonS3
X-Timer
S1639739461.363513,VS0,VE0
ETag
"0bad6e8b774e2623401e436c2a44f48e"
x-amz-request-id
VAQ5QBSSJJKQQWVH
Via
1.1 varnish
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
Content-Type
application/javascript; charset=utf-8
X-Cache-Hits
340
otFlat.json
cdn.cookielaw.org/scripttemplates/6.20.0/assets/
13 KB
3 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/scripttemplates/6.20.0/assets/otFlat.json
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
72562f00bd821b6edc0368065bf009468955ba01f8ead742d8bbc2470c4358c4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
/OL7qnwFOarng5AW29V9Pw==
age
5135703
vary
Accept-Encoding
content-length
2950
x-ms-lease-status
unlocked
last-modified
Wed, 07 Jul 2021 06:41:42 GMT
server
cloudflare
etag
0x8D94112485FC2D3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/json
access-control-allow-origin
*
x-ms-request-id
aa0c218f-101e-00ca-536c-c44b2b000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6befb551b804374b-MXP
pubads_impl_2021120601.js
securepubads.g.doubleclick.net/gpt/
348 KB
117 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021120601.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
sffe /
Resource Hash
2d5ae5a515a688823dc98d032242c2ed6f490a74c4281bdd599567898f9fa675
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
119476
x-xss-protection
0
last-modified
Mon, 06 Dec 2021 09:34:20 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Fri, 17 Dec 2021 11:11:01 GMT
ppub_config
securepubads.g.doubleclick.net/pagead/
217 B
153 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/pagead/ppub_config?ippd=www.zdnet.com
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
12717f96c61a500136a8564d666db9b960869a71dd3176a438b53fb08be5c7bb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private, max-age=3600, stale-while-revalidate=3600
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
128
x-xss-protection
0
expires
Fri, 17 Dec 2021 11:11:01 GMT
article-6ebc50982c-rev.js
www.zdnet.com/a/fly/js/pages/
102 KB
26 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/pages/article-6ebc50982c-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
5b6e97cf069d0d1a67390ad12ef50237963c77addfd1c8f15399b916993dd143
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
26736
x-xss-protection
1; mode=block
last-modified
Tue, 14 Dec 2021 15:00:39 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"077e6dbcc2328e1aabe9b3b472aa6e18"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 21 Dec 2021 15:23:17 GMT
cohesion-latest.min.js
cdn.cohesionapps.com/cohesion/
77 KB
22 KB
Script
General
Full URL
https://cdn.cohesionapps.com/cohesion/cohesion-latest.min.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
65.9.64.109 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-65-9-64-109.fra56.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6d5246d5f81b078b8d850b3fbe4ac7c44d05c0755ea14786c6fee453e6805fff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-amz-version-id
null
content-encoding
gzip
etag
W/"9f7be06169d1d8c9558378c9b8f53586"
last-modified
Tue, 14 Dec 2021 17:07:13 GMT
server
AmazonS3
age
65022
x-amz-server-side-encryption
AES256
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript
via
1.1 95e0c26862caa0a0aa5e9580919524f8.cloudfront.net (CloudFront)
date
Thu, 16 Dec 2021 17:07:20 GMT
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
xivf0T4BURxhLwBVaLIyPS6tK_WC2OuyEXTzYTp70P0vPrvZkuw20Q==
moatheader.js
z.moatads.com/redventuresgamheader644747280705/
240 KB
82 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ba5c9b5823ef1377da70e73357b85ef2dca7ade9afe70c93d0aa163c61c9bf03

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
last-modified
Thu, 02 Dec 2021 16:10:34 GMT
server
AmazonS3
x-amz-request-id
DG2H92XYZRQZ4RSV
etag
"33d2b31f29685690d6e2e3d016555f04"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=15270
accept-ranges
bytes
content-length
83699
x-amz-id-2
TnGeV4HtYB4NVPsPbHr+b5g34xbNmb7VjpQ7zI9/ywXjEabCjusxmRc+mMFbdi/bypbtdhI7jN0=
integrator.js
adservice.google.de/adsid/
107 B
792 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
cache-control
private, no-cache, no-store
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3="googleads.g.doubleclick.net:443"; ma=2592000,h3=":443"; ma=2592000,h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
100
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
107 B
549 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80e::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
cache-control
private, no-cache, no-store
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
100
x-xss-protection
0
ads
securepubads.g.doubleclick.net/gampad/
26 KB
11 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3201054786090293&correlator=992423227389591&output=ldjh&impl=fifs&eid=31060437&vrg=2021120601&ptt=17&sc=1&sfv=1-0-38&ecs=20211217&iu_parts=22309610186%2Caw-zdnet%2Ctechnology%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3&prev_iu_szs=728x90%7C970x66%7C5x5&prev_scp=pos%3Dnav%26sl%3Dnav-ad-plus-leader%253FT-1000%26iid%3Dunit%253Dnav-ad-plus-leader%257Cvguid%253D9487de12-bee9-4d31-b847-f48a000d5a28%257Cpv%253D1&eri=1&cust_params=test%3Dseamless%257C1%257Cb%26buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dslack%252Cibm%26tag%3Dcyber-security%252Ctarget%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dsuspected-iranian-hackers-target-airline-with-new-backdoor%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%26type%3Dgpt%26region%3Daw%26subses%3D2%26session%3Da%26pv%3D1%26vguid%3D9487de12-bee9-4d31-b847-f48a000d5a28&cookie_enabled=1&bc=31&abxe=1&lmt=1639739461&dt=1639739461670&dlt=1639739461013&idt=482&frm=20&biw=1600&bih=1200&oid=2&adxs=436&adys=50&adks=3529097836&ucis=1&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1600x100&msz=1600x100&ga_vid=1756544581.1639739462&ga_sid=1639739462&ga_hid=1173083911&ga_fc=false&fws=4&ohw=1600&btvi=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
40739d9f0a22f1c35a18d39705816066b8fa60259d9d129b4d34d1d663967d5e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
10943
x-xss-protection
0
google-lineitem-id
5840893800
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138375198164
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
9156d071107c7ebb6fe2f6c2d881c783.safeframe.googlesyndication.com/safeframe/1-0-38/html/ Frame FE09
6 KB
4 KB
Document
General
Full URL
https://9156d071107c7ebb6fe2f6c2d881c783.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a73730123a43c3040d889aaee11ec35094277ce5f778076b262c23a293870adb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
timing-allow-origin
*
content-length
3108
date
Fri, 17 Dec 2021 11:11:01 GMT
expires
Sat, 17 Dec 2022 11:11:01 GMT
cache-control
public, immutable, max-age=31536000
last-modified
Tue, 02 Mar 2021 20:17:03 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
ads
securepubads.g.doubleclick.net/gampad/
20 KB
9 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3201054786090293&correlator=3704233724497613&output=ldjh&impl=fifs&eid=31060437&vrg=2021120601&ptt=17&sc=1&sfv=1-0-38&ecs=20211217&iu_parts=22309610186%2Caw-zdnet%2Ctechnology%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3&prev_iu_szs=300x250%7C300x600&prev_scp=pos%3Dtop%26sl%3Dmpu-plus-top%253FLL%257CT-1000%26iid%3Dunit%253Dmpu-plus-top%257Cvguid%253D9487de12-bee9-4d31-b847-f48a000d5a28%257Cpv%253D1&eri=1&cust_params=test%3Dseamless%257C1%257Cb%26buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dslack%252Cibm%26tag%3Dcyber-security%252Ctarget%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dsuspected-iranian-hackers-target-airline-with-new-backdoor%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%26type%3Dgpt%26region%3Daw%26subses%3D2%26session%3Da%26pv%3D1%26vguid%3D9487de12-bee9-4d31-b847-f48a000d5a28&cookie_enabled=1&bc=31&abxe=1&lmt=1639739461&dt=1639739461710&dlt=1639739461013&idt=482&frm=20&biw=1600&bih=1200&oid=2&adxs=1050&adys=450&adks=1139850431&ucis=2&ifi=2&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&vis=1&dmc=8&scr_x=0&scr_y=0&psz=370x280&msz=370x30&ga_vid=1756544581.1639739462&ga_sid=1639739462&ga_hid=1173083911&ga_fc=false&fws=4&ohw=370&btvi=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
e99b78357ddd6392ae07affc487a50af39b330acc183c6af3acdd6d8ed2b0302
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9411
x-xss-protection
0
google-lineitem-id
5821501893
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138370174589
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
48 KB
11 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3201054786090293&correlator=3552858523517764&output=ldjh&impl=fifs&eid=31060437&vrg=2021120601&ptt=17&sc=1&sfv=1-0-38&ecs=20211217&iu_parts=22309610186%2Caw-zdnet%2Ctechnology%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3&prev_iu_szs=300x250&prev_scp=pos%3Dmiddle%26sl%3Dmpu-middle%253FLL%257CT-1000%26iid%3Dunit%253Dmpu-middle%257Cvguid%253D9487de12-bee9-4d31-b847-f48a000d5a28%257Cpv%253D1&eri=1&cust_params=test%3Dseamless%257C1%257Cb%26buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dslack%252Cibm%26tag%3Dcyber-security%252Ctarget%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dsuspected-iranian-hackers-target-airline-with-new-backdoor%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%26type%3Dgpt%26region%3Daw%26subses%3D2%26session%3Da%26pv%3D1%26vguid%3D9487de12-bee9-4d31-b847-f48a000d5a28&cookie_enabled=1&bc=31&abxe=1&lmt=1639739461&dt=1639739461713&dlt=1639739461013&idt=482&frm=20&biw=1600&bih=1200&oid=2&adxs=1050&adys=1230&adks=3640736402&ucis=3&ifi=3&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&vis=1&dmc=8&scr_x=0&scr_y=0&psz=370x530&msz=370x30&ga_vid=1756544581.1639739462&ga_sid=1639739462&ga_hid=1173083911&ga_fc=false&fws=4&ohw=370&btvi=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
a07380e7bba8538d3c46780c5149b6f66ea6f5f23a4543161299c89f7d0767d3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
11699
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
23 KB
10 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3201054786090293&correlator=3543687225312983&output=ldjh&impl=fifs&eid=31060437&vrg=2021120601&ptt=17&sc=1&sfv=1-0-38&ecs=20211217&iu_parts=22309610186%2Caw-zdnet%2Ctechnology%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3&prev_iu_szs=320x50%7C11x11&fluid=height&prev_scp=pos%3Dtop%26strnativekey%3D8ec3a4f3%26sl%3Dsharethrough-top%253FLL%257CT-1000%26iid%3Dunit%253Dsharethrough-top%257Cvguid%253D9487de12-bee9-4d31-b847-f48a000d5a28%257Cpv%253D1&eri=1&cust_params=test%3Dseamless%257C1%257Cb%26buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dslack%252Cibm%26tag%3Dcyber-security%252Ctarget%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dsuspected-iranian-hackers-target-airline-with-new-backdoor%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%26type%3Dgpt%26region%3Daw%26subses%3D2%26session%3Da%26pv%3D1%26vguid%3D9487de12-bee9-4d31-b847-f48a000d5a28&cookie_enabled=1&bc=31&abxe=1&lmt=1639739461&dt=1639739461715&dlt=1639739461013&idt=482&frm=20&biw=1600&bih=1200&oid=2&adxs=215&adys=1434&adks=2408233683&ucis=4&ifi=4&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&vis=1&dmc=8&scr_x=0&scr_y=0&psz=770x150&msz=770x0&ga_vid=1756544581.1639739462&ga_sid=1639739462&ga_hid=1173083911&ga_fc=false&fws=4&ohw=770&btvi=2&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
a690891f9135d2f4ef9c527a5de6e8a5fa8c154050545bd193fde3ca8f3b7d91
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
10042
x-xss-protection
0
google-lineitem-id
5667186874
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138346938775
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
t
ingest.make.rvapps.io/v2/
138 B
271 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.8.109 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-8-109.compute-1.amazonaws.com
Software
/
Resource Hash
0bb9bf1ed59467adb48d2ddaa4ee526598b8e4289ffb70b644e363ca31e13c35

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
access-control-allow-credentials
true
content-length
138
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
138 B
271 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.8.109 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-8-109.compute-1.amazonaws.com
Software
/
Resource Hash
0127d3a104f9e465250293b488b87dd9b076e08f236f9f9b5fbce1099cc2bdc7

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
access-control-allow-credentials
true
content-length
138
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
137 B
270 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.8.109 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-8-109.compute-1.amazonaws.com
Software
/
Resource Hash
411bd6af584cea958aa82c54724ce3b182b01b918e230d195e2b6846beb97714

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
access-control-allow-credentials
true
content-length
137
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
137 B
270 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.8.109 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-8-109.compute-1.amazonaws.com
Software
/
Resource Hash
245501ed4c72950e39d9d5e204c3ae13a05e64399209389f4f2e7d45ce6ba6ce

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
access-control-allow-credentials
true
content-length
137
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
138 B
271 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.8.109 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-8-109.compute-1.amazonaws.com
Software
/
Resource Hash
e7663f0fed05d73c9f9621c60b220677410b8768f4410a3218147c476eca98e2

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
access-control-allow-credentials
true
content-length
138
vary
Origin
content-type
application/json
xs1.html
cdn.cohesionapps.com/cohesion/ Frame 161D
2 KB
1 KB
Document
General
Full URL
https://cdn.cohesionapps.com/cohesion/xs1.html
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
65.9.64.109 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-65-9-64-109.fra56.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
afac3a301d848688d0748228296ec7ae26369f67c2df29f3f480ef3ab0bc6ef9

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/

Response headers

content-type
text/html
last-modified
Tue, 14 Dec 2021 17:07:14 GMT
x-amz-server-side-encryption
AES256
x-amz-version-id
null
server
AmazonS3
content-encoding
gzip
date
Thu, 16 Dec 2021 17:07:28 GMT
etag
W/"10b2c1751c2247b1aeccc91060f971cf"
vary
Accept-Encoding
x-cache
Hit from cloudfront
via
1.1 95e0c26862caa0a0aa5e9580919524f8.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
-KV9VpJOTPKZuoMDqmtFI5zIHAjzQHM4xfEOSZ4BK08vEJSpXbA-Wg==
age
65014
public
taggy.cohesionapps.com/implementations/
9 KB
9 KB
XHR
General
Full URL
https://taggy.cohesionapps.com/implementations/public
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.105.31 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-5-105-31.compute-1.amazonaws.com
Software
/ Express
Resource Hash
13631760fe58e5e9c2cf16890b9869a78629cb3769f552fb3b0eaf3fba8e934e

Request headers

Source-Key
src_1kYsAcdpfzbZ8UlNLYht1RPg3m2
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Page-URL
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/#ftag=RSSbaffb68\u003ehttps://t.co/Bi3lGmiArD\u003c/e\u003e
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
x-powered-by
Express
etag
W/"23f1-I/Ne1r04eidCtHXfz5YfX2yJL70"
content-length
9201
content-type
application/json; charset=utf-8
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.8.109 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-8-109.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.8.109 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-8-109.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.8.109 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-8-109.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.8.109 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-8-109.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.8.109 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-8-109.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
public
taggy.cohesionapps.com/implementations/ Frame
0
0
Preflight
General
Full URL
https://taggy.cohesionapps.com/implementations/public
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.5.105.31 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-5-105-31.compute-1.amazonaws.com
Software
/ Express
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
GET
Access-Control-Request-Headers
content-type,page-url,source-key
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
x-powered-by
Express
access-control-allow-origin
*
access-control-allow-methods
GET,HEAD,PUT,PATCH,POST,DELETE
vary
Access-Control-Request-Headers
access-control-allow-headers
content-type,page-url,source-key
v2
mb.moatads.com/yi/
356 B
531 B
Script
General
Full URL
https://mb.moatads.com/yi/v2?ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-2RlMhkIJ33QxUrdGk7NYu%2BFfHV3eib89DkRB2436S0SxzRtAIyeo1MnKlpdMQlJdIBr9&rs=1-z0tp6wlWekwLgg%3D%3D&sc=1&os=1-jA%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&pcode=redventuresgamheader644747280705&rx=365370041675&callback=MoatNadoAllJsonpRequest_28152823
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.170.183.138 London, United Kingdom, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-170-183-138.eu-west-2.compute.amazonaws.com
Software
TornadoServer/5.1.1 /
Resource Hash
41170eb63f278eb18f603cc5edcf505524fb24cfd899851dabca93ca61ca8240

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
cache-control
max-age=900
server
TornadoServer/5.1.1
timing-allow-origin
*
etag
"ec643fadacccd538ccab9876ce2f9b3c69f51f6c"
content-length
356
content-type
text/html; charset=UTF-8
n.js
geo.moatads.com/
82 B
257 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-2RlMhkIJ33QxUrdGk7NYu%2BFfHV3eib89DkRB2436S0SxzRtAIyeo1MnKlpdMQlJdIBr9&rs=1-z0tp6wlWekwLgg%3D%3D&sc=1&os=1-jA%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&pcode=redventuresgamheader644747280705&rx=365370041675&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&i=REDVENTURES_GAM_HEADER1&hp=1&wf=1&pxm=&sgs=3&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=&t=1639739461755&de=815214980087&m=0&ar=8ab009d7785-clean&iw=04a0275&q=1&cb=0&cu=1639739461755&ll=2&lm=0&ln=0&em=0&en=0&d=undefined%3Aundefined%3Aundefined%3Aundefined&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&bo=undefined&bd=undefined&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&pe=1%3A422%3A422%3A0%3A408&jk=-1&jm=-1&fs=195979&na=1848872898&cs=0&ord=1639739461755&jv=1228755250&callback=DOMlessLLDcallback_28152823
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.11.215.107 London, United Kingdom, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-11-215-107.eu-west-2.compute.amazonaws.com
Software
TornadoServer/5.1.1 /
Resource Hash
c6dfe76443ad709c812b2989d9b04a3200810dfa6230463b141f71ba4d2fe0fd

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
cache-control
max-age=900
server
TornadoServer/5.1.1
timing-allow-origin
*
etag
"f1a35db8c07e113b7fadf137437e617963f93738"
content-length
82
content-type
text/html; charset=UTF-8
n.js
geo.moatads.com/
86 B
258 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-2RlMhkIJ33QxUrdGk7NYu%2BFfHV3eib89DkRB2436S0SxzRtAIyeo1MnKlpdMQlJdIBr9&rs=1-z0tp6wlWekwLgg%3D%3D&sc=1&os=1-jA%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&pcode=redventuresgamheader644747280705&rx=365370041675&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&i=REDVENTURES_GAM_HEADER1&hp=1&wf=1&pxm=&sgs=3&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=&t=1639739461755&de=815214980087&m=0&ar=8ab009d7785-clean&iw=04a0275&q=2&cb=0&cu=1639739461755&ll=2&lm=0&ln=0&em=0&en=0&d=undefined%3Aundefined%3Aundefined%3Aundefined&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&bo=undefined&bd=undefined&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&pe=1%3A422%3A422%3A0%3A408&jk=-1&jm=-1&fs=195979&na=1555259585&cs=0&callback=MoatDataJsonpRequest_28152823
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.11.215.107 London, United Kingdom, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-11-215-107.eu-west-2.compute.amazonaws.com
Software
TornadoServer/5.1.1 /
Resource Hash
762be5cb142bce8288bfec91fc0df859b320de35ed84c029075aebad9504b3de

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
cache-control
max-age=900
server
TornadoServer/5.1.1
timing-allow-origin
*
etag
"3a722a9b90ece527d5c762be2f11accb758cb4a9"
content-length
86
content-type
text/html; charset=UTF-8
view
securepubads.g.doubleclick.net/pcs/ Frame 79F5
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvC9bV6AhByVmCtCH2veZ0YOnTd_b7nadUbco8IydGexSOTVKT3wnoRC_SVjzQvRpX_NRrbvrVFigj9GLsqBUIssaW2hXHTDlfDXpgNoZ6JArgTwFiKr3bWL1OXskhEDN-ibwle0Ecef8Fz-4m5NIYjNOTrLsjGgzXTd6w55SNXmG_h3NqHilu6rWicGikO0mlrpawk2fA7LJYm1VgizYAnEvWZl8klR9SyX9aLXiR8aGgnbfjpPiiI4ATrufYh5LWTmcpEXhXfptHkxcI0rkOdpO1HbBDb9-o44WDvUTRnrdjGhFYrlTZ5Y-WKatFcgJ6Xm3WCqLGdzuZ7qOM&sai=AMfl-YRZrS-BGg5P105p9o_1WwK0ouPcXdKXzCZTYvOutP8PaywjjfXqypj-hYLcor1ISg37WfH5Np8tK5b4lgoASUDHWXxIufaO3g5Au7uDApm257_5NuxHXDCGcJHtxK4j&sig=Cg0ArKJSzABt0-hilTOIEAE&uach_m=[UACH]&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:11:01 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Fri, 17 Dec 2021 11:11:01 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 79F5
119 KB
37 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37305
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1638461285297402"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:11:01 GMT
moatad.js
z.moatads.com/redventuresgamdisplay60805146916/ Frame 79F5
335 KB
112 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamdisplay60805146916/moatad.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ec3300dff5a35315ea608c5dc57e965957897133eb6a543533566d6e2c35ed07

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-encoding
gzip
last-modified
Thu, 09 Dec 2021 16:36:30 GMT
server
AmazonS3
x-amz-request-id
SXBZ8ADYT77KW7MP
etag
"9c75e5b0c5bc0a53e0cdef53eae89c77"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=15191
accept-ranges
bytes
content-length
114446
x-amz-id-2
Js3u1th+lEwEMVGKInxoBehDmEsPJoYn2GSrvSApeaA9h/kdmOzjLJkUhJKG3pI/I9LMlptFND8=
/
02179915.akstat.io/
0
354 B
XHR
General
Full URL
https://02179915.akstat.io/?h.pg=article&h.ab=seamless_b_1&when=1639739461751&cdim.Site_View=desktop&t_other=custom4%7C327&d=zdnet.com&h.key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&h.d=zdnet.com&h.cr=46e1ce94a492e63c9cfc3293c4d3d1fed60baa2b-77b96a9-800602a4&h.t=1639739461290&http.initiator=api&rt.start=api&rt.si=6c72b620-e497-4550-9e71-f9f78704c952&rt.ss=1639739461817&rt.sl=0&api=1&api.v=2&api.l=js&api.lv=0.0.1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00:2b9::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:11:01 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Fri, 17 Dec 2021 11:11:01 GMT
xs2.html
cdn.cohesionapps.com/cohesion/ Frame 161D
473 B
833 B
Document
General
Full URL
https://cdn.cohesionapps.com/cohesion/xs2.html
Requested by
Host: cdn.cohesionapps.com
URL: https://cdn.cohesionapps.com/cohesion/xs1.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
65.9.64.109 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-65-9-64-109.fra56.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
88b8a3cb9df436d6910440c58428516accee080be4fa556d3cf10ec6905cf1b9

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://cdn.cohesionapps.com/cohesion/xs1.html

Response headers

content-type
text/html
content-length
473
last-modified
Tue, 14 Dec 2021 17:07:14 GMT
x-amz-server-side-encryption
AES256
x-amz-version-id
null
accept-ranges
bytes
server
AmazonS3
date
Thu, 16 Dec 2021 17:07:20 GMT
etag
"ffa03bed298484a7755ca23c5431cb28"
x-cache
Hit from cloudfront
via
1.1 95e0c26862caa0a0aa5e9580919524f8.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
H5trv1YUSgSnHcZvcGpK-hRp8oDW6KafkpoHBYo2Agr2fsljLKIq2g==
age
65022
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.8.109 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-8-109.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
t
ingest.make.rvapps.io/v2/
138 B
271 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.8.109 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-8-109.compute-1.amazonaws.com
Software
/
Resource Hash
a6b1c1ad2d47a391e305dd03090dc3502756919ff2dcb2ff54525333618d36c0

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
access-control-allow-credentials
true
content-length
138
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/
138 B
271 B
XHR
General
Full URL
https://ingest.make.rvapps.io/v2/t
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.8.109 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-8-109.compute-1.amazonaws.com
Software
/
Resource Hash
0274963a9437b0ecbc605a043682d1f335137f9194d0aa59819ac02a2d64b1c5

Request headers

User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
Authorization
Basic d2tfMWtZc0FkSHN4MVhWd1Q1RWJYOU9RWWw0bkpNOg==
Content-Type
application/json;charset=UTF-8

Response headers

access-control-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
access-control-allow-credentials
true
content-length
138
vary
Origin
content-type
application/json
t
ingest.make.rvapps.io/v2/ Frame
0
0
Preflight
General
Full URL
https://ingest.make.rvapps.io/v2/t
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.8.109 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-206-8-109.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
POST
Access-Control-Request-Headers
authorization,content-type
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Fri, 17 Dec 2021 11:11:01 GMT
content-length
0
access-control-allow-credentials
true
access-control-allow-headers
Authorization, Content-Type
access-control-allow-methods
POST
access-control-allow-origin
*
access-control-max-age
900
vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_DISPLAY1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=11x11&zMoatPS=top&zMoatSZPS=11x11%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1639739461974&de=619501529563&m=0&ar=cc97a930ec1-clean&iw=101177c&q=7&cb=0&ym=0&cu=1639739461974&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=5009920773%3A2843412950%3A5667186874%3A138346938775&zMoatW=11&zMoatH=11&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatSN=a&zMoatSL=sharethrough-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&gw=redventuresgamdisplay60805146916&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A422%3A422%3A0%3A408&iq=na&tt=na&tu=&tp=&jk=-1&jm=-1&fs=195926&na=1031651633&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:02 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 79F5
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss2_Rur67UN2l3tyfLGouV3NkjoGWobBDQQBMRQLOlVLV2TS9iwXzYvTRGoxTYtiT0_XSBpnsyZW8mguBC7hm5a1o8uI4n67romX_ruGXTc_7e0hEsDbvmonbkagkuFC2bXTn-J8JgtK5YAS2TWZ5QVsD-C95D4BPU9p-aZHzuSshrM1iIx-qNgLTL720cMHSYNTI5-b7e_BHbOns0oTOUSytAjfX0_ENdVvu_waJc4y95VAXL03dl4G1XWr4yPw8Mi3a2bVnbWahkZtIt3YIek8JsUZWHgiCzL1JKdVtWoluKsV6mRCGa6vtPr8oJb5twQ31lbVnUdP9YbV1Lyng&sai=AMfl-YTMH3iPYfgiDOPIIVtgwKDaOyODzFBoedPQVJDom6v9jbGpjcYdRHC1PrNefNvGfywfc32rrS6l6rjE3noBOfk21bS1YgTLKxcwIND06UuZiXC6F0Wy8c8idMq9Otfg&sig=Cg0ArKJSzBN8ndYRAAgsEAE&uach_m=[UACH]&urlfix=1&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Fri, 17 Dec 2021 11:11:02 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame E22D
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv-4gxLm8GTnJs76YgEvMXoDECWSY60PZdi-8gFsKVi-lDKco9nqCvPFK2iz-Cz4Su9sTDhCqyQKzhADTqyoaWgB5TZ2Gr16obh9w3UhgZEFv3A_x8OSTJh3GqGuppyjWluaXJSgbRNC7n0uFlpWxN7OygCgP-ySvVgiiH38A-qbdGx4lIMrOaNcMqOKS5VbO5KL8wwDN84jcgAC8Nw5jTQapquvDutXN_vRHdfBhvPe-zZ5VVC9YohYFqjZ3qAlbTjugjvI0rVtTbaX_y80Whnk5ZAso1D8gamStcYfo75fxca5lmSxf-zRUAei1NpfbTsSXPVeAIZ62sBQKA2vZxE&sai=AMfl-YQfGmRVsYUr6B8lsEeJxd5PEEEOujBz8lMm5uGNQnFzm1rtmNcoUDQ13TZ1LphwXSiTaLK4-MbxMqmoBZ-1EKvFyCN9zhX-ST68fzboyl1-xBXhoO5OqI2X-49yBRs&sig=Cg0ArKJSzLiTWz2I0DvHEAE&uach_m=[UACH]&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
ad.js
clipcentric-a.akamaihd.net/ad/B=608/F=1317278/C=603283/P=22/L=21/V=23/ST=1638969311/S=SzkmXuC3/ Frame E22D
162 KB
44 KB
Script
General
Full URL
https://clipcentric-a.akamaihd.net/ad/B=608/F=1317278/C=603283/P=22/L=21/V=23/ST=1638969311/S=SzkmXuC3/ad.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.105 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-105.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
a65474aec3d05036fdc95a4459d85f1543f464934698df8e4a9d1bca61a0500c
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
content-encoding
br
last-modified
Thu Jan 1 00:00:00 1970
server
Apache/2.2.34
x-frame-options
SAMEORIGIN
content-type
text/javascript
cache-control
max-age=3600
content-length
44769
skeleton.js
pixel.adsafeprotected.com/rjss/st/903347/59128494/ Frame E22D
46 KB
13 KB
Script
General
Full URL
https://pixel.adsafeprotected.com/rjss/st/903347/59128494/skeleton.js?ias_dspID=64
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.246.26.134 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-246-26-134.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
ae3fb1f1b385c2fb15d0bc81f00df7aba5652fdec3e47ebad49f25aec2db1ec4

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
content-encoding
gzip
x-server-name
app17.ie.303net.net
content-type
application/javascript;charset=utf-8
access-control-allow-origin
pixel.adsafeprotected.com
cache-control
no-cache
access-control-allow-credentials
true
server
nginx
expires
Wed, 31 Dec 1969 23:59:59 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame E22D
119 KB
36 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37305
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1638461285297402"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:11:02 GMT
moatad.js
z.moatads.com/redventuresgamdisplay60805146916/ Frame E22D
335 KB
112 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamdisplay60805146916/moatad.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ec3300dff5a35315ea608c5dc57e965957897133eb6a543533566d6e2c35ed07

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
content-encoding
gzip
last-modified
Thu, 09 Dec 2021 16:36:30 GMT
server
AmazonS3
x-amz-request-id
SXBZ8ADYT77KW7MP
etag
"9c75e5b0c5bc0a53e0cdef53eae89c77"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=15190
accept-ranges
bytes
content-length
114446
x-amz-id-2
Js3u1th+lEwEMVGKInxoBehDmEsPJoYn2GSrvSApeaA9h/kdmOzjLJkUhJKG3pI/I9LMlptFND8=
B26977839.323096029;dc_pre=CNeHo8HZ6vQCFdHouwgd__0MXg;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=2098939339;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=
ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/ Frame E22D
Redirect Chain
  • https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=2098939339;dc_lat=;dc_rdid=;tag_for_child_directed_treatme...
  • https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_pre=CNeHo8HZ6vQCFdHouwgd__0MXg;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=2098939339;dc_lat=;dc_rd...
42 B
63 B
Image
General
Full URL
https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_pre=CNeHo8HZ6vQCFdHouwgd__0MXg;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=2098939339;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=?
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Server
172.217.18.102 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
zrh04s05-in-f102.1e100.net
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
content-type
text/html; charset=UTF-8
location
https://ad.doubleclick.net/ddm/trackimp/N418801.3776911CBSINTERACTIVE.CO/B26977839.323096029;dc_pre=CNeHo8HZ6vQCFdHouwgd__0MXg;dc_trk_aid=515145530;dc_trk_cid=162954749;ord=2098939339;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=?
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
follow-only-when-prerender-shown
1
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
truncated
/ Frame E22D
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
33206a6d709d0de6df85e9f118d9a636638e76d45a55320d93ad08df9304edfc

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_DISPLAY1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1639739462066&de=511221084480&m=0&ar=cc97a930ec1-clean&iw=101177c&q=11&cb=0&ym=0&cu=1639739462066&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&zMoatW=5&zMoatH=5&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatSN=a&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&gw=redventuresgamdisplay60805146916&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A422%3A422%3A0%3A408&iq=na&tt=na&tu=&tp=&jk=-1&jm=-1&fs=195926&na=1169961464&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:02 GMT
truncated
/ Frame C14C
750 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e9cac3eeba1fc86e06fdc013a4c52742e9b4bd14b7be6517321127d4515095ce

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
E=in,im,fi
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=43/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E22D
35 B
160 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=43/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=in,im,fi
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
tavAo53F
clipcentric-a.akamaihd.net/file/1317301/ad_q60/1638969188/ Frame E22D
9 KB
9 KB
Image
General
Full URL
https://clipcentric-a.akamaihd.net/file/1317301/ad_q60/1638969188/tavAo53F?f=auto
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.105 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-105.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
80564ff963220266c89e284ae65634312da063d0ea5ee747527fd38e8c398d96
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Wed, 08 Dec 2021 13:14:16 GMT
server
Apache/2.2.34
x-frame-options
SAMEORIGIN
content-type
image/avif
access-control-allow-origin
*
cache-control
private, max-age=31536000
content-length
9282
h1xcxKOE
clipcentric-a.akamaihd.net/file/1317303/ad_q60/1638969190/ Frame E22D
8 KB
8 KB
Image
General
Full URL
https://clipcentric-a.akamaihd.net/file/1317303/ad_q60/1638969190/h1xcxKOE?f=auto
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.105 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-105.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
43fdf898c76171d1b5af752978ebeb6ed248bc677d0b1dfb204b7ae95658cd99
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Wed, 08 Dec 2021 13:14:14 GMT
server
Apache/2.2.34
x-frame-options
SAMEORIGIN
content-type
image/avif
access-control-allow-origin
*
cache-control
private, max-age=31536000
content-length
7924
E=ls:Clipcentric%20Site%20Fixes.0,li
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=46/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E22D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=46/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:Clipcentric%20Site%20Fixes.0,li
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
truncated
/ Frame 57C1
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/gif
E=ls:video%20auto.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=54/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E22D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=54/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:video%20auto.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=ls:Super%20Billboard.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=56/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E22D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=56/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:Super%20Billboard.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=ls:hotspots%20collapsed.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=64/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E22D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=64/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:hotspots%20collapsed.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=ls:on%20scroll%20full%20collapse.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=65/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E22D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=65/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:on%20scroll%20full%20collapse.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=ls:custom%20ad%20controls.0
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=66/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E22D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=66/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:custom%20ad%20controls.0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
ad.html
clipcentric-a.akamaihd.net/user-9/resources/ Frame 05A4
93 B
290 B
Document
General
Full URL
https://clipcentric-a.akamaihd.net/user-9/resources/ad.html
Requested by
Host: clipcentric-a.akamaihd.net
URL: https://clipcentric-a.akamaihd.net/ad/B=608/F=1317278/C=603283/P=22/L=21/V=23/ST=1638969311/S=SzkmXuC3/ad.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.105 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-105.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
e571945dec453fbc4c8177ad3af3f176dc562cf51fe40a10529b69e0b2b1e577

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/

Response headers

expires
Thu, 13 Jan 2022 13:55:46 GMT
last-modified
Tue, 04 May 2021 03:22:49 GMT
etag
"5d-5c17897b4d440"
cache-control
max-age=2592000
server
Apache/2.2.34
content-type
text/html; charset=UTF-8
accept-ranges
bytes
content-encoding
gzip
content-length
86
date
Fri, 17 Dec 2021 11:11:02 GMT
vary
Accept-Encoding
view
securepubads.g.doubleclick.net/pcs/ Frame C351
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvZqYr2Yp0SgtRgJ6FrKIvvH_eRV0C1Ge_UHpsLJUbkEWxFfwOKs5FTCwxFXuE5g3hLeFpqYXBrMUhgk2qjH5zW9N1fswej10NuvhOlu7kgqlqhlUyB2eJHlL7UOnoC2jftqXwQB4qGtdbSICm-9kqbHSC1aszQ3bizjbp6gZvD113NrHliJZ6dW1NT0TOv4EJimK8tt62QjcwYreAu5SxJivlnTYZzoqzUabsJrul3XKbQdMUCkLfdCkf_995N_QAPTR0MhpN_zhe49PlY1K-mj7mb-5w1j1IJq7OKw9uil2VGVYvOgxikjVChYDA3vrm3P5ibY9S5QzkE7LZO&sai=AMfl-YQV-Vf2G3oO6DZTMgfBgw6aRb4AQEB8F9gX2u5ouUA6HpDtiF4sRi_-9rYeJpdTHP3uoPH8J3K-xwif1PCroUPtHBoj4uJQKVi32Mw_zxavYCIi7V6d4yM_nK-mQxjD&sig=Cg0ArKJSzFE1G6JrAjioEAE&uach_m=[UACH]&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
dcmads.js
www.googletagservices.com/dcm/ Frame C351
9 KB
4 KB
Script
General
Full URL
https://www.googletagservices.com/dcm/dcmads.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c45a7b49c14477cd160a83d4ee1fb8c311e12314e042d0647c68bec62f16fe29
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:38:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1940
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/ads-dcm-tag
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4486
x-xss-protection
0
last-modified
Mon, 29 Nov 2021 19:29:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="ads-dcm-tag"
vary
Accept-Encoding
report-to
{"group":"ads-dcm-tag","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-dcm-tag"}]}
content-type
text/javascript
cache-control
public, max-age=3600
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:38:42 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame C351
119 KB
36 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
87f7f86b17eacf56e623a69be05e5f5487470d6b30347efe12742aefa3f5af48
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
37305
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1638461285297402"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Fri, 17 Dec 2021 11:11:02 GMT
moatad.js
z.moatads.com/redventuresgamdisplay60805146916/ Frame C351
335 KB
112 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamdisplay60805146916/moatad.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
ec3300dff5a35315ea608c5dc57e965957897133eb6a543533566d6e2c35ed07

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
content-encoding
gzip
last-modified
Thu, 09 Dec 2021 16:36:30 GMT
server
AmazonS3
x-amz-request-id
SXBZ8ADYT77KW7MP
etag
"9c75e5b0c5bc0a53e0cdef53eae89c77"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=15190
accept-ranges
bytes
content-length
114446
x-amz-id-2
Js3u1th+lEwEMVGKInxoBehDmEsPJoYn2GSrvSApeaA9h/kdmOzjLJkUhJKG3pI/I9LMlptFND8=
amp4ads-v0.js
cdn.ampproject.org/rtv/002106010000999/ Frame 390E
263 KB
72 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/002106010000999/amp4ads-v0.js
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:828::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6d71536a398fb0c19b1bd094e26a0b4af1c2f8457cc6e5d412a614379ec5eced
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
595789
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
73001
x-xss-protection
0
server
sffe
date
Fri, 10 Dec 2021 13:41:13 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"38bde45bcd2e102f"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Sat, 10 Dec 2022 13:41:13 GMT
amp-ad-exit-0.1.js
cdn.ampproject.org/rtv/002106010000999/v0/ Frame 390E
12 KB
4 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/002106010000999/v0/amp-ad-exit-0.1.js
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:828::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
affdc6b0347b9b34b4c4467665635bd669f550eba3951956c44c42eb71ebac7f
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
201236
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4370
x-xss-protection
0
server
sffe
date
Wed, 15 Dec 2021 03:17:06 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"d8c8e4c62d819e3e"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 15 Dec 2022 03:17:06 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/002106010000999/v0/ Frame 390E
116 KB
33 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/002106010000999/v0/amp-analytics-0.1.js
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:828::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
7a90dd6c496e0851f05470a22b5ab098c97ee9f14da65788d3dd2dbb3f16204a
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
595789
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
33219
x-xss-protection
0
server
sffe
date
Fri, 10 Dec 2021 13:41:13 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"15276388f3bce85e"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Sat, 10 Dec 2022 13:41:13 GMT
amp-fit-text-0.1.js
cdn.ampproject.org/rtv/002106010000999/v0/ Frame 390E
3 KB
1 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/002106010000999/v0/amp-fit-text-0.1.js
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:828::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e580c58f9ba0eca6fee2ade694595099e2d8f976d207123eb3af3b618e8636de
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
596752
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1228
x-xss-protection
0
server
sffe
date
Fri, 10 Dec 2021 13:25:10 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"4a16c5b782a8330e"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Sat, 10 Dec 2022 13:25:10 GMT
amp-form-0.1.js
cdn.ampproject.org/rtv/002106010000999/v0/ Frame 390E
33 KB
10 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/002106010000999/v0/amp-form-0.1.js
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:828::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
bf9ae7d942acc1f77fe96ebcddf5994046fa710759513662beef4b87f7af78dc
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
237693
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
10555
x-xss-protection
0
server
sffe
date
Tue, 14 Dec 2021 17:09:29 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"1ee41670edd54c0d"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Wed, 14 Dec 2022 17:09:29 GMT
css
fonts.googleapis.com/ Frame 390E
6 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto%3A300%2C400%2C700
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202112021159/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82f::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
2cef3a9d0606aecfe2476867e61f76535b9bb5b8e9d31957cc9504cdd1e69396
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Fri, 17 Dec 2021 09:46:03 GMT
server
ESF
cross-origin-opener-policy
same-origin-allow-popups
date
Fri, 17 Dec 2021 11:11:02 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Fri, 17 Dec 2021 11:11:02 GMT
pixel
protected-by.clarium.io/
68 B
345 B
Image
General
Full URL
https://protected-by.clarium.io/pixel?tag=wt_SjNVWEZlZTF4Y2xZLWJmRmxXaDFtSVpfcGhVLzI4NzA3ODYwNzU6MzAweDI1MA==&v=5&s=v31fn41d4in&sb=-1&h=www.zdnet.com&cb=8631670&d=eyJ3aCI6IlNqTlZXRVpsWlRGNFkyeFpMV0ptUm14WGFERnRTVnBmY0doVkx6STROekEzT0RZd056VTZNekF3ZURJMU1BPT0iLCJ3ZCI6eyJvIjoyODcwNzg2MDc1LCJ3IjoiMzAwIiwiaCI6IjI1MCJ9LCJ3ciI6Mn0=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.127.116.150 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-127-116-150.eu-central-1.compute.amazonaws.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
69539b5b3777cffda28a66d7f2aa9b17c91ee1ec8fd50c00c442af91753a60f7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:11:02 GMT
Server
nginx/1.14.0 (Ubuntu)
Content-Type
image/png
Cache-Control
no-store, no-cache, must-revalidate, max-age=0
Connection
keep-alive
Content-Length
68
Expires
Sat, 26 Jul 1997 05:00:00 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 390E
2 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 16 Dec 2021 20:15:16 GMT
x-content-type-options
nosniff
server
cafe
age
53746
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
content-type
image/png
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Fri, 17 Dec 2021 20:15:16 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 390E
295 B
757 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 05:43:34 GMT
x-content-type-options
nosniff
server
cafe
age
19648
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
content-type
image/png
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Sat, 18 Dec 2021 05:43:34 GMT
adview
securepubads.g.doubleclick.net/pagead/ Frame 390E
0
0
Image
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CwJdARXC8YfesLozx3wO494qoCPm4tNFm5Ku27vkM2tkeEAEg97vHgwFglfrwgYwHoAHV4a3GAsgBCakCb6Gk-uEShT7gAgCoAwHIAwqqBNACT9D65-wGwvBJ7GQIrb7DasMg4kiIdYj7ghOBbtnjkJrvx2516p1lbaJ73dB8f2r_BxKOk6vd1JzQGiWMx0cYtLWb5Zbi8Eo7ePMql4YDILOf_NkZNJJBtOoM7dc9cu_K9Js5PRjYIuUsW47A-plc04kbD8PWBGmHsIzUaQWb9smN-mNuo_mEEc0xcauyU6W7s2YjYdWLrjmAMLoPwLlhjzwwyEgt_AIRZ7YOnGu7bzFuHn2gBeKj7InYbEayFReuWwuDrAUIP4U6gCNGfPxSdlUO9QyNx8oEQpy1cA5NP5VcYQL9lk62a-hSFN7QKLYfUFfIze3-ySuanqVZHloUrvz-R6OQoKvvLE3Yi6wgiPMFs4s8xYNTZiGKYx5yRiPgEjQ_ptfiqwwfK9AE8zMI1i3z3VA83cb_aUctu8tsaYcHyErB4VMbwVRVmTfGvKMBwATCtarYtQPgBAGSBQQIBBgBkgUECAUYBKAGLoAHk57SuQGoB47OG6gHk9gbqAfulrECqAf-nrECqAfVyRuoB6a-G9gHAPIHBBDItkbSCAkIiOGAEBABGB2ACgPICwHYEw2IFAvQFQGAFwGyFx4KHAgAEhRwdWItODgyMDM2MjYwNTcxMTE5NhjJm3o&sigh=-z-twrmanmM&uach_m=[UACH]&template_id=484&uap=UACH(platform)&uapv=UACH(platformVersion)&uaa=UACH(architecture)&uam=UACH(model)&uafv=UACH(uaFullVersion)&uab=UACH(bitness)
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

2076313506083323656
tpc.googlesyndication.com/simgad/10471015775142521416/ Frame 390E
30 KB
30 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/10471015775142521416/2076313506083323656
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
813c9c20a36b63943b54b644327159e20560a1d70c409693db2309270b70ced7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Wed, 15 Dec 2021 16:04:24 GMT
x-content-type-options
nosniff
age
155198
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
30281
x-xss-protection
0
last-modified
Sun, 27 Sep 2020 04:01:32 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
expires
Thu, 15 Dec 2022 16:04:24 GMT
truncated
/ Frame 390E
218 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
051d6b684699b92cf2ad66b2ab8effb5d38fb79aee80768c1e8b423ff10a329c

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/ Frame 390E
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
891bb718ef010ed00641510a6fa0643c2fd9dbfc8637f6ecb062af78f9b03b8d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_HEADER1&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=technology&zMoatAdUnit3=security&wf=1&ra=3&pxm=&sgs=3&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=&t=1639739461755&de=361972376615&rx=365370041675&m=0&ar=8ab009d7785-clean&iw=04a0275&q=12&cb=0&cu=1639739461755&ll=2&lm=0&ln=0&em=0&en=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&zMoatAType=content_article&zMoatTest=zdnet&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&bo=aw-zdnet&bd=security&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&zMoatpos=middle&zMoatvguid=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatptype=article&zMoatsl=mpu-middle%3FLL%7CT-1000&pe=1%3A422%3A422%3A0%3A408&jk=-1&jm=-1&fs=195979&na=1423269467&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:02 GMT
video.high.mp4
clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/ Frame E22D
1 MB
1 MB
Media
General
Full URL
https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.16.107.105 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-16-107-105.deploy.static.akamaitechnologies.com
Software
Apache/2.2.34 /
Resource Hash
2ea6cb8d44b18ddc26d8d83cbb898b780beeebe9d7529fceb1ac1824a397cff4
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Encoding
identity;q=1, *;q=0
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Range
bytes=0-

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Wed, 08 Dec 2021 12:33:46 GMT
server
Apache/2.2.34
access-control-allow-origin
*
x-frame-options
SAMEORIGIN
content-type
video/mp4
Content-Range
bytes 0-1199289/1199290
cache-control
max-age=2592000
Content-Length
1199290
truncated
/ Frame 57C1
299 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
95698b6af45a720fa13415398e77c20504c6ae8bf75e3a462e5aa1f67bc42b11

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
view
securepubads.g.doubleclick.net/pcs/ Frame E22D
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstZqGm9CguBZZUE9F7XLNC5rZB5V4sVXEhxGWawDDumI9myu1rjK23hhwggzho6IzW0qQL2Y4_nHaPhKc6oE7uR3Hq_hsaDaFZH87qhxdk2NtQufCMSZRzH3HZKz7FE_OOnyxRSrQiTc5kMc7EB4Fp8rx8-475VvRbf4M0sQdcGSEOEkiwRW6iTeN4GDKMSghjbyUYi1Rw1xV9Sa43YA_LY0jREeKdR_Bk4q89dTsllcl8STejv1xrGKvh1aGE_3Cdsh692ckC1LBJ03WGRb-pTm71WhWPkA4jjxt9bubGgDBvriWEfM1qxGl8OuPHIDnS1zq0vswi4-NQONYtSkqqzjW0&sai=AMfl-YTMD5yuhMBLOAPwUaExQO2gW0hHPCYLk_h_dSBV-0-vGxycDFYFYcJ2kbD2Dqi6ie80X1QvcZLV2wEhHqLgqW9JHw3IHZ2PdnygPi3tZ8udpv-FTXCX1ZHMqDu1W7E&sig=Cg0ArKJSzEfYOFJGU0_rEAE&uach_m=[UACH]&urlfix=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Fri, 17 Dec 2021 11:11:02 GMT
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=182/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vimpressi... Frame E22D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=182/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vimpression:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
E=vi
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=182/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E22D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=182/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vi
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
store.phtml
ad.clipcentric.com/user-9/resources/ Frame 8AD4
3 KB
3 KB
Document
General
Full URL
https://ad.clipcentric.com/user-9/resources/store.phtml?v200530
Requested by
Host: clipcentric-a.akamaihd.net
URL: https://clipcentric-a.akamaihd.net/ad/B=608/F=1317278/C=603283/P=22/L=21/V=23/ST=1638969311/S=SzkmXuC3/ad.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
65.9.64.127 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-65-9-64-127.fra56.r.cloudfront.net
Software
Apache/2.2.34 /
Resource Hash
81bcd7a6372e5ca7f7d12382fe1787bd4635eede42b3a79da6937c6d2354ed8b

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/

Response headers

content-type
text/html; charset=UTF-8
content-length
2965
date
Mon, 26 Jul 2021 00:31:36 GMT
server
Apache/2.2.34
access-control-allow-origin
*
cache-control
max-age=31536000
x-cache
Hit from cloudfront
via
1.1 58c21e16c9e093deb494fbb4de260efa.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
UdqZP4ju_uuB7R9zwUdUim4ubcXW9QYa-s-xZcyVjw-lQYDIlnKjBA==
age
12479966
truncated
/ Frame 57C1
500 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7b4f05cfd0cd8e216e445b5aec5e9f06573c18cb7adbc0cd785f3a4af3df7cf2

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/ Frame 57C1
807 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ccd7a7e0ecd791d87287f7ebb4f4c3e6fcb0ca72996ee874fc2755b15fb187ef

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
main.gr.19.8.273.js
static.adsafeprotected.com/ Frame E22D
187 KB
60 KB
Script
General
Full URL
https://static.adsafeprotected.com/main.gr.19.8.273.js
Requested by
Host: pixel.adsafeprotected.com
URL: https://pixel.adsafeprotected.com/rjss/st/903347/59128494/skeleton.js?ias_dspID=64
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:211e:9a00:8:48e:53c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
00b3b0b438a1a3e7f01112f487ffb01e64db47935eb0e1e2927bdb4811ee935f

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 10 Dec 2021 17:46:17 GMT
content-encoding
gzip
age
581085
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
x-amz-replication-status
COMPLETED
last-modified
Fri, 10 Dec 2021 17:31:00 GMT
server
AmazonS3
etag
W/"dbbed9b42f871ade260381ef78b0cd71"
vary
Accept-Encoding
x-amz-version-id
RbTKyuj_rScIKJ79M7NB4z2hCQfzt2bN
via
1.1 34435958fa6d40b77fd22fa1c1f56176.cloudfront.net (CloudFront)
cache-control
max-age=315360000
x-amz-cf-pop
FRA56-C2
content-type
application/javascript
x-amz-cf-id
5oJ-ghWNm3iDUsiohyNM-d9BOdnjL5Afa6ABr_-5iJI8sETHz_Lp4w==
impl_v81.js
www.googletagservices.com/dcm/ Frame C351
41 KB
17 KB
Script
General
Full URL
https://www.googletagservices.com/dcm/impl_v81.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/dcm/dcmads.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f3be6ad457ba5d4425f4d105688e9cf5a32595ff156bd290c8ccbe0e6ca3a68a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:38:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1940
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/ads-dcm-tag
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
17189
x-xss-protection
0
last-modified
Mon, 29 Nov 2021 19:28:15 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="ads-dcm-tag"
vary
Accept-Encoding
report-to
{"group":"ads-dcm-tag","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-dcm-tag"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Sat, 17 Dec 2022 10:38:42 GMT
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
fonts.gstatic.com/s/roboto/v29/ Frame 390E
15 KB
16 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v29/KFOlCnqEu92Fr1MmWUlfBBc4.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Roboto%3A300%2C400%2C700
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0eaeadb58e6995ba85eccb6198aaef77eeb1d4b66699e4e1f3fc10eb6adfcdb9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.zdnet.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Tue, 14 Dec 2021 20:07:55 GMT
x-content-type-options
nosniff
age
226987
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15828
x-xss-protection
0
last-modified
Wed, 22 Sep 2021 16:13:28 GMT
server
sffe
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="apps-themes"
expires
Wed, 14 Dec 2022 20:07:55 GMT
KFOlCnqEu92Fr1MmSU5fBBc4.woff2
fonts.gstatic.com/s/roboto/v29/ Frame 390E
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v29/KFOlCnqEu92Fr1MmSU5fBBc4.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Roboto%3A300%2C400%2C700
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
33530b007071281a97e79baab13ddf7cc4b9de942ebd3e212224857335f7cb97
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.zdnet.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Wed, 15 Dec 2021 11:22:37 GMT
x-content-type-options
nosniff
age
172105
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15732
x-xss-protection
0
last-modified
Wed, 22 Sep 2021 16:13:20 GMT
server
sffe
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="apps-themes"
expires
Thu, 15 Dec 2022 11:22:37 GMT
B26699368.318185658;dc_ver=81.236;sz=300x600;u_sd=1;nel=1;dc_adk=545849083;ord=rcygu5;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsuj3Uu1Est7rTJFMEYMwnJiqk7kro5imGFUcvR...
ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/ Frame C351
45 KB
21 KB
Script
General
Full URL
https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318185658;dc_ver=81.236;sz=300x600;u_sd=1;nel=1;dc_adk=545849083;ord=rcygu5;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsuj3Uu1Est7rTJFMEYMwnJiqk7kro5imGFUcvRsbkS89uTmH5AaMILMRFTPHa6UAlCMdTsZ4WqFhWtiF-uqegTNxyFbtMDI-9Mvd-INJSFzzqZG3WooXo6Dv34nIpj_W-B6Lx2gMmnpn9rQHZYi8moWVPhpjDqQy1PO9_XsptUuqXCDRQXJe5O8p5dC-9oAyga26SVXRwnvKRHL284voOCk5cGlPJtX1q5HWqwiIYh60zJTBUdZ9ogWD-S_Io4FCCm6Q0TNMmCERZalXs7x5XVzPpyUbx3DAiF7AzNZrMgMS7JFRUIVx1eItZUa9xjfD_OIS7_phpTh6_dw%26sai%3DAMfl-YQqMsWhhfwa5CrK8GhdrpJY_6mvOVATKxoR5EB1sWM2sw_ify1DMjHtj94izyk9BqzaczWvrzAmYpZHtQdu9HGLNpB_aP8HvowvsUf_kEzmHaF8txsSArFMH4UURN7i%26sig%3DCg0ArKJSzPKQrxv_yRyeEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e$0;xdt=0;crlt=rivGnd50Yq;sttr=80;prcl=s
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/dcm/impl_v81.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
172.217.18.102 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
zrh04s05-in-f102.1e100.net
Software
cafe /
Resource Hash
0d76aadd24e4ca6746047f6d7b6cb67623e3fc473f7818e609ad205424252a18
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
content-encoding
br
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
21884
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
E=fq
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=0/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/Q=f.1_c.1_p.1_l.1_v.1_f... Frame 8AD4
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=0/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/Q=f.1_c.1_p.1_l.1_v.1_fc.1_fp.1_fl.1_cp.1_cl.1_pl.1_pv.1_lv.1/G=17dc81692f4701d0714199e/E=fq
Requested by
Host: ad.clipcentric.com
URL: https://ad.clipcentric.com/user-9/resources/store.phtml?v200530
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://ad.clipcentric.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
skeleton.js
static.adsafeprotected.com/ Frame E22D
Redirect Chain
  • https://pixel.adsafeprotected.com/rfw/st/903347/59128494/skeleton.js?ias_dspID=64&adsafe_url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23...
  • https://static.adsafeprotected.com/skeleton.js
17 B
466 B
Script
General
Full URL
https://static.adsafeprotected.com/skeleton.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Server
2600:9000:211e:9a00:8:48e:53c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
bdeed1e1c0751610c8f3dc2a5c78c93f841c366b36a7f7a54f5e6752c2656c05

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Wed, 07 Jul 2021 08:35:57 GMT
via
1.1 34435958fa6d40b77fd22fa1c1f56176.cloudfront.net (CloudFront)
age
14092506
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
x-amz-replication-status
COMPLETED
content-length
17
last-modified
Mon, 17 Aug 2020 23:54:35 GMT
server
AmazonS3
etag
"53fab767ecbd3bf07990b10246befbd4"
x-amz-version-id
nylqTweorRThFHMBJSrf_fHcWx3KVKN3
cache-control
max-age=315360000
x-amz-cf-pop
FRA56-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
brj2YTHx4UMRwyo--PdFuJP8KSppVW8RoECvaqsYhhd9ZjX7u8brXg==

Redirect headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
x-server-name
app11.ie.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
location
https://static.adsafeprotected.com/skeleton.js
cache-control
no-cache
content-length
0
server
nginx
sca.17.5.12.js
static.adsafeprotected.com/ Frame 4AF6
80 KB
21 KB
Script
General
Full URL
https://static.adsafeprotected.com/sca.17.5.12.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:211e:9a00:8:48e:53c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
233bc983d773cb9a38ca251753bd43f9a2288279fab44598b49c433b32f6d285

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 01 Oct 2021 08:08:31 GMT
content-encoding
gzip
age
6663752
x-amz-server-side-encryption
AES256
x-cache
Hit from cloudfront
x-amz-replication-status
COMPLETED
last-modified
Thu, 19 Aug 2021 16:31:24 GMT
server
AmazonS3
etag
W/"9304f57298c3834ff107ea7ccb547996"
vary
Accept-Encoding
x-amz-version-id
9YodSBhG3Q8HTUbQ_WDUpcPK09tSZ5ja
via
1.1 34435958fa6d40b77fd22fa1c1f56176.cloudfront.net (CloudFront)
cache-control
max-age=315360000
x-amz-cf-pop
FRA56-C2
content-type
application/javascript
x-amz-cf-id
RIhsxphHg2gM_SL66MbPZGDSsf3YYGK2Tza5hg4-Qw3ZwfzwDgOx6A==
omrhp.js
pagead2.googlesyndication.com/pagead/js/r20211207/r20110914/elements/html/ Frame C351
8 KB
4 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20211207/r20110914/elements/html/omrhp.js
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318185658;dc_ver=81.236;sz=300x600;u_sd=1;nel=1;dc_adk=545849083;ord=rcygu5;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsuj3Uu1Est7rTJFMEYMwnJiqk7kro5imGFUcvRsbkS89uTmH5AaMILMRFTPHa6UAlCMdTsZ4WqFhWtiF-uqegTNxyFbtMDI-9Mvd-INJSFzzqZG3WooXo6Dv34nIpj_W-B6Lx2gMmnpn9rQHZYi8moWVPhpjDqQy1PO9_XsptUuqXCDRQXJe5O8p5dC-9oAyga26SVXRwnvKRHL284voOCk5cGlPJtX1q5HWqwiIYh60zJTBUdZ9ogWD-S_Io4FCCm6Q0TNMmCERZalXs7x5XVzPpyUbx3DAiF7AzNZrMgMS7JFRUIVx1eItZUa9xjfD_OIS7_phpTh6_dw%26sai%3DAMfl-YQqMsWhhfwa5CrK8GhdrpJY_6mvOVATKxoR5EB1sWM2sw_ify1DMjHtj94izyk9BqzaczWvrzAmYpZHtQdu9HGLNpB_aP8HvowvsUf_kEzmHaF8txsSArFMH4UURN7i%26sig%3DCg0ArKJSzPKQrxv_yRyeEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e$0;xdt=0;crlt=rivGnd50Yq;sttr=80;prcl=s
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:803::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
9db8a678d1681c1c4a3f15e1769c3f54d96f126db4a7b00cea65127c820a7763
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:09:06 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
116
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
3140
x-xss-protection
0
server
cafe
etag
17163059639670574047
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Fri, 31 Dec 2021 11:09:06 GMT
view
googleads4.g.doubleclick.net/pcs/ Frame C351
0
524 B
Ping
General
Full URL
https://googleads4.g.doubleclick.net/pcs/view?xai=AKAOjsvnAPKIWINkqNZ-ad5Sbp7uoV-sbSchNBbcCQxEJx8XoPZcCek4FPlDyYFFUAcXndkI2wrR-VZLYZzjN9JNwwLoVJ5ivLuv_Ygt2eKysL66gv9c4HSsVGjbo-gjT3p4ec9qD-qdeTZupMEXF5MW62Vv&sig=Cg0ArKJSzJuCsMAUkH5QEAE&uach_m=[UACH]&cry=1&fbs_aeid=[gw_fbsaeid]&urlfix=1&omid=0&rm=1&ctpt=0&cbvp=1&cstd=0&cisv=r20211207.37895&adurl=
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318185658;dc_ver=81.236;sz=300x600;u_sd=1;nel=1;dc_adk=545849083;ord=rcygu5;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsuj3Uu1Est7rTJFMEYMwnJiqk7kro5imGFUcvRsbkS89uTmH5AaMILMRFTPHa6UAlCMdTsZ4WqFhWtiF-uqegTNxyFbtMDI-9Mvd-INJSFzzqZG3WooXo6Dv34nIpj_W-B6Lx2gMmnpn9rQHZYi8moWVPhpjDqQy1PO9_XsptUuqXCDRQXJe5O8p5dC-9oAyga26SVXRwnvKRHL284voOCk5cGlPJtX1q5HWqwiIYh60zJTBUdZ9ogWD-S_Io4FCCm6Q0TNMmCERZalXs7x5XVzPpyUbx3DAiF7AzNZrMgMS7JFRUIVx1eItZUa9xjfD_OIS7_phpTh6_dw%26sai%3DAMfl-YQqMsWhhfwa5CrK8GhdrpJY_6mvOVATKxoR5EB1sWM2sw_ify1DMjHtj94izyk9BqzaczWvrzAmYpZHtQdu9HGLNpB_aP8HvowvsUf_kEzmHaF8txsSArFMH4UURN7i%26sig%3DCg0ArKJSzPKQrxv_yRyeEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e$0;xdt=0;crlt=rivGnd50Yq;sttr=80;prcl=s
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
dvtp_src.js
cdn.doubleverify.com/ Frame C351
8 KB
4 KB
Script
General
Full URL
https://cdn.doubleverify.com/dvtp_src.js?ctx=3758893&cmp=26699368&sid=5755331&plc=318185658&num=&adid=&advid=9640137&adsrv=1&btreg=510963286&btadsrv=doubleclick&crt=160251313&crtname=&chnl=&unit=&pid=&uid=&tagtype=&dvtagver=6.1.src
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318185658;dc_ver=81.236;sz=300x600;u_sd=1;nel=1;dc_adk=545849083;ord=rcygu5;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsuj3Uu1Est7rTJFMEYMwnJiqk7kro5imGFUcvRsbkS89uTmH5AaMILMRFTPHa6UAlCMdTsZ4WqFhWtiF-uqegTNxyFbtMDI-9Mvd-INJSFzzqZG3WooXo6Dv34nIpj_W-B6Lx2gMmnpn9rQHZYi8moWVPhpjDqQy1PO9_XsptUuqXCDRQXJe5O8p5dC-9oAyga26SVXRwnvKRHL284voOCk5cGlPJtX1q5HWqwiIYh60zJTBUdZ9ogWD-S_Io4FCCm6Q0TNMmCERZalXs7x5XVzPpyUbx3DAiF7AzNZrMgMS7JFRUIVx1eItZUa9xjfD_OIS7_phpTh6_dw%26sai%3DAMfl-YQqMsWhhfwa5CrK8GhdrpJY_6mvOVATKxoR5EB1sWM2sw_ify1DMjHtj94izyk9BqzaczWvrzAmYpZHtQdu9HGLNpB_aP8HvowvsUf_kEzmHaF8txsSArFMH4UURN7i%26sig%3DCg0ArKJSzPKQrxv_yRyeEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e$0;xdt=0;crlt=rivGnd50Yq;sttr=80;prcl=s
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00:286::4469 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Microsoft-IIS/10.0 /
Resource Hash
3ce4399c5078ca5cea592b3eaf5eadeb4e8e0ca168468bb5ceb3122bc83a6bbd

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:11:02 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Dec 2021 19:20:31 GMT
Server
Microsoft-IIS/10.0
ETag
"80a9affdb1f2d71:0"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=900
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
3291
UFYwWwmt.js
tpc.googlesyndication.com/sodar/ Frame C351
41 KB
15 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/UFYwWwmt.js
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318185658;dc_ver=81.236;sz=300x600;u_sd=1;nel=1;dc_adk=545849083;ord=rcygu5;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsuj3Uu1Est7rTJFMEYMwnJiqk7kro5imGFUcvRsbkS89uTmH5AaMILMRFTPHa6UAlCMdTsZ4WqFhWtiF-uqegTNxyFbtMDI-9Mvd-INJSFzzqZG3WooXo6Dv34nIpj_W-B6Lx2gMmnpn9rQHZYi8moWVPhpjDqQy1PO9_XsptUuqXCDRQXJe5O8p5dC-9oAyga26SVXRwnvKRHL284voOCk5cGlPJtX1q5HWqwiIYh60zJTBUdZ9ogWD-S_Io4FCCm6Q0TNMmCERZalXs7x5XVzPpyUbx3DAiF7AzNZrMgMS7JFRUIVx1eItZUa9xjfD_OIS7_phpTh6_dw%26sai%3DAMfl-YQqMsWhhfwa5CrK8GhdrpJY_6mvOVATKxoR5EB1sWM2sw_ify1DMjHtj94izyk9BqzaczWvrzAmYpZHtQdu9HGLNpB_aP8HvowvsUf_kEzmHaF8txsSArFMH4UURN7i%26sig%3DCg0ArKJSzPKQrxv_yRyeEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e$0;xdt=0;crlt=rivGnd50Yq;sttr=80;prcl=s
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5056305b09ad6474ea540f796c79be51d6b8e96043cb3d7bc4ef774e56765f4f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:51:36 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1166
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15207
x-xss-protection
0
last-modified
Tue, 03 Mar 2020 20:15:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
vary
Accept-Encoding
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 17 Dec 2022 10:51:36 GMT
4217474214653602766
s0.2mdn.net/simgad/ Frame C351
35 KB
35 KB
Image
General
Full URL
https://s0.2mdn.net/simgad/4217474214653602766
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.18.102 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
zrh04s05-in-f102.1e100.net
Software
sffe /
Resource Hash
436e47e341227f4837eb6cd70da448b5e1a355a8c886a423219acf77f8016c19
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Wed, 15 Dec 2021 23:46:36 GMT
x-content-type-options
nosniff
age
127466
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35579
x-xss-protection
0
last-modified
Fri, 29 Oct 2021 16:28:28 GMT
server
sffe
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
expires
Thu, 15 Dec 2022 23:46:36 GMT
truncated
/ Frame C351
219 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9629393daf7aaa9811fe799d56e9b3929f22958f16838fa569ffbe7177942aec

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_DISPLAY1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x600&zMoatPS=top&zMoatSZPS=300x600%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&t=1639739462491&de=207033120451&m=0&ar=cc97a930ec1-clean&iw=101177c&q=16&cb=0&ym=0&cu=1639739462491&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=5029661432%3A2929336068%3A5821501893%3A138370174589&zMoatW=300&zMoatH=600&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatSN=a&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&gw=redventuresgamdisplay60805146916&fd=1&ac=1&it=500&ti=0&ih=1&pe=1%3A422%3A422%3A0%3A408&iq=na&tt=na&tu=&tp=&jk=-1&jm=-1&fs=195926&na=2120552515&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:02 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=4&fi=1&apd=7&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370174589&S1id=22308610192&S2id=22654085702&ord=1639739462491&r=207033120451&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=1&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:02 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=4&fi=1&apd=7&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370174589&S1id=22308610192&S2id=22654085702&ord=1639739462491&r=207033120451&t=fv&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=2&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:02 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=4&fi=1&apd=7&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370174589&S1id=22308610192&S2id=22654085702&ord=1639739462491&r=207033120451&t=nht&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=3&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:02 GMT
dt
dt.adsafeprotected.com/
43 B
216 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=487cadf7-1844-da76-8043-d39dee1a12e4&tv=%7Bc:x3eTwS,pingTime:-2,time:214,type:a,im:%7Bsf:0,pom:1,prf:%7BbdA:6,bdZ:145,beA:297,beZ:298,mfA:397,cmA:399,inA:399,inZ:402,prA:402,prZ:406,si:412,poA:413,poZ:425,cmZ:425,mfZ:425,loA:451,loZ:453,ltA:510,ltZ:510%7D%7D,sca:%7Bdfp:%7Bdf:0%7D%7D,env:%7Bgca:false,cca:false,gca2:false%7D,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:114%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:214,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:114,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B111~100%5D,as:%5B111~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:0,fm:sRQDG2g+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C16%7C17,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs,slid:%5Bgoogle_ads_iframe_/22309610186/aw-zdnet/technology/security_0,google_ads_iframe_/22309610186/aw-zdnet/technology/security_0__container__,nav-ad-plus-leader%5D,sinceFw:97,readyFired:true%7D&br=u
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
44.237.128.222 Boardman, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-44-237-128-222.us-west-2.compute.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
x-server-name
dt17.or.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
E=ls:on%20scroll%20full%20collapse.1
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=438/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E22D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=438/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=ls:on%20scroll%20full%20collapse.1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
truncated
/ Frame C14C
801 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2b526196d510bc11f40effba13f1b9e1792120b1f40b453695e8d7dcc05cf38d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/svg+xml
view
googleads4.g.doubleclick.net/pcs/ Frame C351
0
23 B
Ping
General
Full URL
https://googleads4.g.doubleclick.net/pcs/view?xai=AKAOjsvnAPKIWINkqNZ-ad5Sbp7uoV-sbSchNBbcCQxEJx8XoPZcCek4FPlDyYFFUAcXndkI2wrR-VZLYZzjN9JNwwLoVJ5ivLuv_Ygt2eKysL66gv9c4HSsVGjbo-gjT3p4ec9qD-qdeTZupMEXF5MW62Vv&sig=Cg0ArKJSzJuCsMAUkH5QEAE&uach_m=[UACH]&cry=1&fbs_aeid=[gw_fbsaeid]&urlfix=1&omid=0&rm=1&ctpt=96&vt=11&dtpt=96&dett=2&cstd=0&cisv=r20211207.37895&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0.&adurl=
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N1153793.3518201CBSINTERACTIVEUK/B26699368.318185658;dc_ver=81.236;sz=300x600;u_sd=1;nel=1;dc_adk=545849083;ord=rcygu5;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjsuj3Uu1Est7rTJFMEYMwnJiqk7kro5imGFUcvRsbkS89uTmH5AaMILMRFTPHa6UAlCMdTsZ4WqFhWtiF-uqegTNxyFbtMDI-9Mvd-INJSFzzqZG3WooXo6Dv34nIpj_W-B6Lx2gMmnpn9rQHZYi8moWVPhpjDqQy1PO9_XsptUuqXCDRQXJe5O8p5dC-9oAyga26SVXRwnvKRHL284voOCk5cGlPJtX1q5HWqwiIYh60zJTBUdZ9ogWD-S_Io4FCCm6Q0TNMmCERZalXs7x5XVzPpyUbx3DAiF7AzNZrMgMS7JFRUIVx1eItZUa9xjfD_OIS7_phpTh6_dw%26sai%3DAMfl-YQqMsWhhfwa5CrK8GhdrpJY_6mvOVATKxoR5EB1sWM2sw_ify1DMjHtj94izyk9BqzaczWvrzAmYpZHtQdu9HGLNpB_aP8HvowvsUf_kEzmHaF8txsSArFMH4UURN7i%26sig%3DCg0ArKJSzPKQrxv_yRyeEAE%26fbs_aeid%3D%5Bgw_fbsaeid%5D%26urlfix%3D1%26adurl%3D;uach=%5B%22%22%2C%22%22%2C%22%22%2C%22%22%2C%22%22%2C%5B%5D%2Cnull%2Cnull%2C%22%22%5D;dc_rfl=1,https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e$0;xdt=0;crlt=rivGnd50Yq;sttr=80;prcl=s
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
view
securepubads.g.doubleclick.net/pcs/ Frame C351
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvx2HEO8g_3WUkuQmx9vxz4hQvpoRhkIeWTmDHvaZaZTvhkj_O39VRFpz0LI_h6qfF9K1DoRop8UV7c6ZKWmqOg7ifrJRh7kuprOG-UdrcQ3Tk4FGFu--jTowLmv3qQ-GW8WZQdoY7oA_yfpKfWVLa4sss3mVCULz9KuVnhlhNxG-EyvHDrPhShiQcS3UrOnlxE6j6PaJkJa2MxuP4RsS-qbUqZLX3UuDo0juIvCrx3V81Bd0vC6hh9q4k4K0LcfIX95eXFqna7DDBVPfmIlGfbkZapEZOsg1uSHjx45SsGEDWEzSqnbZBhmVMS9fOM3-6svSWz1RDLkUwlGzNTv3U&sai=AMfl-YT7UHi63mQUFhF3svA7tT9VFfviWgrnWvuQMRXXl4-7q0riWUtGB1tOHSf5pu7-efku3rR8B7blwj4gdjmwtykZ05Q4ciTrv0v39taeFEMSg0-qr6rYYHOUuVuFr1Pb&sig=Cg0ArKJSzHNExZw6oSM4EAE&uach_m=[UACH]&urlfix=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.185.66 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s48-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:11:02 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Fri, 17 Dec 2021 11:11:02 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x600&zMoatPS=top&zMoatSZPS=300x600%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2Fs0.2mdn.net%2Fsimgad%2F4217474214653602766&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-2RlMhkIJ33QxUrdGk7NYu%2BFfHV3eib89DkRB2436S0SxzRtAIyeo1MnKlpdMQlJdIBr9&rs=1-z0tp6wlWekwLgg%3D%3D&sc=1&os=1-jA%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&pcode=redventuresgamheader644747280705&rx=365370041675&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&f=0&j=&t=1639739462491&de=207033120451&cu=1639739462491&m=18&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2820&le=1&lf=0&lg=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A422%3A422%3A0%3A408&as=0&ag=4&an=0&gf=4&gg=0&ix=4&ic=4&ez=1&aj=1&pg=100&pf=0&ib=1&cc=0&bw=4&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=7&cd=0&ah=7&am=0&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370174589&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=600&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatSN=a&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DOMSEARCH&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=3&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=173276361&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:02 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=19&fi=1&apd=38&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739462066&r=511221084480&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=1&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:02 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=19&fi=1&apd=38&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739462066&r=511221084480&t=fv&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=2&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:02 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=19&fi=1&apd=38&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739462066&r=511221084480&t=nht&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=3&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:02 GMT
dv-measurements1950.js
cdn.doubleverify.com/ Frame 90BF
490 KB
89 KB
Script
General
Full URL
https://cdn.doubleverify.com/dv-measurements1950.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00:286::4469 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Microsoft-IIS/10.0 /
Resource Hash
88343b81dd1c646160dcf8856b77f8d7e12334fa17a9ae39c1a6958b134a1b25

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:11:02 GMT
Content-Encoding
gzip
Last-Modified
Wed, 15 Dec 2021 11:38:54 GMT
Server
Microsoft-IIS/10.0
ETag
"01b9356a8f1d71:0"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=946080900
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
91099
Enqz_20U.html
tpc.googlesyndication.com/sodar/ Frame 3B21
22 KB
8 KB
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/UFYwWwmt.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
127ab3ff6d14112ae6aa40b68d9d3144748eda08efbc60a48a5be0555cf8622b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
timing-allow-origin
*
content-length
8395
date
Fri, 17 Dec 2021 10:51:37 GMT
expires
Sat, 17 Dec 2022 10:51:37 GMT
last-modified
Tue, 03 Mar 2020 20:15:00 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1165
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2Fwww.zdnet.com%2F%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-2RlMhkIJ33QxUrdGk7NYu%2BFfHV3eib89DkRB2436S0SxzRtAIyeo1MnKlpdMQlJdIBr9&rs=1-z0tp6wlWekwLgg%3D%3D&sc=1&os=1-jA%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&pcode=redventuresgamheader644747280705&rx=365370041675&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&f=0&j=&t=1639739462066&de=511221084480&cu=1639739462066&m=521&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=2901&le=1&lf=0&lg=1&lh=26&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A422%3A422%3A0%3A408&as=0&ag=19&an=0&gf=19&gg=0&ix=19&ic=19&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=19&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=38&cd=0&ah=38&am=0&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatSN=a&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=3&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=97560971&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:02 GMT
E=fq
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=512/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/Q=f.1_c.1_p... Frame 8AD4
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=512/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/Q=f.1_c.1_p.1_l.1_v.1_fc.1_fp.1_fl.1_fr.1_cp.1_cl.1_pl.1_pv.1_lv.1/G=17dc81692f4701d0714199e/E=fq
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://ad.clipcentric.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:02 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
b_8rsBg2pSAE7OSEuXeXkmKAJRzK7XLbOE8Wp2RNR2Q.js
pagead2.googlesyndication.com/bg/ Frame 3B21
35 KB
13 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/bg/b_8rsBg2pSAE7OSEuXeXkmKAJRzK7XLbOE8Wp2RNR2Q.js
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:803::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6fff2bb01836a52004ece484b97797926280251ccaed72db384f16a7644d4764
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 10:43:33 GMT
content-encoding
br
x-content-type-options
nosniff
age
1649
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/botguard-scs
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13622
x-xss-protection
0
last-modified
Mon, 06 Dec 2021 19:18:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="botguard-scs"
vary
Accept-Encoding
report-to
{"group":"botguard-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/botguard-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Sat, 17 Dec 2022 10:43:33 GMT
visit.js
tps.doubleverify.com/ Frame 90BF
2 KB
2 KB
Script
General
Full URL
https://tps.doubleverify.com/visit.js?gdpr=&gdpr_consent=&ttmms=56&ttfrms=24&bridua=3&tstype=2&eparams=DC4FC%3Dl9EEADTbpTauTauHHH%5DK5%3F6E%5D4%40%3ETau2CE%3A4%3D6TauDFDA64E65%5C%3AC2%3F%3A2%3F%5C924%3C6CD%5CE2C86E%5C2%3AC%3D%3A%3F6%5CH%3AE9%5C%3F6H%5C324%3C5%40%40CTauTab7E28Tbs%23%24%2432773egTdrF__b69EEADTbpTauTauE%5D4%40Tauq%3Ab%3Dv%3E%3ApCsTdrF__b4Tau6TdrF__b6U2%3F4r92%3A%3Fl9EEADTbpTauTauHHH%5DK5%3F6E%5D4%40%3ETar9EEADTbpTauTauHHH%5DK5%3F6E%5D4%40%3E&srcurlD=0&aUrlD=0&ssl=https:&dfs=272&ddur=75&uid=1639739462666748&jsCallback=dvCallback_1639739462666526&dvtagver=6.1.src&navUa=Mozilla%2F5.0%20(Windows%20NT%2010.0%3B%20Win64%3B%20x64)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F96.0.4664.93%20Safari%2F537.36&htmlmsging=1&chro=0&hist=2&winh=1200&winw=1600&wouh=1200&wouw=1600&scah=1200&scaw=1600&dvp_isOnHead=1&jsver=1950&tgjsver=1950&lvvn=28&m1=13&refD=1&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F&fwc=0&fcl=1803&flt=15&fec=753&fcifrms=7&brh=2&sdf=2&dvp_epl=356&noc=4&ctx=3758893&cmp=26699368&sid=5755331&plc=318185658&crt=160251313&btreg=510963286&btadsrv=doubleclick&adsrv=1&advid=9640137&errorURL=https://tps.doubleverify.com/visit.jpg&mib=0&dvp_rcp=2&dvp_htec=2&dvp_seem=2&dvp_tuk=1&dvp_sukv=84236749.4072805&dvp_tukv=36347148.42868375&dvp_uuid=181113725758.46185&dvp_tuid=439850023414
Requested by
Host: cdn.doubleverify.com
URL: https://cdn.doubleverify.com/dv-measurements1950.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
34.149.12.213 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
213.12.149.34.bc.googleusercontent.com
Software
/
Resource Hash
ac89211ae51e3a02ed935ea51c9c82b88be480ffd34d62a215ef1a3cab11e221

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:11:02 GMT
Cache-Control
max-age=0
Connection
keep-alive
Content-Type
text/javascript
Transfer-Encoding
chunked
Expires
12/16/2021 11:11:02
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=212&fi=1&apd=215&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370174589&S1id=22308610192&S2id=22654085702&ord=1639739462491&r=207033120451&t=hdn&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=4&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:02 GMT
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=487cadf7-1844-da76-8043-d39dee1a12e4&tv=%7Bc:x3eTAr,time:435,type:e,im:%7Bimprf:%7Bttecl:564,ecd:8,tsecr:104%7D%7D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:435,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:114,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B332~100%5D,as:%5B332~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:0,fm:sRQDG2g+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C16%7C17,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs%7D&br=u
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
44.237.128.222 Boardman, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-44-237-128-222.us-west-2.compute.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
x-server-name
dt19.or.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=185&fi=1&apd=204&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739462066&r=511221084480&t=hdn&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=4&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:02 GMT
gen_204
pagead2.googlesyndication.com/pagead/ Frame 3B21
0
20 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar&v=30&t=2&bgai=BSfp6RnC8YZWlGKSl9u8Px-K5oAYAAAAAOAHgBAI&bg=!i4iliMzNAAZKWFskSlg7ACkAdvg8WhscP66Tz3637jk6RozIP_yS8k06KDiV9bCKv_uuXaENXy46cAIAAABYUgAAAApoAQcKAAZbT4-lND2ZAsDloddYnpQlj7Q0wBPZdSVDrk5HOf0vD0Z9YbIOlQvPUmFaQPHQmoOp8Xfl-Lv13C0aepK2d9JHcZTH0kE-I_Hc6EG2HzC0JVvtvrrr5rQCGgCS-WsPWNVhGNH7mDjQLWSzVB-xbhh_cAk0gwRtX_1mYEwbqA7cJwzvkQ_y3WLm08TSk5V8ud9T_ME2C50SBAF4dAH81qze0Ab-6aCxVYPx_gHAxx3UwSAEyv-h4Tg2FAoGfCT4MywxSxdX45RqdN9mXt2iOem2JE856Ny-YZr_pjmrndXJ4uwoEOKTyeK12VddsjUK4RiJFYzhpcCpBbBjS-QoNIuT1mvbTXfraPwfauO4b_BgeBxh-rEYtIjeMZScvomo11kQ_1Ta5HS05dj3G--qNBpnp6wuOPumg1G8oSySYnxr1xuN2w-Rfg-ntyG2Y3EFrIb_Omz2k8FkxVtZ2b6scmSyk82ClVpba-EJ00ITZ5jc4uoPy8C_zmxBUJibZrBuc4PCxYQrEBQBU3n_aFBheS5UNifMe40cgjjZSu5lsgJbPEmDaCPchlDq4s6z0cHrzUvLOrvF-nDdVALDzJdqeqGsbe8nwmiHoDR_eM-LAi8SkwV_671jNBEbksx66iXUJh25xWldxEK29w4mzuv1iYOO_OuK9MA5Vk89Ldv_ogkvAfSHVU4JIzowDXBfBpXfBlai8w-QdJK4Y-joUw8BkLr6E96OOHq0qyu-XYWlJ8y6zkVjP7b4_Z_gj-JNa0Wbq-5hObf3CK5Elw2toKXRSDkAbSLa95--J6G3ZKqf5KJsGTUrH7Fxq3EOsNnzjq-cDKfyxyPiRIaAJz8qps5rzenkproEWBXfU1zLATAEO0QuCGZnmjpmplf5VIzumkTy1UOWu3KDAn7NHELMzz6Uy0pgT1c_F3EHw70AjZCXoQJOGvZNrEU_qt9mEQ
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:803::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=487cadf7-1844-da76-8043-d39dee1a12e4&tv=%7Bc:x3eTC0,pingTime:-10,time:532,type:s,mvn:ZnNjPTEyLHNkPTMsbm89OCxhc3A9MQ--,sd:MTcuNS4xMnYxMjAwfHwxNjAwfHwxfHwxfHwyNHx8MTIwMHx8MHx8MHx8MXx8bGFuZHNjYXBlLXByaW1hcnl8fDI0fHw0LzN8fDQvM3x8MHx8MTYwMA--,no:MTcuNS4xMnZNb3ppbGxhfHxOZXRzY2FwZXx8bnx8bnx8MHx8bnx8TGludXggeDg2XzY0fHxHZWNrb3x8MjAwMzAxMDd8fDB8fE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IFdpbjY0OyB4NjQpIEFwcGxlV2ViS2l0LzUzNy4zNiAoS0hUTUwsIGxpa2UgR2Vja28pIENocm9tZS85Ni4wLjQ2NjQuOTMgU2FmYXJpLzUzNy4zNnx8MXx8MXx8R29vZ2xlIEluYy58fG4-,ch:n,fsc:17.5.12v220002022000220000022002220000022220200000222200022220002022022022222202002220222022222022222000220200000022220222220222222222222202222222222222222222222222222222222222200000022022020020000002022202022022022222222000000000020222202022022222000000020000000000000000000020220202220000022200222202220022200200222022202220022202220020222202000220000222202222202222000002002002222222202220022202200022002220222202,asp:1639739462832%7C%7C113afa1623f9d7536d970045464957a7%7C%7Ca2fdad25d911a8a4b39828759d282361%7C%7Cfe4ff661a0b7c55e3deac86688be8786%7C%7C6545176dbbbc2a194a18f304aeb88649%7C%7C427f295cbdfb868537aba190a7a2bdec%7C%7C0f151823d840f891e7d098caa31776b5%7C%7C100605ad459c1b09f7398a125eae3330%7C%7C1629390669%7D
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
44.237.128.222 Boardman, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-44-237-128-222.us-west-2.compute.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:02 GMT
x-server-name
dt18.or.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
nr-spa-1212.min.js
js-agent.newrelic.com/
44 KB
17 KB
Script
General
Full URL
https://js-agent.newrelic.com/nr-spa-1212.min.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.66.137 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ebfe453394ff1be6ef75d380ab7c5535aea0b51832d045f0d5d0ef7e6535969c

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

x-amz-version-id
wY72Ah.NJX5KzzqRFK3uhSo3Jh07tDe4
content-encoding
gzip
etag
"8bd93bf0ecb2f4e971a2055a41402bb6"
x-amz-request-id
MZ8B93V9FC71F9AG
x-cache
HIT
cross-origin-resource-policy
cross-origin
content-length
16636
x-amz-id-2
fK1GGx9jZRe6bSsNT8pOQHJj01RPTwCXAjYHu6NrgD9teo20XDkaCG+objQkIQTRPaZKGkt1d7s=
x-served-by
cache-cdg20760-CDG
last-modified
Thu, 04 Nov 2021 21:16:16 GMT
server
AmazonS3
x-timer
S1639739463.099227,VS0,VE0
date
Fri, 17 Dec 2021 11:11:03 GMT
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish
cache-control
public, max-age=7200, stale-if-error=604800
accept-ranges
bytes
x-cache-hits
3913
sodar
pagead2.googlesyndication.com/getconfig/
11 KB
8 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2021120601&st=env
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:803::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0c08f8b1de4a6a0badeeedcaba3423e8b43265ae6ca480307706f29f32ce92fb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 Dec 2021 11:11:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
8592
x-xss-protection
0
/
www.zdnet.com/components/breaking-news/xhr/
1 KB
1 KB
XHR
General
Full URL
https://www.zdnet.com/components/breaking-news/xhr/?slug=breaking-news-banner
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
309c7f77b36ad8f0ecb6278afb0cf7bf91f525b2053ab757246a07e2879fe32d
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

X-NewRelic-ID
VgEBVlJWCRAGXVRVDwMDUlc=
tracestate
78034@nr=0-1-2767451-695782612-15fc15594a5e9f2b----1639739463075
traceparent
00-d4f0d29de4382bc42d648c57db75bd00-15fc15594a5e9f2b-01
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
newrelic
eyJ2IjpbMCwxXSwiZCI6eyJ0eSI6IkJyb3dzZXIiLCJhYyI6IjI3Njc0NTEiLCJhcCI6IjY5NTc4MjYxMiIsImlkIjoiMTVmYzE1NTk0YTVlOWYyYiIsInRyIjoiZDRmMGQyOWRlNDM4MmJjNDJkNjQ4YzU3ZGI3NWJkMDAiLCJ0aSI6MTYzOTczOTQ2MzA3NSwidGsiOiI3ODAzNCJ9fQ==
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
X-Requested-With
XMLHttpRequest

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 17 Dec 2021 10:39:22 GMT
vary
Accept-Encoding, User-Agent
x-xss-protection
1; mode=block
referrer-policy
no-referrer-when-downgrade
x-newrelic-app-data
PxQFVlBUDAYBR1dbAgYPVFAFBRFORDQHUjZKA1ZLVVFHDFYPbU5yARBfWA86TFtcXRQODFJfQzkGQ1NSCQ8NBW8MXRVLGhgCHVUJUQFRH1JKBgNVVFMUHgFIQ1YCUAEDVQkPCwEEU1oEWgFAFF5VXkAAZA==
x-frame-options
SAMEORIGIN
date
Fri, 17 Dec 2021 11:11:03 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
a6077814-46a4-4843-9a18-ba9b22285dde
content-type
application/json
via
1.1 varnish
cache-control
max-age=5400, private
accept-ranges
bytes
expires
Fri, 17 Dec 2021 12:09:22 GMT
track-cwv-72dfb3ae38-rev.js
www.zdnet.com/a/fly/js/components/
239 B
336 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/track-cwv-72dfb3ae38-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
9b7909cb9edd007095b41a13617b66208e4210fff9c5e411a7db116efefc8e71
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:03 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
199
x-xss-protection
1; mode=block
last-modified
Wed, 15 Dec 2021 17:45:18 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"a5d265f628012577e91fdf890dd49e32"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 22 Dec 2021 22:42:12 GMT
author-modal-d55d4e857c-rev.js
www.zdnet.com/a/fly/js/components/
573 B
424 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/author-modal-d55d4e857c-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
06c00948dd5d4c3109c9e00bb6c44938e1251feae65e2b7c2591f333ab230d9b
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:03 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
311
x-xss-protection
1; mode=block
last-modified
Thu, 09 Dec 2021 14:54:39 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"4da97158326b0293b09b6a931c98a1e3"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Mon, 20 Dec 2021 15:22:57 GMT
disqus-loader-17293b5282-rev.js
www.zdnet.com/a/fly/js/components/
1 KB
886 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/disqus-loader-17293b5282-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
0aee86f10613d80ea0542d89047ea3467747db993379daeb592178ebf943b534
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:03 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
684
x-xss-protection
1; mode=block
last-modified
Thu, 16 Dec 2021 16:41:54 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"0e5249bb6266844bc758597168d6931a"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 23 Dec 2021 17:11:52 GMT
core-web-vitals-16efe3ae21-rev.js
www.zdnet.com/a/fly/js/managers/
545 B
488 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/managers/core-web-vitals-16efe3ae21-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
82f947d14a0a198dfe3cec2fde7896f6e332eb798cc193dad8da9ed2225277cd
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:03 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
366
x-xss-protection
1; mode=block
last-modified
Tue, 14 Dec 2021 16:02:01 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"456e04f37a1b5aa7af3e4f05d7a26227"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 21 Dec 2021 18:20:57 GMT
sodar2.js
tpc.googlesyndication.com/sodar/
17 KB
6 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
61c32059a5e94075a7ecff678b33907966fc9cfa384daa01aa057f872da14dbb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
etag
"1637097310169751"
vary
Accept-Encoding
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
6386
x-xss-protection
0
expires
Fri, 17 Dec 2021 11:11:03 GMT
show-hide-1.0-2b8cfc35ab-rev.js
www.zdnet.com/a/fly/js/components/
2 KB
778 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/show-hide-1.0-2b8cfc35ab-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
1a703d617fb31d56238372d5bf78e9861b3a09b7447a0184bd5f1c178461ed12
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:03 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
710
x-xss-protection
1; mode=block
last-modified
Thu, 09 Dec 2021 14:54:39 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"dd7ef257baebb2315958ebdd4603472f"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Mon, 20 Dec 2021 15:22:57 GMT
E=wi
tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=1004/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/ Frame E22D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317278/C=603283/P=22/L=21/V=23/S=juS5un2z/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=1004/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=wi
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:03 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
NRBR-a22c617a7b2aab2da1c
bam-cell.nr-data.net/1/
49 B
711 B
Script
General
Full URL
https://bam-cell.nr-data.net/1/NRBR-a22c617a7b2aab2da1c?a=695782443&v=1212.e95d35c&to=NgYBNkBYWEEEAURQWg9MIgFGUFlcSgNCTVwCDwY9QVBYVQkH&rst=2431&ck=1&ref=https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/&ap=167&be=346&fe=2364&dc=409&af=err,xhr,stn,ins,spa&perf=%7B%22timing%22:%7B%22of%22:1639739460687,%22n%22:0,%22f%22:0,%22dn%22:0,%22dne%22:15,%22c%22:15,%22s%22:21,%22ce%22:57,%22rq%22:57,%22rp%22:322,%22rpe%22:348,%22dl%22:326,%22di%22:408,%22ds%22:408,%22de%22:408,%22dc%22:2363,%22l%22:2363,%22le%22:2375%7D,%22navigation%22:%7B%7D%7D&fp=421&fcp=421&at=GkEWQAhCSx5HAxIDThwe&jsonp=NREUM.setToken
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.147 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a83848cf5c3d96caefe490c19e41659609b3691dd4c531cf925016c084d8e1b0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Date
Fri, 17 Dec 2021 11:11:03 GMT
Content-Encoding
gzip
CF-Cache-Status
DYNAMIC
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, HEAD, OPTIONS
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Transfer-Encoding
chunked
Cross-Origin-Resource-Policy
cross-origin
Connection
keep-alive
access-control-allow-credentials
true
CF-Ray
6befb55caa5d691b-FRA
runner.html
tpc.googlesyndication.com/sodar/sodar2/225/ Frame EF51
13 KB
5 KB
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80e::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
55a119c0394f901a8a297e109c17b5e5402689708b999ab10691c16179f32a4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-length
5046
date
Fri, 17 Dec 2021 10:54:44 GMT
expires
Sat, 17 Dec 2022 10:54:44 GMT
last-modified
Mon, 21 Jun 2021 20:47:05 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
979
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
aframe
www.google.com/recaptcha/api2/ Frame DA8C
783 B
1 KB
Document
General
Full URL
https://www.google.com/recaptcha/api2/aframe
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82b::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
095fa79d5761966fc5e2a5326f9562a76311d6dbe700770dc5b15e06d07920c3
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-SYFSRckzEAgJ2JtxX5RYUw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/

Response headers

cross-origin-resource-policy
cross-origin
cross-origin-embedder-policy
require-corp
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
expires
Fri, 17 Dec 2021 11:11:03 GMT
date
Fri, 17 Dec 2021 11:11:03 GMT
cache-control
private, max-age=300
content-type
text/html; charset=utf-8
content-security-policy
script-src 'report-sample' 'nonce-SYFSRckzEAgJ2JtxX5RYUw' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
514
server
GSE
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
EnZy1JEvhtfL3qsMHM2VNqoz8zWnsWCdOjk5wdd4Ig4.js
pagead2.googlesyndication.com/bg/ Frame EF51
35 KB
13 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/bg/EnZy1JEvhtfL3qsMHM2VNqoz8zWnsWCdOjk5wdd4Ig4.js
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:803::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
127672d4912f86d7cbdeab0c1ccd9536aa33f335a7b1609d3a3939c1d778220e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Thu, 16 Dec 2021 13:32:44 GMT
content-encoding
br
x-content-type-options
nosniff
age
77899
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/botguard-scs
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13555
x-xss-protection
0
last-modified
Mon, 06 Dec 2021 19:18:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="botguard-scs"
vary
Accept-Encoding
report-to
{"group":"botguard-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/botguard-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Fri, 16 Dec 2022 13:32:44 GMT
sodar
pagead2.googlesyndication.com/pagead/ Frame DA8C
0
0
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/sodar?id=sodar2&v=225&li=gpt_2021120601&jk=3201054786090293&rc=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:803::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.google.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

activeview
pagead2.googlesyndication.com/pcs/ Frame E22D
42 B
64 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstao7vIYCj3gqPqGQvux-yqToggHr8xSwk0JfzgTmIwGLQij88bNwmsu13szVZDVzhkKnhCYyfptp6PT6NyDPggNY7yF305PGvf0HVykzDveHjFPgyZ&sig=Cg0ArKJSzAjob41wLT13EAE&id=lidar2&mcvt=1010&p=0,0,105,1600&mtos=1010,1010,1010,1010,1010&tos=1010,0,0,0,0&v=20211202&bin=7&avms=nio&bs=1600,1200&mc=1&app=0&itpl=19&adk=3529097836&rs=4&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&vs=4&r=v&rst=1639739462003&rpt=267&isd=0&lsd=0&met=mue&wmsd=0
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:803::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
gen_204
pagead2.googlesyndication.com/pagead/
0
20 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=225&t=2&li=gpt_2021120601&jk=3201054786090293&bg=!FRalFlLNAAZKWFskSlg7ACkAdvg8WjF2I66VxKqkSKyrwbM-E_dP9weq8G1miJNPbiX95m9AGWjePAIAAABrUgAAAAtoAQcKAKSfcDwNJzZjPBpv3FokS-C6QlGBqWU_75orPMc6WUX-3w_KDz3lloy9ajI3G11z6rAlirQxnNGy2W6kzqFn11NRg_EUkLDR64gqg9w2m8GhJtytYiCuubwQI8IHY6qcg8AmwELugemmZul3xthn_Lso3gGPEZXIhbGHc4EJm8keQGEpVEUt3AryBADJ5-h6GUtkfR8Py3d7WHNlOeDa4CUsfhj9LJkCsIbf8_O3mr7ZSz57sPqMiCpSRLAE-gMkNhiAoeqBqCDCub2XvtWMrEyuXjg_9FjDRgdl4aulz7Jj6bakyTeoUZxTnC4oC6tE3YCsw2DZnwKikuHGynpOlDEXIcKfy9P5Ij4nNaoH6Gb11nT5wFrM0pJMGpVF82guQidhmPxEhya7mxvnEKkwtQMePxDotASzK_rs10lB9-X_MNxsevVbFqwOOeNVQLtEyzILXGdR4s3XruFAoyOb5-o3UyBzDvv1iV_4_pCFAOBEr7ACaw2UPTG6I3fc_ljrqfEyf2iWGMOMXPk4JF2N2XSwakvElLPYRxMhKCwrbhaUZzWzywh2tWkmKbicUbzzC953WixU3TGwVna3MpgUPKvxLsuksG7FvB_1eAhf4o8-M-J_HGWU3x0SwG_TJMUD0IH6qORGu3jMBMfixvgSv1LnabZvhg97TMjhgHNeoWduptL9EsrU-0lbj19T3PBWOjl-xRaBRAFKEbEWrs545guhnj-Uyc6jDiquhgokAux5qXYBapS11ACTg921sRHG6FxBkcDqqg-4p9Xc_qR9Hg5KCIpPqhnRNuKnwrCob0yW1F5XD7I6Wfd6ykgxjiqPElupaOvFHzYrsdK7V7m7GSNPfMcQT65g9oN2sh9ieXJxoBRKt6h1FLw1PVcwL4ch9I-5ENGKoqFkdeGhd4YgMBRrQMNhDnbA4_Buyqi1dnA9z6rPgv3wLWoQOFXvAK-DqAlGgQXN_RtYeUXxxrQM3Tgo5MnSbp2vIbRW4ZQo1yGKO2lKI_tVIny5sgAXZi7qcoRgXUMKMxJcviGAEfovb54lC9q0_yFfVoEZyoSm1qE7aom8Defs3VMPkNvbG2pSHiFVnp5pAJPGAyTaexFj8SfVG2PYY4vZI7YahCSvJKmzeaEoE5XR4gw
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:803::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=487cadf7-1844-da76-8043-d39dee1a12e4&tv=%7Bc:x3eTM2,pingTime:1,time:1154,type:p,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:114%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:1154,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:114,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B1052~100%5D,as:%5B1052~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:315,fm:sRQDG2g+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C16%7C17,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
44.237.128.222 Boardman, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-44-237-128-222.us-west-2.compute.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
x-server-name
dt11.or.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=487cadf7-1844-da76-8043-d39dee1a12e4&tv=%7Bc:x3eTM3,pingTime:1,time:1155,type:pf,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:114%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:1155,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:114,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B1052~100%5D,as:%5B1052~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:315,fm:sRQDG2g+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C16%7C17,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
44.237.128.222 Boardman, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-44-237-128-222.us-west-2.compute.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
x-server-name
dt15.or.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x600&zMoatPS=top&zMoatSZPS=300x600%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-2RlMhkIJ33QxUrdGk7NYu%2BFfHV3eib89DkRB2436S0SxzRtAIyeo1MnKlpdMQlJdIBr9&rs=1-z0tp6wlWekwLgg%3D%3D&sc=1&os=1-jA%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&pcode=redventuresgamheader644747280705&rx=365370041675&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&f=0&j=&t=1639739462491&de=207033120451&cu=1639739462491&m=1028&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3017&le=1&lf=0&lg=1&lh=60&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A422%3A422%3A2375%3A408&as=1&ag=1020&an=4&gi=1&gf=1020&gg=4&ix=1020&ic=1020&ez=1&ck=1020&kw=822&aj=1&pg=100&pf=100&ib=1&cc=1&bw=1020&bx=4&ci=1020&jz=822&dj=1&aa=0&ad=912&cn=0&gk=707&gl=0&ik=707&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=822&cd=7&ah=822&am=7&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370174589&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=600&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatSN=a&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=2117645913&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:03 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=822&tet=1020&fi=1&apd=1023&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5029661432&L2id=2929336068&L3id=5821501893&L4id=138370174589&S1id=22308610192&S2id=22654085702&ord=1639739462491&r=207033120451&t=iv&os=1&fi2=0&div1=1&ait=0&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=top&zMoatPT=article&zMoatSL=mpu-plus-top%3FLL%7CT-1000&moatClientSlicer3=0&bedc=1&q=5&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:03 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x600&zMoatPS=top&zMoatSZPS=300x600%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-2RlMhkIJ33QxUrdGk7NYu%2BFfHV3eib89DkRB2436S0SxzRtAIyeo1MnKlpdMQlJdIBr9&rs=1-z0tp6wlWekwLgg%3D%3D&sc=1&os=1-jA%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&pcode=redventuresgamheader644747280705&rx=365370041675&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&f=0&j=&t=1639739462491&de=207033120451&cu=1639739462491&m=1029&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3017&le=1&lf=0&lg=1&lh=60&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A422%3A422%3A2375%3A408&as=1&ag=1020&an=1020&gi=1&gf=1020&gg=1020&ix=1020&ic=1020&ez=1&ck=1020&kw=822&aj=1&pg=100&pf=100&ib=1&cc=1&bw=1020&bx=1020&ci=1020&jz=822&dj=1&aa=0&ad=912&cn=912&gk=707&gl=707&ik=707&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=822&cd=822&ah=822&am=822&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370174589&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=600&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatSN=a&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1865033363&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:03 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame C351
42 B
64 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstuqQG-sTCWteoQ6R7yorI0EFgcAdZ_v1FSkR4aX_Hw6bT900NAuArgvyDCu_eoeC1AolyX_wXn-zY3pHkF7VgCSXXeHIICwRc&sig=Cg0ArKJSzGauzqSxlCD6EAE&id=lidar2&mcvt=1000&p=0,0,600,300&mtos=854,1000,1000,1000,1000&tos=854,146,0,0,0&v=20211202&bin=7&avms=nio&bs=1600,1200&mc=1&app=0&itpl=32&adk=545849083&rs=6&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&vs=4&r=v&rst=1639739462193&rpt=370&wmsd=0
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:803::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame C351
42 B
64 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuAnHPEKRnQVjcFjiYtmuYm8Jagv2n5QGaUPdVf689n7cPkwXw3fucFlJiAxt3XQ3IvyZ9doYs4NWECmldjw03iLCXbgnvVi3AJicDvgPswqFIhPtIO&sig=Cg0ArKJSzOLwHhTwB7K5EAE&id=lidar2&mcvt=1002&p=455,1050,1055,1350&mtos=856,1002,1002,1002,1002&tos=856,146,0,0,0&v=20211202&bin=7&avms=nio&bs=1600,1200&mc=1&app=0&itpl=19&adk=1139850431&rs=4&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIl0%3D&vs=4&r=v&rst=1639739462193&rpt=368&isd=0&lsd=0&met=ie&wmsd=0
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:803::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x600&zMoatPS=top&zMoatSZPS=300x600%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-2RlMhkIJ33QxUrdGk7NYu%2BFfHV3eib89DkRB2436S0SxzRtAIyeo1MnKlpdMQlJdIBr9&rs=1-z0tp6wlWekwLgg%3D%3D&sc=1&os=1-jA%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&pcode=redventuresgamheader644747280705&rx=365370041675&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&f=0&j=&t=1639739462491&de=207033120451&cu=1639739462491&m=1030&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3017&le=1&lf=0&lg=1&lh=60&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A422%3A422%3A2375%3A408&as=1&ag=1020&an=1020&gi=1&gf=1020&gg=1020&ix=1020&ic=1020&ez=1&ck=1020&kw=822&aj=1&pg=100&pf=100&ib=1&cc=1&bw=1020&bx=1020&ci=1020&jz=822&dj=1&aa=0&ad=912&cn=912&gk=707&gl=707&ik=707&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=822&cd=822&ah=822&am=822&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370174589&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=600&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatSN=a&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=298070550&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:03 GMT
NRBR-a22c617a7b2aab2da1c
bam-cell.nr-data.net/resources/1/
36 B
514 B
XHR
General
Full URL
https://bam-cell.nr-data.net/resources/1/NRBR-a22c617a7b2aab2da1c?a=695782443&v=1212.e95d35c&to=NgYBNkBYWEEEAURQWg9MIgFGUFlcSgNCTVwCDwY9QVBYVQkH&rst=2894&ck=1&ref=https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/&st=1639739460687&at=GkEWQAhCSx5HAxIDThwe
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.147 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1d3fcb90ebbb13da390040b292565fb84943a15169868929d6e1b21a8004e3bb

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
content-type
text/plain

Response headers

Date
Fri, 17 Dec 2021 11:11:04 GMT
CF-Cache-Status
DYNAMIC
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, HEAD, OPTIONS
Content-Type
text/plain
Access-Control-Allow-Origin
https://www.zdnet.com
access-control-allow-credentials
true
Connection
keep-alive
CF-Ray
6befb55f6a21691b-FRA
Content-Length
36
NRBR-a22c617a7b2aab2da1c
bam-cell.nr-data.net/events/1/
24 B
501 B
XHR
General
Full URL
https://bam-cell.nr-data.net/events/1/NRBR-a22c617a7b2aab2da1c?a=695782443&v=1212.e95d35c&to=NgYBNkBYWEEEAURQWg9MIgFGUFlcSgNCTVwCDwY9QVBYVQkH&rst=2925&ck=1&ref=https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.147 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c9cf152a0ad00d4f102c93c613c104914be5517ac8f8e0831727f8bfbe8b300

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
content-type
text/plain

Response headers

Date
Fri, 17 Dec 2021 11:11:03 GMT
CF-Cache-Status
DYNAMIC
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, HEAD, OPTIONS
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
access-control-allow-credentials
true
Connection
keep-alive
CF-Ray
6befb55fb8875caa-FRA
Content-Length
24
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x600&zMoatPS=top&zMoatSZPS=300x600%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-2RlMhkIJ33QxUrdGk7NYu%2BFfHV3eib89DkRB2436S0SxzRtAIyeo1MnKlpdMQlJdIBr9&rs=1-z0tp6wlWekwLgg%3D%3D&sc=1&os=1-jA%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&pcode=redventuresgamheader644747280705&rx=365370041675&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&f=0&j=&t=1639739462491&de=207033120451&cu=1639739462491&m=1234&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3017&le=1&lf=0&lg=1&lh=60&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A422%3A422%3A2375%3A408&as=1&ag=1227&an=1020&gi=1&gf=1227&gg=1020&ix=1227&ic=1227&ez=1&ck=1020&kw=822&aj=1&pg=100&pf=100&ib=1&cc=1&bw=1227&bx=1020&ci=1020&jz=822&dj=1&aa=1&ad=1119&cn=912&gk=914&gl=707&ik=914&co=1119&cp=1023&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1023&cd=822&ah=1023&am=822&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370174589&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=600&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatSN=a&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=5&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1100166954&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:03 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-2RlMhkIJ33QxUrdGk7NYu%2BFfHV3eib89DkRB2436S0SxzRtAIyeo1MnKlpdMQlJdIBr9&rs=1-z0tp6wlWekwLgg%3D%3D&sc=1&os=1-jA%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&pcode=redventuresgamheader644747280705&rx=365370041675&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&f=0&j=&t=1639739462066&de=511221084480&cu=1639739462066&m=1694&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3017&le=1&lf=0&lg=1&lh=26&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A422%3A422%3A2375%3A408&as=1&ag=1195&an=19&gi=1&gf=1195&gg=19&ix=1195&ic=1195&ez=1&ck=1195&kw=1013&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1195&bx=19&ci=1195&jz=1013&dj=1&aa=1&ad=1093&cn=0&gn=1&gk=1093&gl=0&ik=1093&co=1093&cp=1013&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1013&cd=38&ah=1013&am=38&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatSN=a&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1786681475&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:03 GMT
pixel.gif
redventuresgamdisplay60805146916.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamdisplay60805146916.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=1013&tet=1195&fi=1&apd=1214&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5029899480&L2id=2942419878&L3id=5840893800&L4id=138375198164&S1id=22308610192&S2id=22654085702&ord=1639739462066&r=511221084480&t=iv&os=1&fi2=0&div1=1&ait=0&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatPS=nav&zMoatPT=article&zMoatSL=nav-ad-plus-leader%3FT-1000&moatClientSlicer3=0&bedc=1&q=5&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:03 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-2RlMhkIJ33QxUrdGk7NYu%2BFfHV3eib89DkRB2436S0SxzRtAIyeo1MnKlpdMQlJdIBr9&rs=1-z0tp6wlWekwLgg%3D%3D&sc=1&os=1-jA%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&pcode=redventuresgamheader644747280705&rx=365370041675&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&f=0&j=&t=1639739462066&de=511221084480&cu=1639739462066&m=1695&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3017&le=1&lf=0&lg=1&lh=26&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A422%3A422%3A2375%3A408&as=1&ag=1195&an=1195&gi=1&gf=1195&gg=1195&ix=1195&ic=1195&ez=1&ck=1195&kw=1013&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1195&bx=1195&ci=1195&jz=1013&dj=1&aa=1&ad=1093&cn=1093&gn=1&gk=1093&gl=1093&ik=1093&co=1093&cp=1013&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1013&cd=1013&ah=1013&am=1013&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatSN=a&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1471671966&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:03 GMT
/
684dd331.akstat.io/
0
354 B
Ping
General
Full URL
https://684dd331.akstat.io/
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:6c00:287::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Fri, 17 Dec 2021 11:11:03 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Fri, 17 Dec 2021 11:11:03 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-2RlMhkIJ33QxUrdGk7NYu%2BFfHV3eib89DkRB2436S0SxzRtAIyeo1MnKlpdMQlJdIBr9&rs=1-z0tp6wlWekwLgg%3D%3D&sc=1&os=1-jA%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&pcode=redventuresgamheader644747280705&rx=365370041675&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&f=0&j=&t=1639739462066&de=511221084480&cu=1639739462066&m=1695&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3017&le=1&lf=0&lg=1&lh=26&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A422%3A422%3A2375%3A408&as=1&ag=1195&an=1195&gi=1&gf=1195&gg=1195&ix=1195&ic=1195&ez=1&ck=1195&kw=1013&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1195&bx=1195&ci=1195&jz=1013&dj=1&aa=1&ad=1093&cn=1093&gn=1&gk=1093&gl=1093&ik=1093&co=1093&cp=1013&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1013&cd=1013&ah=1013&am=1013&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatSN=a&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=4&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1076761251&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:03 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:03 GMT
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=1782/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogres... Frame E22D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=1782/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogress_1:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:03 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
event.png
tpsc-eu3.doubleverify.com/ Frame 90BF
0
254 B
Ping
General
Full URL
https://tpsc-eu3.doubleverify.com/event.png?impid=c229d267ed3b4a8a84bf27f2bbdd7fbd&gdpr=&gdpr_consent=&vdur=89&eoid=8&msrjs=1950&nav_pltfrm=Linux%20x86_64&sdf=2&vit=2&isvelg=1&tltms=75&tetms=7&msltms=37&vltms=89&sei=290&vetms=8&engms=1&engisel=1&ttfurm=2120&mpt=1639739464765328
Requested by
Host: cdn.doubleverify.com
URL: https://cdn.doubleverify.com/dv-measurements1950.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
34.149.12.213 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
213.12.149.34.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Access-Control-Allow-Origin
https://www.zdnet.com
Pragma
no-cache
Date
Fri, 17 Dec 2021 11:11:04 GMT
Cache-Control
max-age=0
Access-Control-Allow-Credentials
true
Connection
keep-alive
Expires
12/16/2021 11:11:04
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=3282/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogres... Frame E22D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=3282/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogress_2:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:05 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
event.png
tpsc-eu3.doubleverify.com/ Frame 90BF
0
254 B
Ping
General
Full URL
https://tpsc-eu3.doubleverify.com/event.png?impid=c229d267ed3b4a8a84bf27f2bbdd7fbd&gdpr=&gdpr_consent=&msrcanlm=394&msrcannum=4&eoid=10&ismms=35&isumms=34&isvelg=1&nvr=6&elmtp=3&isbxdms=2134&b11=2229&adhgt=600&adwdth=300&norwdth=300&norhgt=600&engisel=1&vsos=9&dvp_vsosnmr=16&dvp_mvpw=device-width&dvp_mvpiss=0&lftb=2229&sftb=2229&msrdp=5&naral=2&vct=1&vphgt=1200&vpwdth=1600&chgt=600&cwdth=300&invcs=false&scrhgt=1200&scrwdth=1600&strp=100&advisonl=true&isiabvms=934&isuiabvms=934&ispmxpms=934&iscvmvms=1934&engalms=33&engscrlms=634&dvp_hdnAd=0&dvp_pageEng=true&dvp_dpr=1&mpt=1639739465764827
Requested by
Host: cdn.doubleverify.com
URL: https://cdn.doubleverify.com/dv-measurements1950.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
34.149.12.213 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
213.12.149.34.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Access-Control-Allow-Origin
https://www.zdnet.com
Pragma
no-cache
Date
Fri, 17 Dec 2021 11:11:05 GMT
Cache-Control
max-age=0
Access-Control-Allow-Credentials
true
Connection
keep-alive
Expires
12/16/2021 11:11:05
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=4082/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogres... Frame E22D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=4082/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogress_2p5:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:06 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
video.high.mp4
tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=4782/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogres... Frame E22D
35 B
159 B
Image
General
Full URL
https://tr.clipcentric.com/s/B=608/F=1317287/R=1317278/C=603283/P=22/L=21/V=23/S=kL7ZXeAW/Z=1/I=114.257899.1639739462106/U=www.zdnet.com/T=4782/M=i/D=d/PO=zdnet.com/LO=5840893800/VO=138375198164/E=vprogress_3:video%20auto/!https://clipcentric-a.akamaihd.net/video/F=1317287/V=ad_800x450_w1220_ch0/T=1638966209/S=ZR41Wf5d/video.high.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.9.44 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-6-9-44.compute-1.amazonaws.com
Software
Apache/2.2.34 /
Resource Hash
6c63cc5063ac82d8bbc925f9a31adf3a87f1510c021e0fde51854d60484b5019
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

date
Fri, 17 Dec 2021 11:11:06 GMT
cache-control
no-cache
server
Apache/2.2.34
content-length
35
x-frame-options
SAMEORIGIN
content-type
image/gif
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=487cadf7-1844-da76-8043-d39dee1a12e4&tv=%7Bc:x3eUOy,pingTime:5,time:5154,type:p,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:114%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:5154,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:114,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B5051~100%5D,as:%5B5051~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:180,fm:sRQDG2g+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C16%7C17,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
44.237.128.222 Boardman, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-44-237-128-222.us-west-2.compute.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:07 GMT
x-server-name
dt13.or.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
dt
dt.adsafeprotected.com/
43 B
215 B
Image
General
Full URL
https://dt.adsafeprotected.com/dt?advEntityId=903347&asId=487cadf7-1844-da76-8043-d39dee1a12e4&tv=%7Bc:x3eUOz,pingTime:5,time:5155,type:pf,clog:%5B%7Bpiv:100,vs:i,r:,w:1600,h:105,t:114%7D%5D,es:0,sc:1,ha:1,fif:0,gmnp:0,for:1,b11:1,cnod:1,gm:0,slTimes:%7Bi:5155,o:0,n:0,pp:0,pm:0%7D,slEvents:%5B%7Bsl:i,t:114,wc:0.0.1600.1200,ac:0.0.1600.105,am:i,cc:0.0.1600.105,piv:100,obst:0,th:0,reas:,bkn:%7Bpiv:%5B5052~100%5D,as:%5B5052~1600.105%5D%7D%7D%5D,slEventCount:1,em:true,fr:true,e:,tt:rjss,dtt:180,fm:sRQDG2g+11%7C12%7C13%7C14%7C15*.903347-59128494%7C151%7C152%7C153%7C154%7C155%7C156%7C16%7C17,idMap:15*,rmeas:1,rend:1,renddet:IMG.qs%7D&br=u
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
44.237.128.222 Boardman, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-44-237-128-222.us-west-2.compute.amazonaws.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:07 GMT
x-server-name
dt12.or.303net.net
p3p
CP="COM NAV INT STA NID OUR IND NOI"
cache-control
no-cache
content-type
image/gif
content-length
43
server
nginx
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=300x600&zMoatPS=top&zMoatSZPS=300x600%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=0&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-2RlMhkIJ33QxUrdGk7NYu%2BFfHV3eib89DkRB2436S0SxzRtAIyeo1MnKlpdMQlJdIBr9&rs=1-z0tp6wlWekwLgg%3D%3D&sc=1&os=1-jA%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&pcode=redventuresgamheader644747280705&rx=365370041675&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&f=0&j=&t=1639739462491&de=207033120451&cu=1639739462491&m=5053&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3017&le=1&lf=0&lg=1&lh=60&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A422%3A422%3A2375%3A408&as=1&ag=5044&an=1227&gi=1&gf=5044&gg=1227&ix=5044&ic=5044&ez=1&ck=1020&kw=822&aj=1&pg=100&pf=100&ib=1&cc=1&bw=5044&bx=1227&ci=1020&jz=822&dj=1&aa=1&ad=4936&cn=1119&gn=1&gk=4731&gl=914&ik=4731&co=1119&cp=1023&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4847&cd=1023&ah=4847&am=1023&xd=00&rf=0&re=0&wb=2&cl=0&at=0&d=5029661432%3A2929336068%3A5821501893%3A138370174589&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=300&zMoatH=600&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatSN=a&zMoatSL=mpu-plus-top%3FLL%7CT-1000&zMoatMMV_MAX=na&zMoatSlotId=mpu-plus-top&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=mpu-plus-top&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=5&jm=-1&tz=mpu-plus-top&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=1213374323&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:07 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:07 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&ra=1&pxm=&sgs=3&bo=22308610192&bp=22654085702&bd=undefined&zMoatNotCnet=true&zMoatPT=article&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatPS=nav&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAType=content_article&zMoatTest=zdnet&zMoatAB=content_article-zdnet&vb=6&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_DISPLAY1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5BvmjrG%3DH%3C%5B*C%24GTK%3BatASYUby%3D(tN%23V.x%3Bm_Qrw5.W%2F84VKp%40i6AKx!f%3EUYoo813_xB%2CN22Ib%40aFB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-2RlMhkIJ33QxUrdGk7NYu%2BFfHV3eib89DkRB2436S0SxzRtAIyeo1MnKlpdMQlJdIBr9&rs=1-z0tp6wlWekwLgg%3D%3D&sc=1&os=1-jA%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&pcode=redventuresgamheader644747280705&rx=365370041675&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=105&w=1600&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&id=1&ii=4&f=0&j=&t=1639739462066&de=511221084480&cu=1639739462066&m=5513&ar=cc97a930ec1-clean&iw=101177c&cb=0&ym=0&rd=1&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3017&le=1&lf=0&lg=1&lh=26&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&pe=1%3A422%3A422%3A2375%3A408&as=1&ag=5014&an=1195&gi=1&gf=5014&gg=1195&ix=5014&ic=5014&ez=1&ck=1195&kw=1013&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5014&bx=1195&ci=1195&jz=1013&dj=1&aa=1&ad=4912&cn=1093&gn=1&gk=4912&gl=1093&ik=4912&co=1093&cp=1013&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4832&cd=1013&ah=4832&am=1013&xd=00&rf=0&re=0&wb=2&cl=0&at=0&d=5029899480%3A2942419878%3A5840893800%3A138375198164&gw=redventuresgamdisplay60805146916&zMoatOrigSlicer1=22308610192&zMoatOrigSlicer2=22654085702&dfp=0%2C1&la=22654085702&zMoatW=5&zMoatH=5&zMoatVGUID=9487de12-bee9-4d31-b847-f48a000d5a28&zMoatSN=a&zMoatSL=nav-ad-plus-leader%3FT-1000&zMoatMMV_MAX=na&zMoatSlotId=nav-ad-plus-leader&zMoatCURL=zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor&zMoatDev=Desktop&zMoatDfpSlotId=nav-ad-plus-leader&hv=clipcentric&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&jk=5&jm=-1&tz=nav-ad-plus-leader&iq=na&tt=na&tu=&tp=&tc=0&fs=195926&na=283578462&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 Dec 2021 11:11:07 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Fri, 17 Dec 2021 11:11:07 GMT

Verdicts & Comments Add Verdict or Comment

134 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4 object| 5 object| 6 object| 7 object| NREUM object| newrelic function| __nr_require object| cbsoptanon object| soastaTracking object| ZdnetPageVars string| chsn_post_id string| chsn_pageType object| ZdnetFunctions number| BOOMR_lstart object| _sf_async_config number| _sf_startpt object| _cbq object| knownServiceWorkers object| BidBarrel function| uuidv4 object| webVitals function| UUIDv4 string| __tealium_data_guid object| utag_data string| key function| loadMyFinance string| _cbsotstate function| requirejs function| require function| define object| OneTrustStub string| OnetrustActiveGroups string| OptanonActiveGroups object| dataLayer object| BOOMR object| BOOMR_mq object| regeneratorRuntime object| mf function| iFrameResize string| MYFI_SCRIPT_FOLDER function| initializeMyFinance function| requestMyFinanceAds function| initializeInline function| requestInlineAds boolean| MF_OVERWRITE_CONTAINER object| MF_DEBUG_URL object| mfEmbed boolean| mfInitialized string| _mfuuid_ function| $ function| jQuery object| Modernizr function| jsonFeed string| chsn_ad_id number| BOOMR_configt number| _sf_endpt object| otStubData object| CryptoJS object| mPulseApp object| core object| pbjs object| _pbjsGlobals object| adFlow object| googletag object| confiant object| Optanon object| OneTrust object| _bmrEvents object| ggeac object| google_js_reporting_queue undefined| easyXDM object| AudEng object| URS object| _Cohesion object| _Preamp object| _Fuse object| _Tagular function| cohesion function| preamp function| fuse function| tagular object| adsbygoogle undefined| google_measure_js_timing object| viacbs_at function| blankAdCallback function| CbsMoatListener function| moatYieldReady function| setMoatPrebidData object| googleToken object| googleIMState function| processGoogleToken number| google_unique_id object| gaGlobal function| Waypoint object| __Cohesion object| _Taggy object| _Monarch function| monarch object| debug object| jQuery18302433596579420474 undefined| ct undefined| et undefined| hourElapsed undefined| msg undefined| pixelDomain undefined| isDomless undefined| documentReferrer undefined| isBeta undefined| viewHash undefined| tagType undefined| pxSrc undefined| moat_px object| Moat#G26 object| MoatSuperV26 object| MoatNadoAllJsonpRequest_28152823 object| Moat#PML#26#1.2 boolean| Moat#EVA object| DOMlessLLDcallback_28152823 object| MoatDataJsonpRequest_28152823 object| moatPrebidApi function| confiantDfpWrap boolean| isPxlSent object| goog_ddm_ps number| BOOMR_onload object| $tealium boolean| searchOpen string| pageType string| waypointContextKey object| GoogleGcLKhOms object| google_image_requests

29 Cookies

Domain/Path Name / Value
www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor Name: pv
Value: 1
www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor Name: zdnet_ad
Value: %7B%22type%22%3A%22gpt%22%2C%22region%22%3A%22aw%22%2C%22subses%22%3A%222%22%2C%22session%22%3A%22a%22%7D
.zdnet.com/ Name: nemo_highlander
Value: seamless:1:b
.zdnet.com/ Name: fly_geo
Value: {"countryCode": "de"}
.zdnet.com/ Name: fly_device
Value: desktop
.zdnet.com/ Name: fly_preferred_edition
Value: eu
.zdnet.com/ Name: fly_default_edition
Value: eu
www.zdnet.com/ Name: _mfuuid_
Value: 9e6c1770-80c5-4fa8-a3b5-83d98baa291e
.zdnet.com/ Name: OptanonConsent
Value: isIABGlobal=false&datestamp=Fri+Dec+17+2021+11%3A11%3A01+GMT%2B0000+(GMT)&version=6.20.0&hosts=&consentId=00ece176-d68e-4f38-a367-29be9f5126f7&interactionCount=0&landingPath=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fsuspected-iranian-hackers-target-airline-with-new-backdoor%2F%23ftag%3DRSSbaffb68%5Cu003ehttps%3A%2F%2Ft.co%2FBi3lGmiArD%5Cu003c%2Fe%5Cu003e&groups=C0001%3A1%2CC0002%3A0%2CC0003%3A0%2CC0004%3A0
.zdnet.com/ Name: arrowImp
Value: true
.zdnet.com/ Name: arrowImpCnt
Value: 1
.zdnet.com/ Name: zdnetSessionStarted
Value: true
.zdnet.com/ Name: zdnetSessionCount
Value: 1
.www.zdnet.com/ Name: chsn_cnsnt
Value: tglr_ref%2Ctglr_req%2Ctglr_sess_id%2Ctglr_sess_count%2Ctglr_anon_id%2Ctglr_tenant_id%2Ctglr_virtual_ref%2Ctglr_transit_id%2Cchsn_dcsn_cache%2Cpmpdid%2Cpmpredirected%2Cpmpredir%2Cfuseid%2Ccohsn_xs_id%2Cchsn_auth_id%2ChashID%2CetagID%2CreinforcedID%2ChttpOnlyID%2CfpID%2CflID%2Ctglr_smpl%2Ctglr_reinforce%2Ctglr_gpc_sess_id%2Ctglr_hash_id
.www.zdnet.com/ Name: tglr_tenant_id
Value: src_1kYsAcdpfzbZ8UlNLYht1RPg3m2
.www.zdnet.com/ Name: tglr_transit_id
Value: b6be2178-3811-4ad5-894b-ec50ca5f2509
.www.zdnet.com/ Name: tglr_sess_id
Value: 68d9b7fb-15d4-4cae-a024-c551daa68a58
.www.zdnet.com/ Name: tglr_sess_count
Value: 1
.www.zdnet.com/ Name: tglr_req
Value: https://www.zdnet.com/article/suspected-iranian-hackers-target-airline-with-new-backdoor/#ftag=RSSbaffb68\u003ehttps://t.co/Bi3lGmiArD\u003c/e\u003e
.www.zdnet.com/ Name: tglr_ref
Value:
.www.zdnet.com/ Name: tglr_anon_id
Value: 157a65b1-e604-487b-a7bc-ee430f6d45a9
.cohesionapps.com/ Name: cohsn_xs_id
Value: fa8de462-c771-4eac-b67f-99d29842235a
.doubleclick.net/ Name: IDE
Value: AHWqTUkMrlbvVZrGbZFR4aNd6G9coE2xWf7lrCmh0AOkRN6eU3wNh4Mh6XBe9Prj8N4
.www.zdnet.com/ Name: cohsn_xs_id
Value: fa8de462-c771-4eac-b67f-99d29842235a
.doubleclick.net/ Name: test_cookie
Value: CheckForPermission
.zdnet.com/ Name: __gads
Value: ID=91ab9f65d7d63c15-22a3ce2e0acd0057:T=1639739461:S=ALNI_MYAuPd0Lf_IU8ZlcisMtearCaD4_A
www.zdnet.com/ Name: viewGuid
Value: 9487de12-bee9-4d31-b847-f48a000d5a28
.zdnet.com/ Name: RT
Value: "z=1&dm=zdnet.com&si=6c72b620-e497-4550-9e71-f9f78704c952&ss=kxaajdcf&sl=1&tt=1tz&bcn=%2F%2F684dd331.akstat.io%2F&ld=20h"
.nr-data.net/ Name: JSESSIONID
Value: 28a12ee23e7247ed

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

02179915.akstat.io
684dd331.akstat.io
9156d071107c7ebb6fe2f6c2d881c783.safeframe.googlesyndication.com
a.myfidevs.io
ad.clipcentric.com
ad.doubleclick.net
adservice.google.com
adservice.google.de
at.adtech.redventures.io
bam-cell.nr-data.net
c.go-mpulse.net
cdn.ampproject.org
cdn.cohesionapps.com
cdn.cookielaw.org
cdn.doubleverify.com
clipcentric-a.akamaihd.net
confiant-integrations.global.ssl.fastly.net
dt.adsafeprotected.com
fonts.googleapis.com
fonts.gstatic.com
geo.moatads.com
geolocation.onetrust.com
googleads4.g.doubleclick.net
ingest.make.rvapps.io
js-agent.newrelic.com
mb.moatads.com
pagead2.googlesyndication.com
pixel.adsafeprotected.com
protected-by.clarium.io
px.moatads.com
redventuresgamdisplay60805146916.s.moatpixel.com
s0.2mdn.net
securepubads.g.doubleclick.net
static.adsafeprotected.com
static.myfinance.com
taggy.cohesionapps.com
tpc.googlesyndication.com
tps.doubleverify.com
tpsc-eu3.doubleverify.com
tr.clipcentric.com
urs.zdnet.com
www.google.com
www.googletagservices.com
www.myfinance.com
www.zdnet.com
z.moatads.com
142.250.185.66
151.101.65.194
151.101.66.137
151.101.66.154
162.247.243.147
172.217.16.130
172.217.18.102
18.170.183.138
2.16.107.105
2.18.235.40
2600:9000:211e:9a00:8:48e:53c0:93a1
2606:4700:10::6814:b844
2606:4700:3037::6815:2b8a
2606:4700::6810:9540
2a00:1450:4001:803::2002
2a00:1450:4001:80e::2001
2a00:1450:4001:80e::2002
2a00:1450:4001:810::2002
2a00:1450:4001:810::2003
2a00:1450:4001:828::2001
2a00:1450:4001:82b::2001
2a00:1450:4001:82b::2004
2a00:1450:4001:82f::2002
2a00:1450:4001:82f::200a
2a02:26f0:6c00:1b8::11a6
2a02:26f0:6c00:286::4469
2a02:26f0:6c00:287::11a6
2a02:26f0:6c00:2b9::11a6
2a04:4e42:4c::666
3.11.215.107
3.127.116.150
34.120.203.121
34.149.12.213
34.206.8.109
34.246.26.134
35.172.51.102
44.237.128.222
52.5.105.31
52.6.9.44
65.9.64.109
65.9.64.127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